{"id":14669,"date":"2019-07-31T13:03:02","date_gmt":"2019-07-31T18:03:02","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=14669"},"modified":"2025-12-19T15:55:42","modified_gmt":"2025-12-19T20:55:42","slug":"data-breach-configuration-is-key","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/","title":{"rendered":"Data Breach Reminds: Configuration Is Key"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14669\" class=\"elementor elementor-14669\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-410468b1 e-flex e-con-boxed e-con e-parent\" data-id=\"410468b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c1acf14 elementor-widget elementor-widget-text-editor\" data-id=\"6c1acf14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>An Unfortunate Reminder<\/h3><p>If we&#8217;ve <a href=\"https:\/\/www.firewalls.com\/blog\/configuration-conundrum\/\" target=\"_blank\" rel=\"noopener noreferrer\">said it once<\/a>, we&#8217;ve <a href=\"https:\/\/youtu.be\/_SHNidfPMVI\" target=\"_blank\" rel=\"noopener noreferrer\">said it 1,000 times<\/a> &#8211; and we&#8217;ll keep saying it: the right configuration is key for your network to be fully secure. We had another reminder this week, with news of a data breach affecting Capital One in which a hacker gained access to more than 100 million credit card applications and accounts, in what CNN calls, <a href=\"https:\/\/www.cnn.com\/2019\/07\/29\/business\/capital-one-data-breach\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">one of the biggest data breaches ever<\/a>. Capital One had security measures in place, but the breach still occurred. So how did the hacker get through? A misconfigured web application firewall.<\/p><h3>Misconfiguration Opens the Door<\/h3><p>More specifically, <a href=\"https:\/\/www.justice.gov\/usao-wdwa\/press-release\/file\/1188626\/download\" target=\"_blank\" rel=\"noopener noreferrer\">according to the criminal complaint filed by the U.S. Department of Justice<\/a>, &#8220;a firewall misconfiguration permitted commands to reach and be executed by [a specific] server, which enabled access to folders or buckets of data in Capital One&#8217;s storage space at the Cloud Computing Company.&#8221; Unfortunately, this is all too common.\u00a0According to Gartner, <strong><a href=\"https:\/\/www.gartner.com\/doc\/3215918?ref=SiteSearch&amp;sthkw=One%20Brand%20of%20Firewall%20is%20a%20Best%20Practice%20for%20Most%20Enterprises&amp;fnl=search&amp;srcId=1-3478922254\" target=\"_blank\" rel=\"noopener noreferrer\">99% of successful network breaches can be attributed to a misconfiguration<\/a><\/strong> of the firewall.<\/p><p>The DOJ complaint alleges the hacker gained access multiple times over a few months. It wasn&#8217;t until Capital One received an anonymous tip that the company became aware of the data breach. That means the stolen personal information &#8211; which included approximately 120,000 social security numbers, more than 75,000 bank account numbers, and millions of names, addresses, and birth dates &#8211; was available to the highest bidder for quite some time.<\/p><p>Not only was the firewall misconfigured, the theft was not quickly detected. Those are two expensive issues you don&#8217;t want your network to have. Capital One expects to spend $100 to $150 million in costs related to this data breach.<\/p><h3>How Can I Prevent a Breach?<\/h3><p>So how do you prevent the same thing from happening to you? Get a <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">professional configuration<\/a> with ongoing management of your network. Our network engineers provide personalized solutions based on your unique needs, ensuring optimized performance and security. Once your configuration is complete, they offer <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener noreferrer\">managed security services<\/a> that take the burden of everyday monitoring, patching vulnerabilities, threat detection, and more away, allowing you to rest assured that the security of your valuable data is in the hands of top-notch, certified professionals. And anytime you have a question, they&#8217;ll be there at our Security Operations Center to help.<\/p><p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/05\/AdvancedConfigurationServices-Update.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">LEARN MORE ABOUT OUR PROFESSIONAL CONFIGURATIONS<\/span><\/a><\/p><p>If you want to take a crack at a configuration on your own, we can help with that, too.\u00a0Our configuration checklist takes you on a deep dive through the complexities of the configuration process and helps you keep your settings, rules, and hierarchies organized. Did we mention it&#8217;s FREE to download?<\/p><p><a href=\"http:\/\/firewalls.com\/pub\/media\/wysiwyg\/datasheets\/FirewallConfigurationQuickStartChecklist.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"btn btn-primary\">Get the Configuration QuickStart Checklist<\/button><\/a><\/p><p>*If you&#8217;re a Capital One customer and think you may be affected by the data breach, <a href=\"https:\/\/www.linkedin.com\/feed\/news\/what-to-do-about-capital-one-5040418\/\" target=\"_blank\" rel=\"noopener noreferrer\">here are some steps you can take<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access.<\/p>\n","protected":false},"author":5,"featured_media":14671,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-14669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Breach Reminds: Configuration Is Key - Firewalls.com<\/title>\n<meta name=\"description\" content=\"The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access. The right configuration is key for network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breach Reminds: Configuration Is Key - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access. The right configuration is key for network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-31T18:03:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T20:55:42+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/07\/Depositphotos_34779897_xl-2015-1024x819.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"819\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Data Breach Reminds: Configuration Is Key\",\"datePublished\":\"2019-07-31T18:03:02+00:00\",\"dateModified\":\"2025-12-19T20:55:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/\"},\"wordCount\":481,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Depositphotos_34779897_xl-2015.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/\",\"name\":\"Data Breach Reminds: Configuration Is Key - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Depositphotos_34779897_xl-2015.jpg\",\"datePublished\":\"2019-07-31T18:03:02+00:00\",\"dateModified\":\"2025-12-19T20:55:42+00:00\",\"description\":\"The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access. The right configuration is key for network security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Depositphotos_34779897_xl-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Depositphotos_34779897_xl-2015.jpg\",\"width\":7000,\"height\":5600,\"caption\":\"Concept of security breach, one unlocked pad lock in red\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/data-breach-configuration-is-key\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breach Reminds: Configuration Is Key\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Breach Reminds: Configuration Is Key - Firewalls.com","description":"The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access. The right configuration is key for network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/","og_locale":"en_US","og_type":"article","og_title":"Data Breach Reminds: Configuration Is Key - Firewalls.com","og_description":"The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access. The right configuration is key for network security.","og_url":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2019-07-31T18:03:02+00:00","article_modified_time":"2025-12-19T20:55:42+00:00","og_image":[{"width":1024,"height":819,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/07\/Depositphotos_34779897_xl-2015-1024x819.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Data Breach Reminds: Configuration Is Key","datePublished":"2019-07-31T18:03:02+00:00","dateModified":"2025-12-19T20:55:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/"},"wordCount":481,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/07\/Depositphotos_34779897_xl-2015.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/","url":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/","name":"Data Breach Reminds: Configuration Is Key - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/07\/Depositphotos_34779897_xl-2015.jpg","datePublished":"2019-07-31T18:03:02+00:00","dateModified":"2025-12-19T20:55:42+00:00","description":"The data breach affecting Capital One is a costly reminder that strong security measures are not the only piece of the data protection puzzle. A misconfigured firewall was the reported door that the perpetrator used to gain access. The right configuration is key for network security.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/07\/Depositphotos_34779897_xl-2015.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/07\/Depositphotos_34779897_xl-2015.jpg","width":7000,"height":5600,"caption":"Concept of security breach, one unlocked pad lock in red"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/data-breach-configuration-is-key\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Breach Reminds: Configuration Is Key"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=14669"}],"version-history":[{"count":17,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14669\/revisions"}],"predecessor-version":[{"id":27530,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14669\/revisions\/27530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/14671"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=14669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=14669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=14669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}