{"id":15267,"date":"2020-03-20T11:09:31","date_gmt":"2020-03-20T16:09:31","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15267"},"modified":"2025-12-19T15:25:53","modified_gmt":"2025-12-19T20:25:53","slug":"5-things-telework-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/","title":{"rendered":"5 Things to Consider to Secure Your Telework Employees"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15267\" class=\"elementor elementor-15267\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-339c955 e-flex e-con-boxed e-con e-parent\" data-id=\"339c955\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3146f102 elementor-widget elementor-widget-text-editor\" data-id=\"3146f102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Telework Cybersecurity<\/h3><p>With the rapidly evolving circumstances surrounding the COVID-19 pandemic, workplaces around the world have been faced with a difficult challenge \u2013 quickly deploying a remote workforce. While some have been prepared for telework all along, others are scrambling to ensure employees can access their networks quickly, without compromising security. The unfortunate truth of our current situation is that while many are banding together to protect those most vulnerable to the coronavirus, there are those who see this more scattered user-base as a golden opportunity for cyber attack.<\/p><p>It\u2019s important to remember that just because you\u2019re not in the office, it doesn\u2019t mean hackers are taking a holiday. In fact, remote work is their bread and butter. And they stand at the ready to exploit the vulnerabilities teleworking can bring.<\/p><p>With that in mind, what can you do to plug those holes? How do you keep both your network and your work-from-homers secure? Here are 5 things to consider\u2026<\/p><h3><strong>It Starts with a Policy<\/strong><\/h3><p>Both you and your staff benefit from knowing what to expect from remote work. Putting a telework policy in writing and ensuring everyone in your organization is aware of it is an important step for consistency and therefore security. Hopefully you already had one, but if not, it still pays to put one together and make it clear to all employees.<\/p><p>What should it include? Acceptable use, personal vs company devices, personal vs company accounts, how to connect, whether public wi-fi is allowed, etc. A <a href=\"https:\/\/www.indusface.com\/blog\/maintain-security-remote-workers\/\">couple of statistics<\/a> should reinforce the need for a strong telework policy: nearly half of employees say they transfer files between work and personal computers; almost 15% say they can\u2019t connect to their work network from home, and more than three quarters say they don\u2019t take privacy measures when teleworking in a public setting.<\/p><h3>Protect Your Endpoints<\/h3><p>Each device an employee uses to access your data is an added security risk. Remote laptops, tablets, smartphones, etc. are not constantly protected by your firewall. But you need to ensure they have a level of protection against malware, email scams, and other data breaches, so attackers can\u2019t use them as a tunnel back into your network. That\u2019s why a strong endpoint security solution is vital for all your telework users. The best options also provide added visibility into their status for admins. Protecting each device individually makes protecting your network as a whole much easier.<\/p><h3>Build a Tunnel<\/h3><p>To work from home effectively, your employees need to have use of all the apps and files they normally have at the office. How do you facilitate that quickly and securely? You need to offer virtual private network &#8211; better known as VPN &#8211; access.<\/p><p>A VPN sets up a secure tunnel between your telework employees and your network, protecting their and your data from any spying or prying eyes. This encrypted tunnel (using either IPSec or SSL) can even help when employees use public networks. In case you missed it, we outlined <a href=\"https:\/\/www.firewalls.com\/blog\/choosing-sonicwall-vpn\/\">SonicWall\u2019s VPN options<\/a> in a recent post.<\/p><h3>Make Sure Passwords Have a Passing Grade<\/h3><p>An all-too-common problem with an all too easy solution in the cybersecurity world is weak passwords. Ensure your telework employees (and everything on your network) uses strong passwords of length, with numeric and special characters, and phrases if supported. This keeps brute force attacks at bay, which typically just fire thousands of common words at a login screen until one works.<\/p><p>And take it a step further with <a href=\"https:\/\/www.firewalls.com\/category\/multifactor-authentication.html\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication<\/a>. For employees to access your network remotely, require an additional step, such as an authentication code texted or emailed to provide added security. Some types of multi-factor authentication even include options like geotracking.<\/p><h3>Training Is Vital<\/h3><p>You\u2019ve likely already heard that the most common reason for a breach is human error. Whether it\u2019s in the form of a misconfiguration or because an employee clicked a malicious link, the human element puts your network at risk. And just as cybersecurity training is vital in the office, it\u2019s extremely important for telework.<\/p><p>So safety using the aforementioned public wi-fi should come up, as well as reminders about what to look for in social engineering scams. Online attackers\u2019 new favorite? Coronavirus-related malware in the form of emails, and even <a href=\"https:\/\/thenextweb.com\/security\/2020\/03\/11\/hackers-are-using-coronavirus-maps-to-infect-your-computer\/\">phony maps to steal personal data<\/a> from anyone who visits to try and keep up with the virus\u2019 spread.<\/p><p>You\u2019ll also want to be sure your work-from-homers are sticking to VPN-only when it comes to work files. Too often, the easy way may be to send sensitive data as an unencrypted email attachment, but that risks exposing it to bad actors. Teach them to keep it encrypted, even if it takes a little bit longer. And even though social distancing may keep you from conducting this training in person, there are plenty of videoconferencing options to help.<\/p><p><a href=\"https:\/\/www.firewalls.com\/category\/secure-remote-access.html\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"btn btn-primary\">Shop Secure Remote Access Solutions<\/button><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers &#038; your network.<\/p>\n","protected":false},"author":5,"featured_media":27493,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[610],"tags":[],"class_list":["post-15267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-end-user-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Things to Consider to Secure Your Telework Employees - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers &amp; your network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Things to Consider to Secure Your Telework Employees - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers &amp; your network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-20T16:09:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T20:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"5 Things to Consider to Secure Your Telework Employees\",\"datePublished\":\"2020-03-20T16:09:31+00:00\",\"dateModified\":\"2025-12-19T20:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png\",\"articleSection\":[\"End User Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\",\"name\":\"5 Things to Consider to Secure Your Telework Employees - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png\",\"datePublished\":\"2020-03-20T16:09:31+00:00\",\"dateModified\":\"2025-12-19T20:25:53+00:00\",\"description\":\"Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers & your network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png\",\"width\":1120,\"height\":630,\"caption\":\"5 Things to Consider to Secure Your Telework Employees\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Things to Consider to Secure Your Telework Employees\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Things to Consider to Secure Your Telework Employees - Firewalls.com","description":"Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers & your network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"5 Things to Consider to Secure Your Telework Employees - Firewalls.com","og_description":"Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers & your network.","og_url":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-03-20T16:09:31+00:00","article_modified_time":"2025-12-19T20:25:53+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"5 Things to Consider to Secure Your Telework Employees","datePublished":"2020-03-20T16:09:31+00:00","dateModified":"2025-12-19T20:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/"},"wordCount":828,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png","articleSection":["End User Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/","url":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/","name":"5 Things to Consider to Secure Your Telework Employees - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png","datePublished":"2020-03-20T16:09:31+00:00","dateModified":"2025-12-19T20:25:53+00:00","description":"Telework is the new normal, but that makes cybersecurity even more vital. Check out 5 things you should do to secure your teleworkers & your network.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/5-Things-to-Consider-to-Secure-Your-Telework-Employees.png","width":1120,"height":630,"caption":"5 Things to Consider to Secure Your Telework Employees"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Things to Consider to Secure Your Telework Employees"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15267"}],"version-history":[{"count":14,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15267\/revisions"}],"predecessor-version":[{"id":27494,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15267\/revisions\/27494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27493"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}