{"id":57683,"date":"2020-11-18T16:21:59","date_gmt":"2020-11-18T21:21:59","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=57683"},"modified":"2024-01-23T14:16:53","modified_gmt":"2024-01-23T19:16:53","slug":"internet-privacy-articles","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/","title":{"rendered":"6 Internet Privacy Articles You Should Bookmark"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-1024x538.png\" alt=\"An elderly couple reads Internet privacy articles.\" class=\"wp-image-57685 skip_lazy\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-1024x538.png 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-300x158.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-768x403.png 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-560x294.png 560w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><div class='tm-tweet-clear'><\/div><div class='tm-click-to-tweet'><div class='tm-ctt-text'><a href='https:\/\/twitter.com\/share?text=Who+controls+your+content+and+distribution%3F++The+answer+must+always+be+You.&#038;via=inmotionhosting&#038;related=inmotionhosting&#038;url=https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/' target='_blank'>Who controls your content and distribution?  The answer must always be You.<\/a><\/div><a href='https:\/\/twitter.com\/share?text=Who+controls+your+content+and+distribution%3F++The+answer+must+always+be+You.&#038;via=inmotionhosting&#038;related=inmotionhosting&#038;url=https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/' target='_blank' class='tm-ctt-btn'>Click To Tweet<\/a><div class='tm-ctt-tip'><\/div><\/div><\/p>\n\n\n\n<p>\nThese days it&#8217;s becoming increasingly difficult to know if you can\ntrust big tech with your data and content.  Say the wrong thing, upset\na random employee at Google or Twitter and it&#8217;s &#8220;Bye Bye&#8221; for you and\nall the content you created on that platform.  It&#8217;s almost impossible\nto make critical business decisions with that level of uncertainty.\n<\/p>\n\n<p>\nThat&#8217;s why it&#8217;s important to not only <a href=\"https:\/\/www.inmotionhosting.com\/blog\/wordpress-seo\/#defensible-traffic\">diversify your traffic<\/a> with your\nown email list and website, but also to think long term, &#8220;Can I always\nget in touch with my audience?  Who controls my content and\ndistribution?&#8221;  The answers must always be &#8220;Yes,&#8221; and &#8220;Only you.&#8221;\n<\/p>\n\n<p>\nAt InMotion Hosting, we take a circumspect approach to Internet\nPrivacy.  It&#8217;s not only about protecting your online accounts while\nyou surf the web, but about having your own domain, website, email,\nand basically staking your own claim to a piece of the Internet where\nyou are in charge.\n<\/p>\n\n<div id=\"text-table-of-contents\">\n<ul>\n<li><a href=\"#org2325c9c\">Our favorite Internet privacy articles (so far)\u2026<\/a>\n<ul>\n<li><a href=\"#orgccee3a9\">Private Video Conferencing With Jitsi Meet<\/a><\/li>\n<li><a href=\"#org72353e9\">Installing a Free SSL with Redirect Via Certbot<\/a><\/li>\n<li><a href=\"#org9496ea0\">Secure File Transfer with SFTP and SCP<\/a><\/li>\n<li><a href=\"#org8d3481b\">Cloud Privacy Review<\/a><\/li>\n<li><a href=\"#org73bafde\">How To Create a Secure Passphrases<\/a><\/li>\n<li><a href=\"#orgb6fdef9\">Cybersecurity Tools<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n\n<div id=\"outline-container-org2325c9c\" class=\"outline-2\">\n<h2 id=\"org2325c9c\"><a id=\"ID-daf4914b-051d-4909-81ac-f2cbe547a974\"><\/a>A List of Our Favorite Internet Privacy Articles<\/h2>\n<div class=\"outline-text-2\" id=\"text-org2325c9c\">\n<p>\nTo that end, you have before you a list of some of our favorite\nInternet privacy articles to bookmark and save for later.  At some\npoint or another, you are sure to find one or several of these\nlife-saver guides necessary.\n<\/p>\n<\/div>\n\n<div id=\"outline-container-orgccee3a9\" class=\"outline-3\">\n<h3 id=\"orgccee3a9\"><a id=\"ID-c322d7db-e039-4f7c-aade-740ddae31555\"><\/a>Private Video Conferencing With Jitsi Meet<\/h3>\n<div class=\"outline-text-3\" id=\"text-orgccee3a9\">\n<p>\nAs the pandemic roared to life some time last year, no one knew how\nsignificant video conferencing would become.  For the whole year of\n2020, thousands of video conferences set off with active visitors\nfrom around the world.\n<\/p>\n\n<p>\nAnd with that increased attention, concerns about the privacy of video\nconference calls bloomed in many peoples&#8217; minds.  \n<\/p>\n\n<ul class=\"org-ul\">\n<li>Were the conferences recorded?<\/li>\n<li>If so, who has the file, and what are they doing with it?<\/li>\n<li>Are the conversations logged or scanned?<\/li>\n<li>Where is the data from these conferences stored?<\/li>\n<li>Is any of my private data available when I turn on my camera or\nmicrophone?<\/li>\n<\/ul>\n\n<p>\nAll good questions, all arousing a measure of concern.  With the open\nsource <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/live-broadcasting\/install-jitsi-meet-ubuntu-server\/\">Jitsi Meet<\/a> software, you don&#8217;t have to wonder what&#8217;s happening\nwith your data because you can run it on your own private server.\n<\/p>\n\n<p>\nWith Jitsi Meet, you can host video conferences, chat, and open voice\ncalls, all for free. You can also disable logging and recording\ncapabilities for increased privacy.\n<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-org72353e9\" class=\"outline-3\">\n<h3 id=\"org72353e9\"><a id=\"ID-78fe0e43-8028-4b64-9b68-8925a032ea86\"><\/a>Installing a Free SSL with Redirect Via Certbot<\/h3>\n<div class=\"outline-text-3\" id=\"text-org72353e9\">\n<p>\nIn the old days, installing an SSL was so much of a pain that in most\ncases it required some helpful intervention from your host.  Actually,\nif you were on shared hosting, it was <i>required<\/i> that you contact your\nhost for proper setup in most cases.\n<\/p>\n\n<p>\nNow, it&#8217;s never been easier to set up an SSL.  InMotion Hosting offers\na free certified SSL with your account.  You only need to turn it on\nand add a redirect.\n<\/p>\n\n<p>\nBut it gets even easier if you&#8217;re unmanaged hosting, and if you know a\nlittle command line.\n<\/p>\n\n<p>\nOur full guide on <a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/lets-encrypt-ssl-ubuntu-with-certbot\/\">how to install a Let&#8217;s Encrypt SSL with Certbot<\/a> in\nthe Ubuntu operating system demonstrates just how easy it is.  With a\nfew commands you have a brand new SSL that updates automatically.  The\nbest part is, optionally, Certbot can install the <i>https<\/i> redirect for\nyou.  So all your traffic to the domain will be automatically\nredirected to the secure protocol.\n<\/p>\n\n<p>\nSetting up a redirect for yourself is not difficult, but it&#8217;s nice\nthat Certbot can do it automatically. \n<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-org9496ea0\" class=\"outline-3\">\n<h3 id=\"org9496ea0\"><a id=\"ID-2be91756-57b6-4f16-a0b9-10284634472c\"><\/a>Secure File Transfer with SFTP and SCP<\/h3>\n<div class=\"outline-text-3\" id=\"text-org9496ea0\">\n<p>\nPrivate document storage in the public cloud (Google, Dropbox, AWS,\netc.)  may seem super secure and easy, but think about how much\nprivacy you sacrifice for that convenience.\n<\/p>\n\n<p>\nIt&#8217;s quite likely that those services do not scan or log your\ndocuments, but do you know for sure?\n<\/p>\n\n<p>\nWhen it comes to maximizing your Internet privacy, it&#8217;s best to always\nassume that the only secure documents are the ones in your possession.\n<\/p>\n\n<p>\nAll of our private unmanaged hosting accounts are located in the\ncloud, but a <i>private cloud<\/i>.  So your documents have all the\nhigh-availability and redundancy that comes with cloud infrastructure,\nbut none of the security pitfalls of the public cloud.\n<\/p>\n\n<p>\nOur full guides on <a href=\"https:\/\/www.inmotionhosting.com\/support\/product-guides\/cloud-server\/ssh-security-sftp-ubuntu-cloud-server\/\">SSH, SFTP,<\/a> and <a href=\"https:\/\/www.inmotionhosting.com\/support\/server\/ssh\/how-to-use-scp-for-secure-file-transfer\/\">SCP<\/a> teach you how to manage your\naccount access with public\/private key cryptography and take advantage\nof secure file transfer.\n<\/p>\n\n\n<p class=\"alert alert-danger\">Why trust your documents to the public cloud\nif you don&#8217;t have to?  Your own <a href=\"https:\/\/www.inmotionhosting.com\/cloud-vps\">cloud VPS<\/a> \nonly costs a few bucks a month.<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-org8d3481b\" class=\"outline-3\">\n<h3 id=\"org8d3481b\"><a id=\"ID-ec9f3799-56cf-4b4f-af8f-e5690941c984\"><\/a>Cloud Privacy Review<\/h3>\n<div class=\"outline-text-3\" id=\"text-org8d3481b\">\n<p>\nWondering, &#8220;What&#8217;s the difference with these public and private\nclouds?&#8221;  Read our <a href=\"https:\/\/www.inmotionhosting.com\/support\/product-guides\/private-cloud\/what-is-cloud-privacy\/\">introductory guide on what cloud privacy means<\/a> and\nwhy it matters.\n<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-org73bafde\" class=\"outline-3\">\n<h3 id=\"org73bafde\"><a id=\"ID-57d643b9-8503-4b69-abc0-905c85b08d64\"><\/a>How To Create a Secure Passphrases<\/h3>\n<div class=\"outline-text-3\" id=\"text-org73bafde\">\n<p>\nAs you may have read above, managing SSH keys requires that you create\nstrong passphrases.  Passphrases are generally considered stronger and\nmore elaborate than everyday passwords you use to secure your online\naccounts.\n<\/p>\n\n<p>\nThis is why passphrases are often used for maximum security like SSH\nkeys, file encryption, and for locking password managers that hold\nother passwords.\n<\/p>\n\n<p>\nOne way or another, you&#8217;ll encounter situations in which you need to\ncreate a strong passphrase.  When that day comes, make sure you&#8217;ve\nbookmarked our full guide on <a href=\"https:\/\/www.inmotionhosting.com\/support\/server\/ssh\/how-to-create-a-strong-passphrase-for-ssh\/\">how to create strong passphrases<\/a>.\n<\/p>\n<\/div>\n<\/div>\n\n<div id=\"outline-container-orgb6fdef9\" class=\"outline-3\">\n<h3 id=\"orgb6fdef9\"><a id=\"ID-ad52ac5c-7202-441d-a419-bf58a1f46e72\"><\/a>Cybersecurity Tools<\/h3>\n<div class=\"outline-text-3\" id=\"text-orgb6fdef9\">\n<p>\nThroughout this article, I&#8217;ve insisted that you should have your own\nunmanaged VPS account.  Why?\n<\/p>\n\n<ul class=\"org-ul\">\n<li>VPS provides maximum privacy and security<\/li>\n<li>They&#8217;re cheap, starting at a few bucks a month<\/li>\n<li>They help you master the command line<\/li>\n<\/ul>\n\n\n<p> \n If you&#8217;re not comfortable on command line, there are many hosting control panels like\n <a target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.cpanel.net\/\">cPanel<\/a>, \n<a target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.plesk.com\/\">Plesk<\/a>, and others, that can help you manage the server.  If\n you&#8217;re interested in installing one of these, our managed hosting team\n can help you get it done on request.\n<\/p>\n\n<p>\nOtherwise, the VPS is the perfect opportunity for the power user to\ntake back the Internet for themselves.\n<\/p>\n\n<p>\nIf you decide to take on server management for yourself, you will\nlearn a lot very fast, but you take on the burden of securing the\nserver yourself.\n<\/p>\n\n<p>\nBy default, the level of SSH security out of the box is already\nconfigured in a good way.  By disabling password authentication and\nforcing SSH key login, you are already off to a good start.  But down\nthe road, you will want to investigate what other cybersecurity tools\nexist out there.  For that, you should check out our article of\n<a href=\"https:\/\/www.inmotionhosting.com\/blog\/8-free-cybersecurity-tools-to-secure-your-server\/\">free cybersecurity tools<\/a>.\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Who controls your content and distribution? The answer must always be You. Click To Tweet These days it&#8217;s becoming increasingly difficult to know if you can trust big tech with your data and content. Say the wrong thing, upset a random employee at Google or Twitter and it&#8217;s &#8220;Bye Bye&#8221; for you and all the<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/\"> Read More ><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[371],"tags":[],"class_list":["post-57683","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Internet Privacy Articles You Should Bookmark<\/title>\n<meta name=\"description\" content=\"We&#039;e collected a handful of some of our favorite Internet privacy articles to give you some new reading material. Take back a piece of the Internet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Internet Privacy Articles You Should Bookmark\" \/>\n<meta property=\"og:description\" content=\"We&#039;e collected a handful of some of our favorite Internet privacy articles to give you some new reading material. Take back a piece of the Internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-18T21:21:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-23T19:16:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-1024x538.png\" \/>\n<meta name=\"author\" content=\"InMotion Hosting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Internet Privacy Articles You Should Bookmark","description":"We'e collected a handful of some of our favorite Internet privacy articles to give you some new reading material. Take back a piece of the Internet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/","og_locale":"en_US","og_type":"article","og_title":"6 Internet Privacy Articles You Should Bookmark","og_description":"We'e collected a handful of some of our favorite Internet privacy articles to give you some new reading material. Take back a piece of the Internet.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2020-11-18T21:21:59+00:00","article_modified_time":"2024-01-23T19:16:53+00:00","og_image":[{"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-1024x538.png","type":"","width":"","height":""}],"author":"InMotion Hosting","twitter_card":"summary_large_image","twitter_creator":"@inmotionhosting","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"InMotion Hosting","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/"},"author":{"name":"InMotion Hosting","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc"},"headline":"6 Internet Privacy Articles You Should Bookmark","datePublished":"2020-11-18T21:21:59+00:00","dateModified":"2024-01-23T19:16:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/"},"wordCount":1124,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-1024x538.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/","url":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/","name":"6 Internet Privacy Articles You Should Bookmark","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2-1024x538.png","datePublished":"2020-11-18T21:21:59+00:00","dateModified":"2024-01-23T19:16:53+00:00","description":"We'e collected a handful of some of our favorite Internet privacy articles to give you some new reading material. Take back a piece of the Internet.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2.png","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/11\/Internet_Privacy_Articles_2.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/internet-privacy-articles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},{"@type":"ListItem","position":3,"name":"6 Internet Privacy Articles You Should Bookmark"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc","name":"InMotion Hosting","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","caption":"InMotion Hosting"},"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/imhmainadmin\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":371,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/57683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=57683"}],"version-history":[{"count":12,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/57683\/revisions"}],"predecessor-version":[{"id":72943,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/57683\/revisions\/72943"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=57683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=57683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=57683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}