{"id":1597,"date":"2019-08-21T17:11:13","date_gmt":"2019-08-21T17:11:13","guid":{"rendered":"https:\/\/officesuppliesphoenix.com\/?p=1597"},"modified":"2020-08-14T07:26:16","modified_gmt":"2020-08-14T07:26:16","slug":"prevent-email-account-takeover-attacks-3-tips","status":"publish","type":"post","link":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/","title":{"rendered":"How to prevent email account takeover attacks: 3 tips"},"content":{"rendered":"<p class=\"takeaway\">Email takeover and lateral phishing attacks are a growing threat to enterprises, according to a Barracuda report.<\/p>\n<div class=\"content\" data-component=\"lazyloadImages\">\n<div class=\"shortcode video large\">\n<div class=\"trVideoPlayer \">\n<div class=\"videoContainer\">\n<div id=\"videoPlayer1\" class=\"videoPlayer cvui-main-container cvui-default-skin cvui playbackStarted playing\" data-component=\"trVideo\" data-tr-video-options=\"{&quot;playlist&quot;:[{&quot;id&quot;:&quot;c9ee6c40-7b16-4844-8815-e7463425e53c&quot;,&quot;title&quot;:&quot;How sophisticated phishing grants attackers total control of your computer&quot;,&quot;description&quot;:&quot;Phishing is all about the bad guy and fooling the victim, says Kevin Mitnick, founder, Mitnick Security Consulting. Mitnick knows about bad guys-he used to be one.&quot;,&quot;slug&quot;:&quot;how-sophisticated-phishing-grants-attackers-total-control-of-your-computer&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;duration&quot;:126,&quot;mpxId&quot;:&quot;&quot;,&quot;mpxRefId&quot;:&quot;3_VYT_72dAno6bnl5m4dNd__oIcEgPOe&quot;,&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;},&quot;previewImg&quot;:&quot;https:\\\/\\\/tr1.cbsistatic.com\\\/hub\\\/i\\\/2018\\\/09\\\/07\\\/582a55f1-0085-4aa1-b4ed-7bb4110d873a\\\/20180905mitnick1dan.jpg&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;a45a76a6-8ac0-11e2-b06b-024c619f5c3d&quot;,&quot;slug&quot;:&quot;security&quot;},&quot;secondaryTopics&quot;:&quot;&quot;,&quot;author&quot;:{&quot;id&quot;:&quot;9f5e5677-506f-4216-84e7-8910bc7ebd89&quot;,&quot;firstName&quot;:&quot;Dan&quot;,&quot;lastName&quot;:&quot;Patterson&quot;},&quot;m3u8&quot;:&quot;\\\/videos\\\/manifest\\\/how-sophisticated-phishing-grants-attackers-total-control-of-your-computer.m3u8&quot;,&quot;mp4&quot;:&quot;http:\\\/\\\/android-streaming.techrepublic.com\\\/media\\\/2018\\\/10\\\/23\\\/1350876739955\\\/20180905_Mitnick1_Dan_1527146_740.mp4&quot;,&quot;selector&quot;:&quot;\\\/videos\\\/selector\\\/how-sophisticated-phishing-grants-attackers-total-control-of-your-computer\\\/&quot;}],&quot;relatedItems&quot;:null,&quot;autoplay&quot;:false,&quot;timelineContainer&quot;:null,&quot;vidInfoContainer&quot;:&quot;.video-details-wrapper&quot;,&quot;monitorProgress&quot;:null,&quot;refreshAds&quot;:null,&quot;timeRange&quot;:null,&quot;popOnScroll&quot;:false,&quot;config&quot;:{&quot;modules&quot;:[{&quot;name&quot;:&quot;ComScore_ss&quot;,&quot;category&quot;:&quot;tracking&quot;,&quot;enabled&quot;:true,&quot;params&quot;:[{&quot;name&quot;:&quot;host&quot;,&quot;value&quot;:&quot;http:\\\/\\\/b.scorecardresearch.com\\\/p?&quot;},{&quot;name&quot;:&quot;partnerID&quot;,&quot;value&quot;:&quot;techrepublic&quot;},{&quot;name&quot;:&quot;c2&quot;,&quot;value&quot;:&quot;3005086&quot;},{&quot;name&quot;:&quot;publishersSecret&quot;,&quot;value&quot;:&quot;2cb08ca4d095dd734a374dff8422c2e5&quot;},{&quot;name&quot;:&quot;c4&quot;,&quot;value&quot;:&quot;3000073&quot;}]},{&quot;name&quot;:&quot;MuxQOSPluginJS&quot;,&quot;category&quot;:&quot;qos&quot;,&quot;enabled&quot;:true,&quot;params&quot;:[{&quot;name&quot;:&quot;propertyKey&quot;,&quot;value&quot;:&quot;ocmva2sa06emb4d8c9l2q3cg9&quot;},{&quot;name&quot;:&quot;experimentName&quot;,&quot;value&quot;:&quot;share_redesign|a|1&quot;}]},{&quot;name&quot;:&quot;NielsenTracking_SDK&quot;,&quot;category&quot;:&quot;tracking&quot;,&quot;enabled&quot;:true,&quot;params&quot;:[{&quot;name&quot;:&quot;clientid&quot;,&quot;value&quot;:&quot;us-700144&quot;},{&quot;name&quot;:&quot;sfcode&quot;,&quot;value&quot;:&quot;us&quot;},{&quot;name&quot;:&quot;vcid&quot;,&quot;value&quot;:&quot;c01&quot;}]},{&quot;name&quot;:&quot;SiteCatalyst&quot;,&quot;category&quot;:&quot;qos&quot;,&quot;enabled&quot;:true,&quot;params&quot;:[{&quot;name&quot;:&quot;account&quot;,&quot;value&quot;:&quot;cbsitechrepublicsite&quot;},{&quot;name&quot;:&quot;brand&quot;,&quot;value&quot;:&quot;techrepublic&quot;},{&quot;name&quot;:&quot;edition&quot;,&quot;value&quot;:&quot;us&quot;},{&quot;name&quot;:&quot;siteType&quot;,&quot;value&quot;:&quot;desktop web&quot;},{&quot;name&quot;:&quot;siteCode&quot;,&quot;value&quot;:&quot;techrepublic&quot;},{&quot;name&quot;:&quot;partnerId&quot;,&quot;value&quot;:&quot;techrepublic&quot;},{&quot;name&quot;:&quot;charSet&quot;,&quot;value&quot;:&quot;UTF-8&quot;},{&quot;name&quot;:&quot;currencyCode&quot;,&quot;value&quot;:&quot;USD&quot;},{&quot;name&quot;:&quot;visitorNamespace&quot;,&quot;value&quot;:&quot;cbsinteractive&quot;},{&quot;name&quot;:&quot;trackLiveStreams&quot;,&quot;value&quot;:&quot;y&quot;},{&quot;name&quot;:&quot;trackingServer&quot;,&quot;value&quot;:&quot;aa.cbsi.com&quot;},{&quot;name&quot;:&quot;heartbeatVisitorMarketingCloudOrgId&quot;,&quot;value&quot;:&quot;10D31225525FF5790A490D4D@AdobeOrg&quot;},{&quot;name&quot;:&quot;heartbeatVisitorNamespace&quot;,&quot;value&quot;:&quot;cbsinteractive&quot;},{&quot;name&quot;:&quot;heartbeatTrackingServer&quot;,&quot;value&quot;:&quot;http:\\\/\\\/cbsinteractive.hb.omtrdc.net&quot;},{&quot;name&quot;:&quot;heartbeatAdobePublisherId&quot;,&quot;value&quot;:&quot;10D31225525FF5790A490D4D@AdobeOrg&quot;}]},{&quot;name&quot;:&quot;VideoPlaybackSettings&quot;,&quot;category&quot;:&quot;internal&quot;,&quot;enabled&quot;:true,&quot;params&quot;:[{&quot;name&quot;:&quot;capLevelToPlayerSize&quot;,&quot;value&quot;:true}]}]}}\">\n<div id=\"controls_videoPlayer1\" class=\"cvui-controls-layer\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>Businesses beware: Hackers are increasingly using email account takeover attacks to leverage legitimate accounts and send phishing emails to employees, clients, and other partners, according to Barracuda&#8217;s\u00a0<a href=\"https:\/\/www.barracuda.com\/spear-phishing-report-2?utm_source=blog&amp;utm_medium=38103\" target=\"_blank\" rel=\"noopener noreferrer\">Spear Phishing: Top Threats and Trends Vol. 2<\/a>\u00a0report, released Thursday.<\/p>\n<p>In email account takeover attacks, hackers gain entry to a business account and send lateral phishing emails. Because these emails come from a legitimate account, they are more likely to fool victims, the report noted.<\/p>\n<p><strong>SEE:\u00a0<\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/phishing-and-spearphishing-an-it-pro-s-guide-free-pdf\/\"><strong>Phishing and spearphishing: An IT pro&#8217;s guide (free PDF)<\/strong><\/a><strong>\u00a0(TechRepublic)<\/strong><\/p>\n<div class=\"relatedContent pinbox pull-right\">\n<h3>More about cybersecurity<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.techrepublic.com\/article\/famous-con-man-frank-abagnale-crime-is-4000-times-easier-today\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;}\">Famous con man Frank Abagnale: Crime is 4,000 times easier today<\/a><\/li>\n<li><a href=\"https:\/\/www.techrepublic.com\/article\/cheat-sheet-how-to-become-a-cybersecurity-pro\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;}\">How to become a cybersecurity pro: A cheat sheet<\/a><\/li>\n<li><a href=\"https:\/\/www.techrepublic.com\/article\/dark-web-the-smart-persons-guide\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;}\">Dark Web: A cheat sheet for business professionals<\/a><\/li>\n<li><a href=\"https:\/\/www.techrepublic.com\/article\/why-deepfakes-are-a-real-threat-to-elections-and-society\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;}\">Why deepfakes are a real threat to elections and society<\/a><\/li>\n<\/ul>\n<\/div>\n<p>One in seven organizations studied experienced lateral phishing attacks within a seven-month timespan, the report found. Of those organizations that fell victim to this attack, more than 60% experienced multiple incidents.<\/p>\n<div class=\"sharethrough-article\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_TR_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<div id=\"sharethrough-top-5d5d79c44fb0a\" class=\"ad-sharethrough-top\" data-ad=\"sharethrough-top\" data-google-query-id=\"CP7G_KC5lOQCFaY1rQYdL9YHKw\">\n<div id=\"google_ads_iframe_\/8264\/aw-techrepublic\/security_3__container__\">\n<section id=\"content-recommendation\" class=\"leadgenads\">\n<div>\n<div class=\"medusaTitle\">\n<p><a href=\"https:\/\/adclick.g.doubleclick.net\/pcs\/click%253Fxai%253DAKAOjstKaXhtSR1gWnOQ91Fm-Y6IX8KD4Sph2ja-IlopYTFTSLOgWZLqVtHow44gWVACMRaJQVFVOgSgSiifYTT3P7eXF1quJjbmhHYKamHB-YPIx-GYDYSSo2b3xiXcFVyF2u46UClpa3Hy8AyR20_GMJz4p-waZEayJzZhzfi5IvCpZjPXcYIZaP-ntd6ytB5eowRXJX47_-iSvvPGMLSgUfltl2pUlBa6gkd5SClUVj5fJEpwvAofJcWIt7WIjvUWoLFjNLFnzT52Wl9Ax-AnyOdg%2526sig%253DCg0ArKJSzHIFAAUu3DEeEAE%2526urlfix%253D1%2526adurl%253Dhttps:\/\/leadgen-cbslnk.cnet.com\/redir?edition=en&amp;ursuid=&amp;devicetype=desktop&amp;pagetype=&amp;assettitle=&amp;assettype=&amp;topicguid=&amp;viewguid=5fee98c2-3d19-466d-8f7f-90a0e3d97745&amp;docid=33167395&amp;promo=1064&amp;ftag_cd=TRE-00-10aaa4e&amp;spotname=dfp-in-article&amp;destUrl=https%253A%252F%252Fwww.techrepublic.com%252Fresource-library%252Fwhitepapers%252Fnetscout-visibility-without-borders%252F%253Fpromo%253D1064%2526ftag%253DTRE-00-10aaa4e%2526cval%253Ddfp-in-article&amp;ctag=medc-dfp-in-article&amp;siteId=&amp;rsid=cbsitechrepublicsite&amp;sl=&amp;sc=us&amp;assetguid=&amp;q=&amp;cval=33167395;1064&amp;ttag=&amp;bhid=\" target=\"_blank\" rel=\"noopener noreferrer\"><img src=\"https:\/\/creatives.techrepublic.com\/images\/doctype\/whitePapers_125x100.jpg\" \/><\/a><\/p>\n<div class=\"ellipsis-title\">\n<div>\n<p><a href=\"https:\/\/adclick.g.doubleclick.net\/pcs\/click%253Fxai%253DAKAOjstKaXhtSR1gWnOQ91Fm-Y6IX8KD4Sph2ja-IlopYTFTSLOgWZLqVtHow44gWVACMRaJQVFVOgSgSiifYTT3P7eXF1quJjbmhHYKamHB-YPIx-GYDYSSo2b3xiXcFVyF2u46UClpa3Hy8AyR20_GMJz4p-waZEayJzZhzfi5IvCpZjPXcYIZaP-ntd6ytB5eowRXJX47_-iSvvPGMLSgUfltl2pUlBa6gkd5SClUVj5fJEpwvAofJcWIt7WIjvUWoLFjNLFnzT52Wl9Ax-AnyOdg%2526sig%253DCg0ArKJSzHIFAAUu3DEeEAE%2526urlfix%253D1%2526adurl%253Dhttps:\/\/leadgen-cbslnk.cnet.com\/redir?edition=en&amp;ursuid=&amp;devicetype=desktop&amp;pagetype=&amp;assettitle=&amp;assettype=&amp;topicguid=&amp;viewguid=5fee98c2-3d19-466d-8f7f-90a0e3d97745&amp;docid=33167395&amp;promo=1064&amp;ftag_cd=TRE-00-10aaa4e&amp;spotname=dfp-in-article&amp;destUrl=https%253A%252F%252Fwww.techrepublic.com%252Fresource-library%252Fwhitepapers%252Fnetscout-visibility-without-borders%252F%253Fpromo%253D1064%2526ftag%253DTRE-00-10aaa4e%2526cval%253Ddfp-in-article&amp;ctag=medc-dfp-in-article&amp;siteId=&amp;rsid=cbsitechrepublicsite&amp;sl=&amp;sc=us&amp;assetguid=&amp;q=&amp;cval=33167395;1064&amp;ttag=&amp;bhid=\" target=\"_blank\" rel=\"noopener noreferrer\">NETSCOUT &#8211; Visibility Without Borders<\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"ellipsis-desc\">\n<div>\n<p>Leveraging the most pervasive visibility on the market, NETSCOUT delivers consistent detection, prevention and analytic for security assurance. Youll see across any network, any data center, any Cloud, 5G and more thats VISIBILITY WITHOUT BORDERS.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"providedBy\" align=\"left\"><a class=\"provided\" href=\"https:\/\/www.techrepublic.com\/resource-library\/content-type\/research\/\" target=\"_blank\" rel=\"noopener noreferrer\">Research<\/a>\u00a0provided by\u00a0<a class=\"provided\" href=\"https:\/\/www.techrepublic.com\/resource-library\/company\/netscout-systems\/\" target=\"_blank\" rel=\"noopener noreferrer\">NETSCOUT<\/a><\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<p>Email account takeover and lateral phishing attacks are effective: More than 11% of attacked studied in the report successfully compromised additional employee accounts. And more than 42% of such attacks do not appear to have been reported to the organization&#8217;s IT or security team.<\/p>\n<p>Once a corporate email account has been compromised, 55% of attackers target victims with a personal or work relationship to the person whose account was hijacked. The majority (63%) of lateral phishing attacks used generic messages, such as those discussing an &#8220;account error&#8221; or &#8220;shared document.&#8221; But, 37% of attackers tailored their message content to be more specific to the particular organization or victim, the report found.<\/p>\n<h2><strong>How to prevent lateral phishing attacks<\/strong><\/h2>\n<p>Organizations and employees can do the following to protect against lateral phishing attacks, according to the report:<\/p>\n<p><strong>1. Security awareness training<\/strong><\/p>\n<p>Ongoing, updated\u00a0<a href=\"https:\/\/www.techrepublic.com\/article\/3-ways-to-kick-start-your-organizations-cybersecurity-training\/\">security training<\/a>\u00a0is now a necessity for every organization. This training should include lessons on how to identify email takeover attacks and lateral phishing attacks, including carefully checking the URL and destination of any link in an email before clicking.<\/p>\n<p><strong>2. Advanced detection techniques<\/strong><\/p>\n<p>Lateral phishing attacks can be difficult to detect since they originate from a legitimate corporate email account. Advanced detection techniques and services that leverage artificial intelligence (AI) and machine learning to automatically identify phishing emails can potentially help.<\/p>\n<p><strong>3. Two-factor authentication<\/strong><\/p>\n<p><a href=\"https:\/\/www.techrepublic.com\/article\/two-factor-authentication-cheat-sheet\/\">Two-factor authentication<\/a>\u00a0(also known as multi-factor authentication) is a key security step to mitigate risks of lateral phishing and other attacks. You can use an app or hardware-based token to limit an attacker&#8217;s access to accounts.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Email takeover and lateral phishing attacks are a growing threat to enterprises, according to a Barracuda report. Businesses beware: Hackers are increasingly using email account takeover attacks to leverage legitimate accounts and send phishing emails to employees, clients, and other partners, according to Barracuda&#8217;s\u00a0Spear Phishing: Top Threats and Trends Vol. 2\u00a0report, released Thursday. In email account takeover attacks, hackers gain entry to a business account and send lateral phishing emails. Because these emails come from a legitimate account, they are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[37],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to prevent email account takeover attacks: 3 tips - Office Supplies El Mirage, AZ<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent email account takeover attacks: 3 tips - Office Supplies El Mirage, AZ\" \/>\n<meta property=\"og:description\" content=\"Email takeover and lateral phishing attacks are a growing threat to enterprises, according to a Barracuda report. Businesses beware: Hackers are increasingly using email account takeover attacks to leverage legitimate accounts and send phishing emails to employees, clients, and other partners, according to Barracuda&#8217;s\u00a0Spear Phishing: Top Threats and Trends Vol. 2\u00a0report, released Thursday. In email account takeover attacks, hackers gain entry to a business account and send lateral phishing emails. Because these emails come from a legitimate account, they are [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"Office Supplies El Mirage, AZ\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-21T17:11:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-14T07:26:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-content\/uploads\/2019\/08\/Phone_Virus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"514\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#website\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/\",\"name\":\"Office Supplies El Mirage, AZ\",\"description\":\"Swift Office Solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-content\/uploads\/2019\/08\/Phone_Virus.jpg\",\"width\":770,\"height\":514,\"caption\":\"Spam or virus notification email alerted on mobile phone screen - cyberattack concept\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/#webpage\",\"url\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/\",\"name\":\"How to prevent email account takeover attacks: 3 tips - Office Supplies El Mirage, AZ\",\"isPartOf\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/#primaryimage\"},\"datePublished\":\"2019-08-21T17:11:13+00:00\",\"dateModified\":\"2020-08-14T07:26:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#\/schema\/person\/2b8c21fb4c500b5ab95fadf0dfe571a6\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/prevent-email-account-takeover-attacks-3-tips\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#\/schema\/person\/2b8c21fb4c500b5ab95fadf0dfe571a6\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/#personlogo\",\"inLanguage\":\"en\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cdea6f44468c828871ef784c3a8ce0f6?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1597"}],"collection":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/comments?post=1597"}],"version-history":[{"count":2,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1597\/revisions"}],"predecessor-version":[{"id":2579,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/posts\/1597\/revisions\/2579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/media\/2578"}],"wp:attachment":[{"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/media?parent=1597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/categories?post=1597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.officesuppliesphoenix.com\/office-supplies-el-mirage\/wp-json\/wp\/v2\/tags?post=1597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}