{"id":14299,"date":"2019-03-06T13:34:39","date_gmt":"2019-03-06T18:34:39","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=14299"},"modified":"2025-11-12T15:29:05","modified_gmt":"2025-11-12T20:29:05","slug":"firewalls-threat-dictionary","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/","title":{"rendered":"The Firewalls.com Threat Dictionary: Know Your Enemy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14299\" class=\"elementor elementor-14299\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a30b5e e-flex e-con-boxed e-con e-parent\" data-id=\"5a30b5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63d1eb2d elementor-widget elementor-widget-text-editor\" data-id=\"63d1eb2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Meet the Firewalls.com Threat Dictionary<\/h3>\r\nNetwork security education &amp; firewall know-how are essential to our modus operandi here at <a href=\"https:\/\/www.firewalls.com\" target=\"_blank\" rel=\"noopener noreferrer\">Firewalls.com<\/a>. Cyber security doesn\u2019t stop at <a href=\"https:\/\/www.firewalls.com\/category\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">choosing the right appliance<\/a> or <a href=\"https:\/\/www.firewalls.com\/licensing.html\" target=\"_blank\" rel=\"noopener noreferrer\">service subscription<\/a>. Small businesses can benefit greatly from understanding the types of threats they face on a daily basis. Recognizing how breaches happen, where vulnerabilities occur, and how best to prevent them can arm even tech newbies with the knowledge to keep their data secure.\r\n\r\nThat\u2019s why Firewalls.com developed our <a href=\"https:\/\/www.firewalls.com\/blog\/threat-dictionary\/\" target=\"_blank\" rel=\"noopener noreferrer\">new Threat Dictionary<\/a>. Any frequent follower will have noticed the addition of a new tab on our humble blog\u2019s top navigation row. \u00a0Our Threat Dictionary provides digestible overviews of the most common security threats so that firewall admins and small business owners know exactly what they\u2019re dealing with. Plus, we tell you which security solutions are built to address each threat!\r\n\r\n<img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-14300 size-full\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/TD-Img.png\" alt=\"Firewalls Threat Dictionary\" width=\"1066\" height=\"495\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/TD-Img.png 1066w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/TD-Img-300x139.png 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/TD-Img-768x357.png 768w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/TD-Img-1024x475.png 1024w\" sizes=\"(max-width: 1066px) 100vw, 1066px\" \/>\r\n\r\n&nbsp;\r\n\r\nWe cover topics from Advanced Persistent Threats to Zero-Day Exploits, and everything in between. We&#8217;ll continually expand our library of security threats so that you\u2019re always well-informed about the latest perils to your data!\r\n<p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/blog\/threat-dictionary\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px; color: #ffffff;\">View the Firewalls.com Threat Dictionary<\/span><\/a><\/p>\r\n\r\n<h3>Looking for More Network Security Wisdom?<\/h3>\r\nWe\u2019ve got a ton of great content to consume if you\u2019re looking to boost your security savvy.\u00a0 Check out some of the additional resources we\u2019ve whipped up for you below:\r\n<p style=\"padding-left: 60px;\"><strong><span style=\"color: #800000;\"><a style=\"color: #800000;\" href=\"https:\/\/www.firewalls.com\/blog\/firewalls-com-network-security-glossary\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Security Glossary<\/a><\/span>\u00a0<\/strong>&#8211; Learn the lingo of cyber security with our Cyber Security Glossary. Unpack the abbreviations so you can talk tech with the best of &#8217;em.<\/p>\r\n<p style=\"padding-left: 60px;\"><a href=\"https:\/\/www.firewalls.com\/blog\/configuration-checklist\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span style=\"color: #800000;\">Configuration QuickStart Checklist<\/span><\/strong><\/a><strong>\u00a0<\/strong>&#8211; Looking to tackle a configuration yourself? Do-It-Yourselfers and Consultants rejoice, this checklist from Firewalls.com will be there every step of the journey. In-depth setting options assist you in leaving no stone unturned.<\/p>\r\n<p style=\"padding-left: 60px;\"><strong><a href=\"https:\/\/www.firewalls.com\/blog\/firewall-buyers-guides\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #800000;\">Firewall Buyers Guides<\/span><\/a><\/strong>\u00a0&#8211; If you&#8217;re shopping for SonicWall, Sophos, or Fortinet firewalls, but want a bit more info about bundle options or series comparisons, our buyer&#8217;s guides are built for you. Demystify the brand terms and get a clear picture of the products you&#8217;re purchasing.<\/p>\r\n<p style=\"padding-left: 60px;\"><span style=\"color: #800000;\"><strong><a style=\"color: #800000;\" href=\"https:\/\/www.youtube.com\/channel\/UCSrIRjKmlu_X897HdJr0Tlg\" target=\"_blank\" rel=\"noopener noreferrer\">Firewalls.com YouTube Channel<\/a><\/strong><\/span>\u00a0&#8211; We break down the features of some of our best-selling firewalls, provide step-by-step tutorials for solving some of your biggest security puzzles, and give greater depth to some of our blog content. Subscribe for regular updates!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We break down some of the Internet&#8217;s most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, &#038; combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.<\/p>\n","protected":false},"author":5,"featured_media":14301,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-14299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Firewalls.com Threat Dictionary: Know your enemy!<\/title>\n<meta name=\"description\" content=\"We break down some of the Internet&#039;s most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, &amp; combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Firewalls.com Threat Dictionary: Know your enemy!\" \/>\n<meta property=\"og:description\" content=\"We break down some of the Internet&#039;s most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, &amp; combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-06T18:34:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T20:29:05+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4324\" \/>\n\t<meta property=\"og:image:height\" content=\"2466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"The Firewalls.com Threat Dictionary: Know Your Enemy\",\"datePublished\":\"2019-03-06T18:34:39+00:00\",\"dateModified\":\"2025-11-12T20:29:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\"},\"wordCount\":393,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\",\"name\":\"The Firewalls.com Threat Dictionary: Know your enemy!\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg\",\"datePublished\":\"2019-03-06T18:34:39+00:00\",\"dateModified\":\"2025-11-12T20:29:05+00:00\",\"description\":\"We break down some of the Internet's most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, & combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg\",\"width\":4324,\"height\":2466,\"caption\":\"Threat Dictionary\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Firewalls.com Threat Dictionary: Know Your Enemy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Firewalls.com Threat Dictionary: Know your enemy!","description":"We break down some of the Internet's most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, & combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/","og_locale":"en_US","og_type":"article","og_title":"The Firewalls.com Threat Dictionary: Know your enemy!","og_description":"We break down some of the Internet's most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, & combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.","og_url":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2019-03-06T18:34:39+00:00","article_modified_time":"2025-11-12T20:29:05+00:00","og_image":[{"width":4324,"height":2466,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"The Firewalls.com Threat Dictionary: Know Your Enemy","datePublished":"2019-03-06T18:34:39+00:00","dateModified":"2025-11-12T20:29:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/"},"wordCount":393,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/","url":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/","name":"The Firewalls.com Threat Dictionary: Know your enemy!","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg","datePublished":"2019-03-06T18:34:39+00:00","dateModified":"2025-11-12T20:29:05+00:00","description":"We break down some of the Internet's most advanced security threats into easy-to-understand definitions so that you know how to recognize, prevent, & combat threats to your data. Our threat dictionary covered everything from Advanced Persistent Threats to Zero Days.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/03\/Depositphotos_9391095_xl-2015-e1551895397635.jpg","width":4324,"height":2466,"caption":"Threat Dictionary"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/firewalls-threat-dictionary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Firewalls.com Threat Dictionary: Know Your Enemy"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=14299"}],"version-history":[{"count":10,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14299\/revisions"}],"predecessor-version":[{"id":26669,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14299\/revisions\/26669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/14301"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=14299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=14299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=14299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}