{"id":39583,"date":"2020-12-02T14:30:36","date_gmt":"2020-12-02T18:30:36","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=39583"},"modified":"2020-12-02T14:30:38","modified_gmt":"2020-12-02T18:30:38","slug":"windows-users-must-follow-these-rules-if-they-really-care-about-their-data","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/","title":{"rendered":"Windows Users Must Follow These Rules if They Really Care About Their Data"},"content":{"rendered":"\n<p>The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the atomic bomb during times of increasing military developments. Only here, the plausible impact is far more widespread.&nbsp;<\/p>\n\n\n\n<p>Even if we do not take things out of proportion, protecting your data is quintessential. After all, it resembles your online biometric, or fingerprint if you may. While a lot of companies are taking cybersecurity rather seriously, it only makes sense if you do so too, on an individual scale.&nbsp;<\/p>\n\n\n\n<p>As a windows user, thankfully, you have a lot of control in your hands. Here is how you make the most out of your system if you really care about your data.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Suspicious Sites<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.theverge.com\/2020\/2\/20\/21136728\/browser-privacy-protection-features-safety-how-to-data-edge-safari-chrome\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"920\" height=\"613\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/browser-privacy-protection-features-safety-how-to-data-edge-safari-chrome.jpg\" alt=\"\" class=\"wp-image-39588 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/browser-privacy-protection-features-safety-how-to-data-edge-safari-chrome.jpg 920w, https:\/\/www.andysowards.com\/blog\/assets\/browser-privacy-protection-features-safety-how-to-data-edge-safari-chrome-768x512.jpg 768w\" data-sizes=\"(max-width: 920px) 100vw, 920px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 920px; --smush-placeholder-aspect-ratio: 920\/613;\" \/><\/a><figcaption>How your browser protects your privacy<\/figcaption><\/figure>\n\n\n\n<p>The easiest way to get unwarranted attention into your system is to access websites that do not seem reliable. Perhaps, the most common way to ensure <a href=\"https:\/\/www.bitdefender.com\/solutions\/digital-identity-protection.html\" target=\"_blank\" rel=\"noreferrer noopener\">protection against data breaches<\/a> is to avoid these suspicious websites. Sure, your browser might have capabilities to keep such suspicious sites at bay, but nothing ensures more safety than your personal touch.\u00a0<\/p>\n\n\n\n<p>Avoiding these websites is no rocket science. Neither does it require you to undergo <a href=\"https:\/\/www.andysowards.com\/blog\/2020\/the-importance-of-cybersecurity-training-in-the-workplace\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity training<\/a>, nor is it an superfluous process. Avoiding data breaches is as simple as abstaining from such sites. Yes, it hurts to state it, but there are not any real people in your 5km radius awaiting your response. Avoid such clickbait.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Vigilant Browsing<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.wired.com\/story\/privacy-browsers-duckduckgo-ghostery-brave\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"768\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/privacy-browsers-duckduckgo-ghostery-brave-1024x768.jpg\" alt=\"\" class=\"wp-image-39587 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/privacy-browsers-duckduckgo-ghostery-brave-1024x768.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/privacy-browsers-duckduckgo-ghostery-brave-768x576.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/privacy-browsers-duckduckgo-ghostery-brave-1536x1152.jpg 1536w, https:\/\/www.andysowards.com\/blog\/assets\/privacy-browsers-duckduckgo-ghostery-brave-2048x1536.jpg 2048w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/768;\" \/><\/a><figcaption>It&#8217;s Time to Switch to a Privacy Browser<\/figcaption><\/figure>\n\n\n\n<p>As a Windows user, you ought to maintain more vigilance online. Unlike a Mac user, you do not have Safari and its features at your disposal. Perhaps, your browser of choice is either Chrome or Firefox. You need to understand that these browsers mostly generate their revenue using data collection. In other words, they use your data to provide you services that are specially customized for you.&nbsp;<\/p>\n\n\n\n<p>This is where vigilant browsing becomes quintessential. The aforementioned browsers place cookies in your system to make their services better, but this, in fact, can act as a gateway for data breaches. Ensure that you practice vigilant browsing and clean your cache frequently, along with searching for products incognito, for as long as you are intensely looking for a product.&nbsp;<\/p>\n\n\n\n<p>This might sound like a false alarm, but it is better to browse safer.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Antiviral Therapy<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.zdnet.com\/article\/the-windows-10-security-guide-how-to-safeguard-your-business\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"770\" height=\"578\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/The-Windows-10-security-guide-How-to-protect-your-business.jpg\" alt=\"\" class=\"wp-image-39586 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/The-Windows-10-security-guide-How-to-protect-your-business.jpg 770w, https:\/\/www.andysowards.com\/blog\/assets\/The-Windows-10-security-guide-How-to-protect-your-business-768x576.jpg 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/578;\" \/><\/a><figcaption>The Windows 10 security guide: How to protect your business<\/figcaption><\/figure>\n\n\n\n<p>This goes without saying. Windows Defender gets the job done, but that is to a great extent limited to local networks. Considering the fact that your system will, at some point, connect to the outside world, it is always sensible to place an extra layer of protection.<\/p>\n\n\n\n<p>In this regard, you need to be cautious about the kind of antivirus you plan on installing in your system. While there are a lot of rip-offs and false promises to be found online, you need to be careful when you\u2019re looking for the <a href=\"https:\/\/www.bitdefender.com\/solutions\/antivirus.html\" target=\"_blank\" rel=\"noreferrer noopener\">best antivirus for PC<\/a>. Usually sticking to the conventional antivirus providers does the job. Sure, you could try out the non-conventional ones too, but why take unnecessary risks?<\/p>\n\n\n\n<p>Either way, protecting your system with an additional layer is recommended, despite your Windows Defender working okay.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Software Updates<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.zdnet.com\/article\/windows-10-update-the-complete-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"770\" height=\"578\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg\" alt=\"\" class=\"wp-image-39585 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg 770w, https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide-768x576.jpg 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/578;\" \/><\/a><figcaption>The Windows 10 update guide: How to install and manage security and feature updates<\/figcaption><\/figure>\n\n\n\n<p>Speaking of Windows Defender, Microsoft is putting a fair deal of effort in ensuring greater security. While this could be to compete against its fruit counterpart, it isn\u2019t really a bad thing for the consumer.&nbsp;<\/p>\n\n\n\n<p>Windows PCs are getting a plethora of updates over the past few years. While some of them are aimed at fixing bugs, most of them are security oriented. These are made to ensure minimum security leaks in your system. Sure, this is a great thing, but this demands you to be vigilant too.&nbsp;<\/p>\n\n\n\n<p>How, you might ask? Well, some windows systems are notorious for data erases and factory resets along with their updates. While the onus might be on your system, but the inconvenience is for you to bear. This is where creating restore points becomes important.&nbsp;<\/p>\n\n\n\n<p>Start&gt; Control Panel &gt; System and Maintenance (or System and Security) &gt; System &gt; System Protection. Creating your restoration point has never been simpler. From here, you can create a restoration point, in case you are petrified of any data erases during software updates.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>The Bottomline<\/strong><\/h1>\n\n\n\n<p>Most importantly, do not install Windows versions that you find on illicit websites. Being a pirate might sound really adventurous, but it comes with a magnitude of issues such as data breaches, an influx of malware and their ramifications. While most common folk may prefer to get their Windows systems \u2018downloaded\u2019, we urge you to install the unaltered version.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the atomic bomb during times of increasing military developments.<\/p>\n","protected":false},"author":1,"featured_media":39585,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[199,1,5633],"tags":[6391,6392,90,12960,7847,13150,6020,974,312,5895,89,181,11090,13149,118,1136,177,13148,8096,237,5877,13147],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Windows Users Must Follow These Rules if They Really Care About Their Data<\/title>\n<meta name=\"description\" content=\"The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Users Must Follow These Rules if They Really Care About Their Data\" \/>\n<meta property=\"og:description\" content=\"The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-02T18:30:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-02T18:30:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/\",\"name\":\"Windows Users Must Follow These Rules if They Really Care About Their Data\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg\",\"datePublished\":\"2020-12-02T18:30:36+00:00\",\"dateModified\":\"2020-12-02T18:30:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows Users Must Follow These Rules if They Really Care About Their Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows Users Must Follow These Rules if They Really Care About Their Data","description":"The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/","og_locale":"en_US","og_type":"article","og_title":"Windows Users Must Follow These Rules if They Really Care About Their Data","og_description":"The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the","og_url":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2020-12-02T18:30:36+00:00","article_modified_time":"2020-12-02T18:30:38+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/","url":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/","name":"Windows Users Must Follow These Rules if They Really Care About Their Data","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg","datePublished":"2020-12-02T18:30:36+00:00","dateModified":"2020-12-02T18:30:38+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"The idea of cyber-breaches and data-stealing has become a paradoxical by-product of technological advancements. Think of it like the development of the","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/windows-10-update-the-complete-guide.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2020\/windows-users-must-follow-these-rules-if-they-really-care-about-their-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows Users Must Follow These Rules if They Really Care About Their Data"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/39583"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=39583"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/39583\/revisions"}],"predecessor-version":[{"id":39589,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/39583\/revisions\/39589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/39585"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=39583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=39583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=39583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}