{"id":43798,"date":"2017-07-14T05:15:46","date_gmt":"2017-07-14T12:15:46","guid":{"rendered":"https:\/\/lenpenzo.com\/blog\/?p=43798"},"modified":"2024-09-06T12:40:36","modified_gmt":"2024-09-06T19:40:36","slug":"how-businesses-limit-damage-from-toxic-plugins-software-hardware","status":"publish","type":"post","link":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html","title":{"rendered":"How Businesses Limit Damage from Toxic Plugins, Software &#038; Hardware"},"content":{"rendered":"<p><a href=\"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-43799\" src=\"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg\" alt=\"\" width=\"375\" height=\"281\" srcset=\"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg 640w, https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud-300x225.jpg 300w\" sizes=\"auto, (max-width: 375px) 100vw, 375px\" \/><\/a>The tech services giant, IBM Corporation, suffered a recent embarrassment when it was forced to issue an <a href=\"https:\/\/www.forbes.com\/sites\/leemathews\/2017\/05\/03\/ibm-warns-customers-after-shipping-them-infected-usb-drives\/#15461cd31dc0\" target=\"_blank\" rel=\"noopener\">alert<\/a> on its support site notifying its customers that it had shipped malware-infected USB flash drives. The fact that this problem hit a large company like IBM made it a newsworthy story, but the reality is that infected USB drives, Remote Access Trojan (RAT) hijackings of webcams, and <a href=\"https:\/\/lenpenzo.com\/blog\/id17630-the-embarrassing-anatomy-of-a-phishing-scam-2.html\" target=\"_blank\" rel=\"noopener\">clickable scams<\/a> are more common than you might imagine.<\/p>\n<p>These infections, hijackings and scams are a growing source of danger for every business. Consider, for example:<\/p>\n<ul>\n<li>Cybersecurity expert, Mikko Hypponen, notes that, &#8220;Once you gain access to somebody&#8217;s system it&#8217;s trivial to turn on the webcam and record whatever they&#8217;re doing, or to just turn on the microphone and record whatever is being spoken around the infected laptop.&#8221; Hackers can gain that access through malware inserted into a link or an email attachment sent to an employee. Hackers can then use the webcam to record everything that is discussed in a <a href=\"https:\/\/lenpenzo.com\/blog\/id37643-how-to-handle-a-partnership-with-a-foreign-business-2.html\" target=\"_blank\" rel=\"noopener\">business.<\/a><\/li>\n<\/ul>\n<ul>\n<li>Almost 10 years ago, a cybersecurity company determined that <a href=\"http:\/\/www.computerworld.com\/article\/2514934\/security0\/1-in-4-worms-spread-through-infected-usb-devices.html\" target=\"_blank\" rel=\"noopener\">one-fourth of all USB drives<\/a> contained infected code and that the majority of new malware was being written to propagate through USB drives. Employees routinely receive drives as promotional items at trade shows and from vendors; so if a company with as many resources as IBM cannot prevent malware from infecting USB drives that it distributes, it is likely that smaller companies will have similar problems.<\/li>\n<\/ul>\n<ul>\n<li>Computer users have become accustomed to seeing frequent notifications to update flash players and other software. In 2016, hackers relied on this to propagate malware through counterfeit flash player update notices that targeted Mac desktop systems. The fake update installed unwanted plugins on the devices when users clicked on the update link.<\/li>\n<\/ul>\n<p>Browser plugins from legitimate and trusted sources do have valuable uses. A plugin, for example, can integrate a real-time spell checker, or it can perform auto-complete tasks that make it easier to enter data into browser applications. Unauthorized plugins, however, can have more nefarious purposes. They may be merely bothersome, for example, by directing a browser to go to a site that advertises products or services. They can also co-opt a computer into spying on its users by recording sound and video, or through keystroke monitoring that can divulge confidential passwords and personal information.<\/p>\n<p>Businesses should take every precaution to deter employees from installing deceptive plugins into their browsers. Ideally, all browser modification and all software changes and updates should be centralized into an information technology department that is trained to distinguish authentic from fake update notices. For third-party products that are not sourced from the browser&#8217;s original author or distributor, this might include verifying the source and authorship of any plugins and researching the plugin&#8217;s history and ratings on message boards.<\/p>\n<p>If a business suspects that one or more of its machines has been co-opted to spy on the business&#8217;s activities, that machine should be taken offline immediately and analyzed to determine what information it might have provided to an outside source. If customer information was compromised, the customers should be promptly notified of the potential for theft of their financial or personal information.<\/p>\n<p>A good cyber insurance policy can help a business cover the costs and liabilities that inevitably flow from a toxic plugin attack. That policy might cover the costs of replacing affected machines, as well as liabilities to third parties and fines from regulatory authorities that can be levied if the business is deemed to have ignored cyber threats or failed to adequately protect third-party information. In every case, a cyber insurance policy is often the last line of protection against losses from toxic plugins and their malware kin.<\/p>\n<p style=\"text-align: right;\"><span style=\"font-size: smaller;\">Photo Credit: Visual Content<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The tech services giant, IBM Corporation, suffered a recent embarrassment when it was forced to issue an alert on its support site notifying its customers that it had shipped malware-infected USB flash drives. The fact that this problem hit a large company like IBM made it a newsworthy story, but the reality is that infected [&hellip;]<\/p>\n","protected":false},"author":93,"featured_media":43799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mo_disable_npp":"","pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[469],"tags":[],"class_list":{"0":"post-43798","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"pmpro-has-access","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Businesses Limit Damage from Toxic Plugins, Software &amp; Hardware<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Businesses Limit Damage from Toxic Plugins, Software &amp; Hardware\" \/>\n<meta property=\"og:description\" content=\"The tech services giant, IBM Corporation, suffered a recent embarrassment when it was forced to issue an alert on its support site notifying its customers that it had shipped malware-infected USB flash drives. The fact that this problem hit a large company like IBM made it a newsworthy story, but the reality is that infected [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\" \/>\n<meta property=\"og:site_name\" content=\"Len Penzo dot Com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/LenPenzo\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-14T12:15:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-06T19:40:36+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tex Freitag\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LenPenzo\" \/>\n<meta name=\"twitter:site\" content=\"@LenPenzo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tex Freitag\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\"},\"author\":{\"name\":\"Tex Freitag\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#\\\/schema\\\/person\\\/a709c99bd2016fa51a1fc107caa50cc1\"},\"headline\":\"How Businesses Limit Damage from Toxic Plugins, Software &#038; Hardware\",\"datePublished\":\"2017-07-14T12:15:46+00:00\",\"dateModified\":\"2024-09-06T19:40:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\"},\"wordCount\":628,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/identity-fraud.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\",\"url\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\",\"name\":\"How Businesses Limit Damage from Toxic Plugins, Software & Hardware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/identity-fraud.jpg\",\"datePublished\":\"2017-07-14T12:15:46+00:00\",\"dateModified\":\"2024-09-06T19:40:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage\",\"url\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/identity-fraud.jpg\",\"contentUrl\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/identity-fraud.jpg\",\"width\":640,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/lenpenzo.com\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Businesses Limit Damage from Toxic Plugins, Software &#038; Hardware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/\",\"name\":\"Len Penzo dot Com\",\"description\":\"The offbeat personal finance blog for responsible people.\",\"publisher\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#organization\",\"name\":\"Len Penzo dot Com\",\"url\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Block_L.png\",\"contentUrl\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Block_L.png\",\"width\":359,\"height\":360,\"caption\":\"Len Penzo dot Com\"},\"image\":{\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/LenPenzo\",\"https:\\\/\\\/x.com\\\/LenPenzo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/lenpenzo.com\\\/blog\\\/#\\\/schema\\\/person\\\/a709c99bd2016fa51a1fc107caa50cc1\",\"name\":\"Tex Freitag\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47e6dde1b6f473853861701215731fa7a65e73a4f2307ac31959398f7f147de2?s=96&d=monsterid&r=r\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47e6dde1b6f473853861701215731fa7a65e73a4f2307ac31959398f7f147de2?s=96&d=monsterid&r=r\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47e6dde1b6f473853861701215731fa7a65e73a4f2307ac31959398f7f147de2?s=96&d=monsterid&r=r\",\"caption\":\"Tex Freitag\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Businesses Limit Damage from Toxic Plugins, Software & Hardware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html","og_locale":"en_US","og_type":"article","og_title":"How Businesses Limit Damage from Toxic Plugins, Software & Hardware","og_description":"The tech services giant, IBM Corporation, suffered a recent embarrassment when it was forced to issue an alert on its support site notifying its customers that it had shipped malware-infected USB flash drives. The fact that this problem hit a large company like IBM made it a newsworthy story, but the reality is that infected [&hellip;]","og_url":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html","og_site_name":"Len Penzo dot Com","article_publisher":"http:\/\/www.facebook.com\/LenPenzo","article_published_time":"2017-07-14T12:15:46+00:00","article_modified_time":"2024-09-06T19:40:36+00:00","og_image":[{"width":640,"height":480,"url":"http:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg","type":"image\/jpeg"}],"author":"Tex Freitag","twitter_card":"summary_large_image","twitter_creator":"@LenPenzo","twitter_site":"@LenPenzo","twitter_misc":{"Written by":"Tex Freitag","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#article","isPartOf":{"@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html"},"author":{"name":"Tex Freitag","@id":"https:\/\/lenpenzo.com\/blog\/#\/schema\/person\/a709c99bd2016fa51a1fc107caa50cc1"},"headline":"How Businesses Limit Damage from Toxic Plugins, Software &#038; Hardware","datePublished":"2017-07-14T12:15:46+00:00","dateModified":"2024-09-06T19:40:36+00:00","mainEntityOfPage":{"@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html"},"wordCount":628,"commentCount":3,"publisher":{"@id":"https:\/\/lenpenzo.com\/blog\/#organization"},"image":{"@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage"},"thumbnailUrl":"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg","articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html","url":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html","name":"How Businesses Limit Damage from Toxic Plugins, Software & Hardware","isPartOf":{"@id":"https:\/\/lenpenzo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage"},"image":{"@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage"},"thumbnailUrl":"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg","datePublished":"2017-07-14T12:15:46+00:00","dateModified":"2024-09-06T19:40:36+00:00","breadcrumb":{"@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#primaryimage","url":"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg","contentUrl":"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2017\/07\/identity-fraud.jpg","width":640,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/lenpenzo.com\/blog\/id43798-how-businesses-limit-damage-from-toxic-plugins-software-hardware.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lenpenzo.com\/blog"},{"@type":"ListItem","position":2,"name":"How Businesses Limit Damage from Toxic Plugins, Software &#038; Hardware"}]},{"@type":"WebSite","@id":"https:\/\/lenpenzo.com\/blog\/#website","url":"https:\/\/lenpenzo.com\/blog\/","name":"Len Penzo dot Com","description":"The offbeat personal finance blog for responsible people.","publisher":{"@id":"https:\/\/lenpenzo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lenpenzo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lenpenzo.com\/blog\/#organization","name":"Len Penzo dot Com","url":"https:\/\/lenpenzo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lenpenzo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2022\/06\/Block_L.png","contentUrl":"https:\/\/lenpenzo.com\/blog\/wp-content\/uploads\/2022\/06\/Block_L.png","width":359,"height":360,"caption":"Len Penzo dot Com"},"image":{"@id":"https:\/\/lenpenzo.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/LenPenzo","https:\/\/x.com\/LenPenzo"]},{"@type":"Person","@id":"https:\/\/lenpenzo.com\/blog\/#\/schema\/person\/a709c99bd2016fa51a1fc107caa50cc1","name":"Tex Freitag","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/47e6dde1b6f473853861701215731fa7a65e73a4f2307ac31959398f7f147de2?s=96&d=monsterid&r=r","url":"https:\/\/secure.gravatar.com\/avatar\/47e6dde1b6f473853861701215731fa7a65e73a4f2307ac31959398f7f147de2?s=96&d=monsterid&r=r","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47e6dde1b6f473853861701215731fa7a65e73a4f2307ac31959398f7f147de2?s=96&d=monsterid&r=r","caption":"Tex Freitag"}}]}},"_links":{"self":[{"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/posts\/43798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/comments?post=43798"}],"version-history":[{"count":2,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/posts\/43798\/revisions"}],"predecessor-version":[{"id":84616,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/posts\/43798\/revisions\/84616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/media\/43799"}],"wp:attachment":[{"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/media?parent=43798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/categories?post=43798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lenpenzo.com\/blog\/wp-json\/wp\/v2\/tags?post=43798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}