{"id":5200,"date":"2021-01-25T13:00:00","date_gmt":"2021-01-25T18:00:00","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=5200"},"modified":"2024-01-23T14:13:42","modified_gmt":"2024-01-23T19:13:42","slug":"how-to-prevent-hacking-on-social-media","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/","title":{"rendered":"How to Prevent Hacking on Social Media"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image-1024x538.png\" alt=\"\" class=\"wp-image-70909 skip_lazy\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image-1024x538.png 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image-300x158.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image-768x403.png 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>With so many people using social media these days, it has become a major target for hackers and cybercriminals. Some of the reasons they want to compromise your account include reselling it on the dark web, collecting your private data, or sending spam to your followers.<\/p>\n\n\n\n<p>If you\u2019re one of the billions of people with a <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Facebook<\/a>, <a href=\"https:\/\/twitter.com\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Twitter<\/a>, <a href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">LinkedIn<\/a>, <a href=\"https:\/\/www.instagram.com\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Instagram<\/a>, or other social network, here\u2019s how to prevent hacking on social media accounts.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#password\" class=\"rank-math-link\">Use a Strong Password<\/a><\/li>\n\n\n\n<li><a href=\"#password-protection\" class=\"rank-math-link\">Keep your Password Protected<\/a><\/li>\n\n\n\n<li><a href=\"#unique-passwords\" class=\"rank-math-link\">Don\u2019t Reuse Passwords<\/a><\/li>\n\n\n\n<li><a href=\"#2fa\" class=\"rank-math-link\">Enable Two-Factor Authentication (2FA)<\/a><\/li>\n\n\n\n<li><a href=\"#emails\" class=\"rank-math-link\">Beware Phishing Emails<\/a><\/li>\n\n\n\n<li><a href=\"#apps\" class=\"rank-math-link\">Be Cautious With 3rd Party Apps<\/a><\/li>\n<\/ul>\n\n\n<div class=\"jumbotron\" style=\"text-align:center;\">\r\n<p style=\"font-size: 20px;\"><strong>Scalable VPS Infrastructure, Fully Managed<\/strong><\/p>\r\n<p>When shared hosting can't handle your traffic, VPS delivers dedicated resources that scale with demand. Our team manages the technical complexity while you manage your business.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/design.inmotionhosting.com\/assets\/icons\/standard\/check-blue.svg\" alt=\"check mark\" width=\"24\" height=\"24\" \/>NVMe Storage &nbsp;&nbsp; <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/design.inmotionhosting.com\/assets\/icons\/standard\/check-blue.svg\" alt=\"check mark\" width=\"24\" height=\"24\" \/>High-Availability &nbsp;&nbsp; <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/design.inmotionhosting.com\/assets\/icons\/standard\/check-blue.svg\" alt=\"check mark\" width=\"24\" height=\"24\" \/>Ironclad Security &nbsp;&nbsp; <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/design.inmotionhosting.com\/assets\/icons\/standard\/check-blue.svg\" alt=\"check mark\" width=\"24\" height=\"24\" \/>Premium Support<\/p>\r\n<p><a class=\"btn btn-primary btn-lg\" href=\"https:\/\/www.inmotionhosting.com\/vps-hosting?mktgp=t&irgwc=1&affiliates=5001860&utm_campaign=Jumbotron&utm_source=blog&utm_medium=cta&utm_term=vps-cta2\">VPS Hosting<\/a><\/p>\r\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"password\">Use a Strong Password<\/h2>\n\n\n\n<p>First off, let\u2019s talk about password strength. If your password is something simple that can be guessed easily, then believe us when we say that you will be hacked. No more passwords like \u201c123456\u201d, \u201cpassword123\u201d, or your kid\u2019s or dog\u2019s name.<\/p>\n\n\n\n<p>Instead, your password shouldn\u2019t be a word at all\u2014it should be a minimum of eight random characters that are a mixture of uppercase letters, lowercase letters, numbers, and special characters. There should be no pattern to this and it needs to be completely random. For more information, see our full guide on <a href=\"https:\/\/www.inmotionhosting.com\/support\/security\/password-strength\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Password Strength and Security<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"password-protection\">Keep Your Password Protected<\/h2>\n\n\n\n<p>If you are worried about remembering complex passwords, a password manager such as <a href=\"https:\/\/keepass.info\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">KeePass<\/a> or <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">LastPass<\/a> can help keep your complex passwords organized for you. You might be amazed just how many people still keep their passwords listed in plain-text files on their computer or on their office desk using Post-It notes. If you do this, then you are opening yourself up for people to steal access to your accounts.<\/p>\n\n\n\n<p>Also, be careful about sharing certain information on social media. We have recently seen \u201ccute\u201d polls or threads that encourage you to share something like a memory of the street you grew up on or your first pet. These are often the same as your security questions for your password to be reset. If you share this information online, someone may be able to steal the info and use it to change your password and hack your account.<\/p>\n\n\n\n<p>If you need to share your password with someone, we recommend using a tool such as <a href=\"https:\/\/www.inmotionhosting.com\/support\/security\/how-to-encrypt-passwords-with-passencrypt\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">PassEncrypt<\/a>. This allows you to securely transfer sensitive text information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"unique-passwords\">Don\u2019t Reuse Passwords<\/h2>\n\n\n\n<p>When you are creating a new account on a retailer\u2019s website, do you use the same password as your Facebook or email account? It doesn\u2019t matter where you\u2019re creating the account or which password you are reusing, the issue is that you are reusing a password. This is very dangerous.<\/p>\n\n\n\n<p>If that password was compromised on one site, it could affect any other accounts that you have used that password for. Every online account that you created should have a different password.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2fa\">Enable Two-Factor Authentication (2FA)<\/h2>\n\n\n\n<p>Another way to protect your account is with <strong>two-factor authentication<\/strong> (2FA). This requires an extra step in the sign-in process to verify that you are the user. A typical two-factor authentication is to have you log in (first authentication) and then send an access code to your smartphone or your email that you have to enter to continue (second authentication).<\/p>\n\n\n\n<p>Even if a hacker can steal your first level of security \u2013 your password \u2013 they typically won\u2019t have access to your text messages to do the second level of security with the security code. This can be added to most social media, including Facebook.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"emails\">Beware Phishing Emails<\/h2>\n\n\n\n<p>A very common method that hackers use to access accounts is through phishing. Phishing is when someone sends a \u201cfake\u201d email pretending to be from a legitimate company in order to trick you into giving them your login credentials.&nbsp;<\/p>\n\n\n\n<p>For example, you may receive an email with a link purporting to be Instagram, when really it is from a fake website instead. Clicking this fake link will take you to a page that is made to look like Instagram, for example, and it will prompt you to log in. When you enter your login information it will record this data.&nbsp;<\/p>\n\n\n\n<p>At this point they have successfully tricked you into giving them your account details. They can then use that to gain access to your account.&nbsp;<\/p>\n\n\n\n<p>To help prevent hacking on social media via phishing, we\u2019ve listed out several steps that we recommend you take before clicking any links or entering any information.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check the sending email address. Sometimes it can display a name over the top of it (like Instagram) but when you click on the name, it will display a full email address that is very clearly fraudulent.<\/li>\n\n\n\n<li>What are you being asked to do in the email? If the message is asking you to login or \u201cverify your account\u201d, you can delete the message and know that it is very likely phishing.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Another type of email that can be an attempted phishing scam, are emails informing you that your account password has been changed or your account is suspended.&nbsp;<\/p>\n\n\n\n<p>Check the address to make sure it is coming from the actual domain such as @instagram.com. If you don\u2019t feel comfortable, you can always go to the social media site and securely change your password.<br>Note: Most social media accounts will send an email after the account was created for verification. They can also send you an email for resetting your password.<\/p>\n\n\n\n<p>For more detailed information, see our full guide on <a href=\"https:\/\/www.inmotionhosting.com\/support\/security\/identifying-phishing-scams\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Avoiding Phishing Scams<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"apps\">Be Cautious With 3rd Party Apps<\/h2>\n\n\n\n<p>Just like you wouldn\u2019t allow a total stranger into your house, you shouldn\u2019t let unknown third-party apps have access to your social media. This can include popular apps by other developers such as social media post schedulers for businesses. Once you give them access to your account, you leave yourself open for them to take advantage of your trust. Especially, if the app has been designed by a hacker or cyber criminal.<\/p>\n\n\n\n<p>The number of people in the United States with a social media account has been steadily climbing over the past decade. Almost everyone has some sort of social media account these days.<\/p>\n\n\n\n<p>With all of that personal information floating around online, it should come as no surprise that hackers and thieves are targeting social media accounts. Not only are social media accounts being targeted, but so are websites. So, be proactive in protecting your information from online phishing attempts.<\/p>\n\n\n\n<p>Now you know how to prevent hacking on social media. Thank you for taking the time to visit our <a href=\"https:\/\/www.inmotionhosting.com\/blog\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">blog<\/a>, check out our <a href=\"https:\/\/www.inmotionhosting.com\/support\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">InMotion Hosting Support Center<\/a> for more <a href=\"https:\/\/www.inmotionhosting.com\/support\/security\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">security-related<\/a> related guides.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With so many people using social media these days, it has become a major target for hackers and cybercriminals. Some of the reasons they want to compromise your account include reselling it on the dark web, collecting your private data, or sending spam to your followers. If you\u2019re one of the billions of people with<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/\"> Read More ><\/a><\/p>\n","protected":false},"author":58,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,254],"tags":[],"class_list":["post-5200","post","type-post","status-publish","format-standard","hentry","category-social-media","category-tips-and-advice"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Prevent Hacking on Social Media<\/title>\n<meta name=\"description\" content=\"If you\u2019re one of the billions of people with a social media network, here\u2019s how to prevent hacking on social media accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent Hacking on Social Media\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re one of the billions of people with a social media network, here\u2019s how to prevent hacking on social media accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-25T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-23T19:13:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2018\/12\/How-to-Prevent-Hacking-on-Social-Media.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent Hacking on Social Media","description":"If you\u2019re one of the billions of people with a social media network, here\u2019s how to prevent hacking on social media accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent Hacking on Social Media","og_description":"If you\u2019re one of the billions of people with a social media network, here\u2019s how to prevent hacking on social media accounts.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2021-01-25T18:00:00+00:00","article_modified_time":"2024-01-23T19:13:42+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2018\/12\/How-to-Prevent-Hacking-on-Social-Media.jpg","type":"image\/jpeg"}],"author":"Guest Contributor","twitter_card":"summary_large_image","twitter_creator":"@inmotionhosting","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"Guest Contributor","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/"},"author":{"name":"Guest Contributor","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/e64b89f590f2a38be647c81bc001b4a9"},"headline":"How to Prevent Hacking on Social Media","datePublished":"2021-01-25T18:00:00+00:00","dateModified":"2024-01-23T19:13:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/"},"wordCount":1117,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image-1024x538.png","articleSection":["Social Media","Tips and Advice"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/","url":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/","name":"How to Prevent Hacking on Social Media","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image-1024x538.png","datePublished":"2021-01-25T18:00:00+00:00","dateModified":"2024-01-23T19:13:42+00:00","description":"If you\u2019re one of the billions of people with a social media network, here\u2019s how to prevent hacking on social media accounts.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image.png","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2023\/06\/How-to-Prevent-Hacking-on-Social-Media-Hero-Image.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/how-to-prevent-hacking-on-social-media\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Social Media","item":"https:\/\/www.inmotionhosting.com\/blog\/social-media\/"},{"@type":"ListItem","position":3,"name":"How to Prevent Hacking on Social Media"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/e64b89f590f2a38be647c81bc001b4a9","name":"Guest Contributor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8fb69e5fd33ee38ba32e6d7a4b30a1e8f6c908ba99da0b96b4afabe53f4dc8ae?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8fb69e5fd33ee38ba32e6d7a4b30a1e8f6c908ba99da0b96b4afabe53f4dc8ae?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8fb69e5fd33ee38ba32e6d7a4b30a1e8f6c908ba99da0b96b4afabe53f4dc8ae?s=96&r=g","caption":"Guest Contributor"},"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/guest-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":8,"name":"Social Media","slug":"social-media","link":"https:\/\/www.inmotionhosting.com\/blog\/social-media\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/5200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=5200"}],"version-history":[{"count":6,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/5200\/revisions"}],"predecessor-version":[{"id":72912,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/5200\/revisions\/72912"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=5200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=5200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=5200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}