{"id":14870,"date":"2019-10-24T10:59:09","date_gmt":"2019-10-24T15:59:09","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=14870"},"modified":"2025-11-12T15:28:03","modified_gmt":"2025-11-12T20:28:03","slug":"bluekeep","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/bluekeep\/","title":{"rendered":"BlueKeep: Recognizing &#038; preventing RDP vulnerabilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14870\" class=\"elementor elementor-14870\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c4df06c e-flex e-con-boxed e-con e-parent\" data-id=\"5c4df06c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8d469a elementor-widget elementor-widget-text-editor\" data-id=\"b8d469a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Firewalls.com is cracking open our case files to take a closer look at one of the net&#8217;s most dangerous suspects: BlueKeep.<\/p><p><strong>Vulnerability Name<\/strong>: BlueKeep<\/p><p><strong>Common Vulnerability &amp; Exposures ID<\/strong>: CVE-2019-0708<\/p><p><strong>Affected Operating Systems:<\/strong><\/p><ul><li>Windows 2000<\/li><li>Windows Vista<\/li><li>Windows XP<\/li><li>Windows 7<\/li><li>Windows Server 2003<\/li><li>Windows Server 2008<\/li><\/ul><p><strong>Type of Vulnerability:<\/strong> <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/rce\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Code Execution<\/a><\/p><p><strong>First Reported:<\/strong> May 2019 by <a href=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">UK National Cyber Security Centre<\/a><\/p><h3>Summary<\/h3><p>BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is a <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/rce\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remote Code Execution (RCE)<\/a>\u00a0attack, meaning the attacker is able to run arbitrary code on targeted devices. BlueKeep is a \u201cwormable\u201d exploit that can act as a foothold for active attackers to leverage and launch further malware attacks. This multi-stage strategy of exploiting a vulnerability to gain access and further utilize breaches as a conduit for more serious attacks is growing in popularity, with big-name self-propagating worms like WannaCryptor and the <a href=\"https:\/\/news.sophos.com\/en-us\/2019\/10\/04\/rolling-back-ryuk-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">more recent Ryuk attacks<\/a> coming to mind.<\/p><p>Window\u2019s Remote Desktop Services, which BlueKeep exploits, is a protocol developed by Microsoft which delivers a graphical interface to users while connected to another computer over a network. Also known as \u201cTerminal Service,\u201d Microsoft has included RDP in every version of Windows since XP in 2001. RDP is used by network administrators to remotely connect to a machine in order to diagnose and resolve problems that users encounter. If you\u2019ve ever allowed tech support to \u201cremote in\u201d to your computer, you may have been utilizing Windows Remote Desktop Services to do so.<\/p><h3><strong>Securing your network against BlueKeep<\/strong><\/h3><p><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/AA19-168A\" target=\"_blank\" rel=\"noopener noreferrer\">A patch for BlueKeep<\/a> was released on May 14th, 2019. Whereas most patches released by Microsoft are compatible only with supported version of Windows operating systems, <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/AA19-168A\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0708<\/a> patches were also made available for Windows OS platforms that are no longer supported. This is a very rare occurrence for Microsoft and a sign of the potential havoc BlueKeep could wreak on unprepared systems.<\/p><p>While BlueKeep was initially thought to have the potential to mirror the cyber crises that spiraled out of the <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0144\" target=\"_blank\" rel=\"noopener noreferrer\">EternalBlue exploits of 2017<\/a>, Microsoft claims to have found no active exploits in the wild utilizing the BlueKeep vulnerability. <a href=\"https:\/\/www.sophos.com\/en-us.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a> created a working proof-of-concept fileless exploit using the vulnerability. Though the code was never released to the public, <a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/07\/01\/rdp-bluekeep-exploit-shows-why-you-really-really-need-to-patch\/\" target=\"_blank\" rel=\"noopener noreferrer\">a video demonstration of the exploit was published,<\/a>\u00a0visualizing the potential damage of BlueKeep.<\/p><p>So how should small businesses and network administrators be securing their systems against BlueKeep? <strong>As always, your first step should be to install patches!<\/strong> The BlueKeep vulnerability was addressed by Microsoft in May of 2019 for both supported and unsupported operating systems. It is recommended that organizations thoroughly test all patches before installation.<\/p><p>Other steps to ensure your organization is safe against BlueKeep include disabling Remote Desktop Protocol altogether by blocking TCP port 3389, updating outdated or unsupported operating systems, and enabling Network Level Authentication, which requires a user to authenticate a remote session before connecting. Keep in mind, however, these extra steps may add some friction for any organization that routinely makes use of remote desktop services.<\/p><h3>Looking to learn more about cyber threats?<\/h3><p>Check out our latest podcast on cyber threats with SonicWall\u2019s Dan Kremers and Fortinet\u2019s Douglas Santos as they discuss zombies, botnets, fileless malware, and more in episode 5 of Ping.<\/p><p>You can also <a href=\"https:\/\/www.firewalls.com\/blog\/threat-dictionary\/\" target=\"_blank\" rel=\"noopener noreferrer\">browse the Firewalls.com Threat Dictionary<\/a>, where we dissect all the cyber creepy-crawlies haunting the web.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is &#8220;wormable&#8221; Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize &#038; prevent a BlueKeep RDS exploit of your network.<\/p>\n","protected":false},"author":5,"featured_media":14883,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-14870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlueKeep: Recognizing &amp; Preventing RDP Vulnerabilities<\/title>\n<meta name=\"description\" content=\"BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is &quot;wormable&quot; Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize &amp; prevent a BlueKeep RDS exploit of your network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlueKeep: Recognizing &amp; Preventing RDP Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is &quot;wormable&quot; Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize &amp; prevent a BlueKeep RDS exploit of your network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-24T15:59:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T20:28:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2224\" \/>\n\t<meta property=\"og:image:height\" content=\"1574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"BlueKeep: Recognizing &#038; preventing RDP vulnerabilities\",\"datePublished\":\"2019-10-24T15:59:09+00:00\",\"dateModified\":\"2025-11-12T20:28:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\"},\"wordCount\":561,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\",\"name\":\"BlueKeep: Recognizing & Preventing RDP Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg\",\"datePublished\":\"2019-10-24T15:59:09+00:00\",\"dateModified\":\"2025-11-12T20:28:03+00:00\",\"description\":\"BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is \\\"wormable\\\" Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize & prevent a BlueKeep RDS exploit of your network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/bluekeep\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg\",\"width\":2224,\"height\":1574},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/bluekeep\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlueKeep: Recognizing &#038; preventing RDP vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlueKeep: Recognizing & Preventing RDP Vulnerabilities","description":"BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is \"wormable\" Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize & prevent a BlueKeep RDS exploit of your network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/bluekeep\/","og_locale":"en_US","og_type":"article","og_title":"BlueKeep: Recognizing & Preventing RDP Vulnerabilities","og_description":"BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is \"wormable\" Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize & prevent a BlueKeep RDS exploit of your network.","og_url":"https:\/\/www.firewalls.com\/blog\/bluekeep\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2019-10-24T15:59:09+00:00","article_modified_time":"2025-11-12T20:28:03+00:00","og_image":[{"width":2224,"height":1574,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"BlueKeep: Recognizing &#038; preventing RDP vulnerabilities","datePublished":"2019-10-24T15:59:09+00:00","dateModified":"2025-11-12T20:28:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/"},"wordCount":561,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/","url":"https:\/\/www.firewalls.com\/blog\/bluekeep\/","name":"BlueKeep: Recognizing & Preventing RDP Vulnerabilities","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg","datePublished":"2019-10-24T15:59:09+00:00","dateModified":"2025-11-12T20:28:03+00:00","description":"BlueKeep is a vulnerability found in Windows Remote Desktop Services. This is \"wormable\" Remote Code Execution (RCE)\u00a0gives attackers the ability to run arbitrary code on targeted devices. Learn how to recognize & prevent a BlueKeep RDS exploit of your network.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/bluekeep\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/BlueKeep1.jpg","width":2224,"height":1574},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/bluekeep\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"BlueKeep: Recognizing &#038; preventing RDP vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=14870"}],"version-history":[{"count":17,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14870\/revisions"}],"predecessor-version":[{"id":26660,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14870\/revisions\/26660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/14883"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=14870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=14870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=14870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}