{"id":9801,"date":"2022-07-01T17:32:19","date_gmt":"2022-07-01T17:32:19","guid":{"rendered":"https:\/\/www.webtechmantra.com\/?p=9801"},"modified":"2022-07-05T14:13:43","modified_gmt":"2022-07-05T14:13:43","slug":"types-of-cyberattacks-most-small-business-face","status":"publish","type":"post","link":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/","title":{"rendered":"3 Types of Cyberattacks Most Small Business Face"},"content":{"rendered":"\n<p>Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.\u00a0<a href=\"https:\/\/techreviewer.co\/blog\/5-tips-to-avoid-cybercriminals\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cybercriminals<\/a>\u00a0are getting smarter with their attacks and some even automate certain tasks, so they can attack multiple targets at once.<\/p>\n\n\n\n<p>The small business owners that implement weak cybersecurity measures, and do not proactively look out for threats to their IT infrastructure suffer greatly from cyberattacks. Hackers know small businesses might have large sums of money at their disposal, or substantial volumes of data they can steal. This is why they target them. Sometimes, hacking a small business\u2019 IT systems is a pathway to a larger company because the two organizations in question might have an ongoing partnership.&nbsp;<\/p>\n\n\n\n<p>To avoid these incidents, it is important to know the different\u00a0<a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/cyberattacks\/most-common-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">types of cyberattacks<\/a>\u00a0small businesses can face and how to prevent them. Here are some of them;<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_61 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#1_Malware_Attacks\" title=\"1. Malware Attacks\">1. Malware Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#2_Phishing_Attacks\" title=\"2. Phishing Attacks\">2. Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#3_Ransomware_Attacks\" title=\"3. Ransomware Attacks\">3. Ransomware Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#Endnote\" title=\"Endnote\">Endnote<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Malware_Attacks\"><\/span>1. <strong>Malware Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Malware is any software created to harm, corrupt, destroy, or gain unauthorized entry to a computer system. It is a major threat to small businesses, as it can be used to extract critical information, steal funds or erase valuable data stored on computers. They mostly come from files downloaded from unsecured websites, attachments from suspicious emails, and corrupted USB devices.<\/p>\n\n\n\n<p>Small businesses suffer malware attacks because they usually allow staff to use their personal devices for work. This is not advisable because most malware downloads occur on personal devices, and they can transfer unto work online platforms. A solution is to issue members of staff work computers or phones that have powerful anti-malware software installed on them, and limit their ability to access unsecure websites. They should also tell their staff about possible cybersecurity risks they can face.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Phishing_Attacks\"><\/span>2. <strong>Phishing Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>These occur when cybercriminals use social engineering tactics to trick computer users into clicking malicious links, downloading suspicious files, or giving out their account login details. Phishing attacks are effective against oblivious people that lack cybersecurity training. Over the years,&nbsp;<a href=\"https:\/\/www.webtechmantra.com\/online-fraud-awareness\/\" target=\"_blank\" rel=\"noreferrer noopener\">scammers<\/a>&nbsp;have improved their methods.&nbsp;<\/p>\n\n\n\n<p>Phishing scams are hard to fight against because instead of targeting weakness in a computer network, they prey on human negligence. Phishing threats can be minimized by teaching staff to look out for unfamiliar email addresses or links, and unusual website URLs. Business owners should also install security software that can detect spam emails when they enter the inbox of employees.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Ransomware_Attacks\"><\/span>3. <strong>Ransomware Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As the name implies,&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3236183\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ransomware<\/a>&nbsp;is a malicious software that encrypts its victim\u2019s files. This makes them unable to use them until they pay a sum of money as ransom. Small businesses attacked with ransomware either have to pay the money or let it disrupt their service, which would still make them lose money.<\/p>\n\n\n\n<p>Most small businesses pay the ransom because their data is not backed up and they cannot afford to lose it. To combat this, businesses should regularly backup their critical information to the cloud. This will allow the business owner to restore the information whenever there is a ransomware attack. They should also ensure all their work devices have reliable cybersecurity software equipped with endpoint protection features. This will prevent ransomware from encrypting the devices in the first place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Endnote\"><\/span><strong>Endnote<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Unfortunately,&nbsp;&nbsp;there are many other cyberthreats small businesses face. To avoid losses, business owners should ensure they put the necessary security tools in place and give their staff adequate cybersecurity training. This training would let them know the signs they should be aware of, and the steps to take when they encounter cyberthreats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some small business owners are lax towards cybersecurity, as they feel their organization is too<\/p>\n","protected":false},"author":1,"featured_media":9803,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[787],"tags":[56,2271],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Types of Cyberattacks Most Small Business Face<\/title>\n<meta name=\"description\" content=\"Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Types of Cyberattacks Most Small Business Face\" \/>\n<meta property=\"og:description\" content=\"Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\" \/>\n<meta property=\"og:site_name\" content=\"WTM - Technology, Business, Finance, Digital Marketing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webtechmantra\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-01T17:32:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-05T14:13:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/3-Types-of-Cyberattacks-Most-Small-Business-Face-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Web Tech Mantra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webtechmantra\" \/>\n<meta name=\"twitter:site\" content=\"@webtechmantra\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Tech Mantra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\"},\"author\":{\"name\":\"Web Tech Mantra\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124\"},\"headline\":\"3 Types of Cyberattacks Most Small Business Face\",\"datePublished\":\"2022-07-01T17:32:19+00:00\",\"dateModified\":\"2022-07-05T14:13:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\"},\"wordCount\":613,\"publisher\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\"},\"keywords\":[\"Business\",\"Cyberattacks\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\",\"url\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\",\"name\":\"3 Types of Cyberattacks Most Small Business Face\",\"isPartOf\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#website\"},\"datePublished\":\"2022-07-01T17:32:19+00:00\",\"dateModified\":\"2022-07-05T14:13:43+00:00\",\"description\":\"Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.webtechmantra.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Types of Cyberattacks Most Small Business Face\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.webtechmantra.com\/#website\",\"url\":\"https:\/\/www.webtechmantra.com\/\",\"name\":\"WTM - Technology, Business, Finance, Digital Marketing\",\"description\":\"Technology, Business, Finance, Digital Marketing\",\"publisher\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.webtechmantra.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.webtechmantra.com\/#organization\",\"name\":\"WTM - Technology, Business, Finance, Digital Marketing\",\"url\":\"https:\/\/www.webtechmantra.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png\",\"contentUrl\":\"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png\",\"width\":250,\"height\":64,\"caption\":\"WTM - Technology, Business, Finance, Digital Marketing\"},\"image\":{\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webtechmantra\",\"https:\/\/twitter.com\/webtechmantra\",\"https:\/\/www.pinterest.com\/webtechmantraofficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124\",\"name\":\"Web Tech Mantra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.webtechmantra.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815\",\"contentUrl\":\"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815\",\"caption\":\"Web Tech Mantra\"},\"description\":\"Web Tech Mantra website came up with a new helpful content update on finance, technology, business, health, and more topics niche. We studied, analyzed and presented on this platform. With all our knowledge, we established a platform to build a proper and trustful rapport with the internet world. We also covered the social media world through web tech mantra, so every social media user can access the informational world through the web tech mantra.\",\"sameAs\":[\"https:\/\/webtechmantra.com\"],\"url\":\"https:\/\/www.webtechmantra.com\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Types of Cyberattacks Most Small Business Face","description":"Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/","og_locale":"en_US","og_type":"article","og_title":"3 Types of Cyberattacks Most Small Business Face","og_description":"Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.","og_url":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/","og_site_name":"WTM - Technology, Business, Finance, Digital Marketing","article_publisher":"https:\/\/www.facebook.com\/webtechmantra","article_published_time":"2022-07-01T17:32:19+00:00","article_modified_time":"2022-07-05T14:13:43+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/3-Types-of-Cyberattacks-Most-Small-Business-Face-2.jpg","type":"image\/jpeg"}],"author":"Web Tech Mantra","twitter_card":"summary_large_image","twitter_creator":"@webtechmantra","twitter_site":"@webtechmantra","twitter_misc":{"Written by":"Web Tech Mantra","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#article","isPartOf":{"@id":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/"},"author":{"name":"Web Tech Mantra","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124"},"headline":"3 Types of Cyberattacks Most Small Business Face","datePublished":"2022-07-01T17:32:19+00:00","dateModified":"2022-07-05T14:13:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/"},"wordCount":613,"publisher":{"@id":"https:\/\/www.webtechmantra.com\/#organization"},"keywords":["Business","Cyberattacks"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/","url":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/","name":"3 Types of Cyberattacks Most Small Business Face","isPartOf":{"@id":"https:\/\/www.webtechmantra.com\/#website"},"datePublished":"2022-07-01T17:32:19+00:00","dateModified":"2022-07-05T14:13:43+00:00","description":"Some small business owners are lax towards cybersecurity, as they feel their organization is too small to be a target. Little do they know that they face the same level of risk as larger companies.","breadcrumb":{"@id":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.webtechmantra.com\/types-of-cyberattacks-most-small-business-face\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.webtechmantra.com\/"},{"@type":"ListItem","position":2,"name":"3 Types of Cyberattacks Most Small Business Face"}]},{"@type":"WebSite","@id":"https:\/\/www.webtechmantra.com\/#website","url":"https:\/\/www.webtechmantra.com\/","name":"WTM - Technology, Business, Finance, Digital Marketing","description":"Technology, Business, Finance, Digital Marketing","publisher":{"@id":"https:\/\/www.webtechmantra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webtechmantra.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.webtechmantra.com\/#organization","name":"WTM - Technology, Business, Finance, Digital Marketing","url":"https:\/\/www.webtechmantra.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png","contentUrl":"https:\/\/www.webtechmantra.com\/wp-content\/uploads\/web-tech-mantra-logo-1-e1586874822549.png","width":250,"height":64,"caption":"WTM - Technology, Business, Finance, Digital Marketing"},"image":{"@id":"https:\/\/www.webtechmantra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webtechmantra","https:\/\/twitter.com\/webtechmantra","https:\/\/www.pinterest.com\/webtechmantraofficial\/"]},{"@type":"Person","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/c26fbe297d817255a12e5fab6fddb124","name":"Web Tech Mantra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webtechmantra.com\/#\/schema\/person\/image\/","url":"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815","contentUrl":"https:\/\/www.webtechmantra.com\/wp-content\/litespeed\/avatar\/476c2abb5f087e24c06582c50a5d5ac6.jpg?ver=1703797815","caption":"Web Tech Mantra"},"description":"Web Tech Mantra website came up with a new helpful content update on finance, technology, business, health, and more topics niche. We studied, analyzed and presented on this platform. With all our knowledge, we established a platform to build a proper and trustful rapport with the internet world. We also covered the social media world through web tech mantra, so every social media user can access the informational world through the web tech mantra.","sameAs":["https:\/\/webtechmantra.com"],"url":"https:\/\/www.webtechmantra.com\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/9801"}],"collection":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/comments?post=9801"}],"version-history":[{"count":0,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/posts\/9801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/media\/9803"}],"wp:attachment":[{"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/media?parent=9801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/categories?post=9801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webtechmantra.com\/wp-json\/wp\/v2\/tags?post=9801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}