{"id":13421,"date":"2023-05-03T09:24:47","date_gmt":"2023-05-03T09:24:47","guid":{"rendered":"https:\/\/www.webtechmantra.com\/?p=13421"},"modified":"2023-05-03T09:24:49","modified_gmt":"2023-05-03T09:24:49","slug":"internal-threat","status":"publish","type":"post","link":"https:\/\/www.webtechmantra.com\/internal-threat\/","title":{"rendered":"Internal threat: How to reduce and eliminate it in your company"},"content":{"rendered":"\n<p>It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.&nbsp;<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_61 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.webtechmantra.com\/internal-threat\/#The_ever-present_internal_threat_risk\" title=\"The ever-present internal threat risk\">The ever-present internal threat risk<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.webtechmantra.com\/internal-threat\/#Key_points_for_cutting_down_internal_threats\" title=\"Key points for cutting down internal threats&nbsp;\">Key points for cutting down internal threats&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.webtechmantra.com\/internal-threat\/#Digging_Into_Data_Detection_and_Response\" title=\"Digging Into Data Detection and Response\">Digging Into Data Detection and Response<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_ever-present_internal_threat_risk\"><\/span>The ever-present internal threat risk<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>An internal bad actor is the worst of all worlds \u2013 they have proprietary system access outside hackers only dream of and know how to maneuver around the culture without getting caught. But intentional baddies aren\u2019t the only ones to beware of: More often than not, uninformed or careless employee behaviors add unintended risks to a company\u2019s assets. Because they are on the inside, those types of threats can be exponentially more harmful than their external counterparts and require the most proactive security safeguards.<\/p>\n\n\n\n<p>Today\u2019s landscape is especially susceptible to creative new ways that company insiders can do an unforeseen amount of damage. As the post-pandemic world experiences a surge of job mobility, these workers on the move can accidentally bring their old work IP with them when transferring to a different company. Increasing the separation between employee and employer also increases the likelihood of hiring a scammer or someone who works for an organization that would benefit from the criminal exposure of a company\u2019s data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Key_points_for_cutting_down_internal_threats\"><\/span>Key points for cutting down internal threats&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Reducing or eliminating insider threat risks comes down to performing well in a few key areas:<\/p>\n\n\n\n<ol type=\"1\">\n<li><strong>Know what\u2019s going on in your internal landscape.<\/strong><a> Monitor for<\/a>\u00a0threats and insist on full visibility across the inner workings of your enterprise. Look for a tool that works across multiple industries and can granularly monitor internal data while staying on the right side of industry-specific compliance requirements. This solution should be able to spot malicious behavioral patterns and alert you when risky user behavior is underway. It should also bring to light:<ol><li>Which users work with large amounts of sensitive data regularly?What business flows need to be supported?Which groups need access to a certain data subset?What happens to data after it is accessed?<\/li><\/ol>\n<ol>\n<li>Which users and applications retain copies of the data?<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong>Know the indicators of insider threats.&nbsp;<\/strong>Once you know how data is being used, you can know how to set your policies and triggers. The most important indicator of an insider threat is, after all, the violation of an organization\u2019s data policies. Another common red flag is anomalous behavior, and other more subtle techniques such as saving data to a zip file, changing file extensions, or encrypting assets.<\/li>\n\n\n\n<li><strong>Get away from traditional methods.\u00a0<\/strong>There are some risks that come with legacy Insider Risk Management (IRM) solutions, and those limitations are\u00a0<a>where<\/a>\u00a0modern-day threats seep though. As a\u00a0<a href=\"https:\/\/www.cylab.cmu.edu\/_files\/documents\/summary-irm-survey-results-20210331.6.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Carnegie-Mellon CyLab study<\/a>\u00a0states, \u201cInsider risk management activities in organizations typically focus almost exclusively on individual behaviors rather than also considering the context in which that behavior occurs.\u201d\u00a0Historically, IRM tools have taken a passive approach, scanning for anomalies and alerting you when something arises. However, they fall short as they can\u2019t differentiate the data being \u2018mishandled\u2019 and end up generating alerts for non-threatening activity while missing other legitimate risks.\u00a0<\/li>\n\n\n\n<li><strong>Go beyond Data Loss Prevention (DLP).&nbsp;<\/strong>While they can adequately analyze data, DLP solutions are limited to information that fits a predetermined format, such as SSNs or credit card numbers. This makes it difficult to protect intellectual property. They also fall into the camp of \u201ctraditional solutions\u201d, meaning they provide alerts (but without context) and put all the heavy lifting of threat response on the manual processes of the team itself.<\/li>\n\n\n\n<li><strong>Defend with a good offense.\u00a0<\/strong>CISA notes that \u201cproactively managing insider threats can\u00a0<a href=\"https:\/\/www.cisa.gov\/managing-insider-threats\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">stop the trajectory<\/a>\u00a0or change the course of events from a harmful outcome to an effective mitigation.\u201d To this end, solutions need to do more than detect internal bad: they need to stop it. While beneficial, users with traditional \u2018detection only\u2019 IRM platforms can \u201c<a href=\"https:\/\/www.cyberhaven.com\/code42-incydr-alternatives-competitors\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">struggle to successfully implement<\/a>\u00a0and operationalize the tool as part of their data security program.\u201d Keep in mind that multiple tools for multiple reasons create siloes and added work.\u00a0<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Digging_Into_Data_Detection_and_Response\"><\/span>Digging Into Data Detection and Response<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If your security team is looking to optimize resources, a\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/08\/19\/the-role-of-data-detection-and-response-in-the-future-of-data-protection\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Data Detection and Response (DDR)<\/a>\u00a0platform is a great way to not only detect but\u00a0<em>defend against<\/em>\u00a0real-time internal threats. \u201cThis new data-centric approach,\u201d states VentureBeat, \u201cprovides instant visibility into data stores and real-time protection and response capabilities&#8230;some say it is set to reinvent\u00a0<a>the cybersecurity<\/a>\u00a0space&#8221;.<\/p>\n\n\n\n<p>New threats require new methodologies, and enterprises look to AI, automation, and autonomous technology to provide them. Take EDR and XDR, for example. DDR defends in the same proactive way, not only detecting but responding to insider threats in real-time and giving your data-driven context so you know which anomalous behavior is&nbsp;<em>worth<\/em>&nbsp;further investigation (and which is an intern accessing an old Myspace).&nbsp;<\/p>\n\n\n\n<p>Thanks to the rise of autonomous security measures like DDR, organizations can move from passively knowing their inside threats to proactively preventing them.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high<\/p>\n","protected":false},"author":1,"featured_media":13422,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[3521],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Internal threat: How to reduce and eliminate it in your company<\/title>\n<meta name=\"description\" content=\"It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webtechmantra.com\/internal-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internal threat: How to reduce and eliminate it in your company\" \/>\n<meta property=\"og:description\" content=\"It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webtechmantra.com\/internal-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"WTM - Technology, Business, Finance, Digital Marketing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webtechmantra\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-03T09:24:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-03T09:24:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/Internal-threat-How-to-reduce-and-eliminate-it-in-your-company.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Web Tech Mantra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webtechmantra\" \/>\n<meta name=\"twitter:site\" content=\"@webtechmantra\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Tech Mantra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.webtechmantra.com\/internal-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.webtechmantra.com\/internal-threat\/\"},\"author\":{\"name\":\"Web Tech Mantra\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124\"},\"headline\":\"Internal threat: How to reduce and eliminate it in your company\",\"datePublished\":\"2023-05-03T09:24:47+00:00\",\"dateModified\":\"2023-05-03T09:24:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.webtechmantra.com\/internal-threat\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\"},\"keywords\":[\"Internal threat\"],\"articleSection\":[\"Business\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webtechmantra.com\/internal-threat\/\",\"url\":\"https:\/\/www.webtechmantra.com\/internal-threat\/\",\"name\":\"Internal threat: How to reduce and eliminate it in your company\",\"isPartOf\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#website\"},\"datePublished\":\"2023-05-03T09:24:47+00:00\",\"dateModified\":\"2023-05-03T09:24:49+00:00\",\"description\":\"It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.webtechmantra.com\/internal-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.webtechmantra.com\/internal-threat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.webtechmantra.com\/internal-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.webtechmantra.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internal threat: How to reduce and eliminate it in your company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.webtechmantra.com\/#website\",\"url\":\"https:\/\/www.webtechmantra.com\/\",\"name\":\"WTM - Technology, Business, Finance, Digital Marketing\",\"description\":\"Technology, Business, Finance, Digital Marketing\",\"publisher\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.webtechmantra.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\",\"name\":\"WTM - Technology, Business, Finance, Digital Marketing\",\"url\":\"https:\/\/www.webtechmantra.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png\",\"contentUrl\":\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png\",\"width\":250,\"height\":64,\"caption\":\"WTM - Technology, Business, Finance, Digital Marketing\"},\"image\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webtechmantra\",\"https:\/\/twitter.com\/webtechmantra\",\"https:\/\/www.pinterest.com\/webtechmantraofficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124\",\"name\":\"Web Tech Mantra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815\",\"contentUrl\":\"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815\",\"caption\":\"Web Tech Mantra\"},\"description\":\"Web Tech Mantra website came up with a new helpful content update on finance, technology, business, health, and more topics niche. We studied, analyzed and presented on this platform. With all our knowledge, we established a platform to build a proper and trustful rapport with the internet world. We also covered the social media world through web tech mantra, so every social media user can access the informational world through the web tech mantra.\",\"sameAs\":[\"https:\/\/webtechmantra.com\"],\"url\":\"https:\/\/www.webtechmantra.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internal threat: How to reduce and eliminate it in your company","description":"It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.webtechmantra.com\/internal-threat\/","og_locale":"en_US","og_type":"article","og_title":"Internal threat: How to reduce and eliminate it in your company","og_description":"It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.","og_url":"https:\/\/www.webtechmantra.com\/internal-threat\/","og_site_name":"WTM - Technology, Business, Finance, Digital Marketing","article_publisher":"https:\/\/www.facebook.com\/webtechmantra","article_published_time":"2023-05-03T09:24:47+00:00","article_modified_time":"2023-05-03T09:24:49+00:00","og_image":[{"width":1200,"height":629,"url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/Internal-threat-How-to-reduce-and-eliminate-it-in-your-company.jpg","type":"image\/jpeg"}],"author":"Web Tech Mantra","twitter_card":"summary_large_image","twitter_creator":"@webtechmantra","twitter_site":"@webtechmantra","twitter_misc":{"Written by":"Web Tech Mantra","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.webtechmantra.com\/internal-threat\/#article","isPartOf":{"@id":"https:\/\/www.webtechmantra.com\/internal-threat\/"},"author":{"name":"Web Tech Mantra","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124"},"headline":"Internal threat: How to reduce and eliminate it in your company","datePublished":"2023-05-03T09:24:47+00:00","dateModified":"2023-05-03T09:24:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webtechmantra.com\/internal-threat\/"},"wordCount":852,"publisher":{"@id":"https:\/\/www.webtechmantra.com\/#organization"},"keywords":["Internal threat"],"articleSection":["Business"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.webtechmantra.com\/internal-threat\/","url":"https:\/\/www.webtechmantra.com\/internal-threat\/","name":"Internal threat: How to reduce and eliminate it in your company","isPartOf":{"@id":"https:\/\/www.webtechmantra.com\/#website"},"datePublished":"2023-05-03T09:24:47+00:00","dateModified":"2023-05-03T09:24:49+00:00","description":"It\u2019s an uncomfortable thought but one that needs to be addressed: companies face a high amount of risk from inside actors, and policies need to be put in place that take that at face value and set up the appropriate guardrails.","breadcrumb":{"@id":"https:\/\/www.webtechmantra.com\/internal-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webtechmantra.com\/internal-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.webtechmantra.com\/internal-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.webtechmantra.com\/"},{"@type":"ListItem","position":2,"name":"Internal threat: How to reduce and eliminate it in your company"}]},{"@type":"WebSite","@id":"https:\/\/www.webtechmantra.com\/#website","url":"https:\/\/www.webtechmantra.com\/","name":"WTM - Technology, Business, Finance, Digital Marketing","description":"Technology, Business, Finance, Digital Marketing","publisher":{"@id":"https:\/\/www.webtechmantra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webtechmantra.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.webtechmantra.com\/#organization","name":"WTM - Technology, Business, Finance, Digital Marketing","url":"https:\/\/www.webtechmantra.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png","contentUrl":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png","width":250,"height":64,"caption":"WTM - Technology, Business, Finance, Digital Marketing"},"image":{"@id":"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webtechmantra","https:\/\/twitter.com\/webtechmantra","https:\/\/www.pinterest.com\/webtechmantraofficial\/"]},{"@type":"Person","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124","name":"Web Tech Mantra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/image\/","url":"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815","contentUrl":"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815","caption":"Web Tech Mantra"},"description":"Web Tech Mantra website came up with a new helpful content update on finance, technology, business, health, and more topics niche. We studied, analyzed and presented on this platform. With all our knowledge, we established a platform to build a proper and trustful rapport with the internet world. We also covered the social media world through web tech mantra, so every social media user can access the informational world through the web tech mantra.","sameAs":["https:\/\/webtechmantra.com"],"url":"https:\/\/www.webtechmantra.com\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/13421"}],"collection":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/comments?post=13421"}],"version-history":[{"count":1,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/13421\/revisions"}],"predecessor-version":[{"id":13423,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/13421\/revisions\/13423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/media\/13422"}],"wp:attachment":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/media?parent=13421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/categories?post=13421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/tags?post=13421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}