{"id":43040,"date":"2021-11-15T14:11:27","date_gmt":"2021-11-15T18:11:27","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=43040"},"modified":"2021-11-15T14:11:29","modified_gmt":"2021-11-15T18:11:29","slug":"how-to-prevent-and-detect-business-identity-theft","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/","title":{"rendered":"How to Prevent and Detect Business Identity Theft"},"content":{"rendered":"\n<p>Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen.<\/p>\n\n\n\n<p>Business identity theft involves a criminal impersonating a business, or an employee of a business, for financial gain.<\/p>\n\n\n\n<p>The key difference between business identity theft and consumer identity theft is that the former can be large-scale, and it can end up affecting not only the company but also its employees and clients.<\/p>\n\n\n\n<p>Furthermore, business identity theft can happen to companies of all sizes. So, no matter how big your business is, you need to ensure you take the right steps to prevent and detect business identity theft threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Prevent Business Identity Theft<\/h2>\n\n\n\n<p>While there\u2019s no way of 100% guaranteeing that your business is protected from identity theft, due to cybercriminals using ever-more sophisticated methods, you can help to prevent business identity by using the right tools and taking the appropriate action.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Get Identity Theft Protection<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.andysowards.com\/blog\/2021\/best-cyber-security-practices-for-both-small-and-medium-sized-businesses\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"1024\" height=\"512\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-2.jpg\" alt=\"\" class=\"wp-image-43048 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-2.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-2-768x384.jpg 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/512;\" \/><\/a><figcaption>Best Cyber Security Practices for Both Small and Medium-Sized Businesses<\/figcaption><\/figure>\n\n\n\n<p>First and foremost, you should get identity theft protection. It warns you when there are any signs that your information could be at risk so that you can take the relevant steps quickly.<\/p>\n\n\n\n<p>To find the right identity theft protection provider, check out the guide from <a href=\"https:\/\/buyersguide.org\/identity-theft-protection\/t\/best-identity-theft-protection\" target=\"_blank\" rel=\"noreferrer noopener\">BuyersGuide<\/a>, in which independent experts review the best providers for identity theft protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Encrypt Data<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/infinigeek.com\/app-security-3-things-you-need-to-have\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"956\" height=\"678\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-7.png\" alt=\"\" class=\"wp-image-43043 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-7.png 956w, https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-7-768x545.png 768w\" data-sizes=\"(max-width: 956px) 100vw, 956px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 956px; --smush-placeholder-aspect-ratio: 956\/678;\" \/><\/a><figcaption>App Security: 3 Things You Need To Have<\/figcaption><\/figure>\n\n\n\n<p>While it\u2019s great to have the safeguard of identity theft protection, you also need to take active steps yourself to stop your business from becoming a victim.<\/p>\n\n\n\n<p>One of the best ways of ensuring sensitive consumer information, such as Social Security numbers and credit card details, is kept safe is to <a href=\"https:\/\/lifehacker.com\/a-beginners-guide-to-encryption-what-it-is-and-how-to-1508196946\" target=\"_blank\" rel=\"noreferrer noopener\">encrypt it<\/a> prior to transmitting or storing it. That means even if it\u2019s stolen, the cybercriminal won\u2019t be able to read it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Update Security Software<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/infinigeek.com\/the-security-tech-that-even-at-home-businesses-should-invest-in\/\"><img decoding=\"async\" width=\"710\" height=\"434\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-8.png\" alt=\"\" class=\"wp-image-43042 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 710px; --smush-placeholder-aspect-ratio: 710\/434;\" \/><\/a><figcaption>The Security Tech That Even At-Home Businesses Should Invest In<\/figcaption><\/figure>\n\n\n\n<p>You should know that you must use <a href=\"https:\/\/www.andysowards.com\/blog\/2016\/what-is-a-firewall-and-how-can-it-help-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\">a firewall<\/a> and security software. But it\u2019s easy to overlook how important it is to ensure your protective software is up-to-date.<\/p>\n\n\n\n<p>Perform regular system updates so that there are no security issues and hackers can\u2019t access your systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Establish Protocols for Identifying Threats<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.andysowards.com\/blog\/2021\/top-4-cyber-security-threats-to-businesses\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-3.jpg\" alt=\"\" class=\"wp-image-43047 lazyload\" width=\"710\" height=\"321\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 710px; --smush-placeholder-aspect-ratio: 710\/321;\" \/><\/a><figcaption>Top 4 Cyber Security Threats To Businesses<\/figcaption><\/figure>\n\n\n\n<p>Working with your IT department, you should establish protocols for identifying identity theft threats and then carry out fraud inspections on a regular basis. Practice things like security freezes and ensure your system knows how to detect suspicious activity.<\/p>\n\n\n\n<p>You also need to have a clear step-by-step plan in case a data breach does happen in order to minimize the impact.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Detect Business Identity Theft<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/pixabay.com\/photos\/hacker-silhouette-hack-anonymous-3342696\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"1024\" height=\"788\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1-1024x788.jpg\" alt=\"\" class=\"wp-image-43049 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1-1024x788.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1-768x591.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1-1536x1182.jpg 1536w, https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/788;\" \/><\/a><\/figure>\n\n\n\n<p>You need to be cautious of common cyberattacks like <a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-awareness\/6-common-phishing-attacks-and-how-to-protect-against-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a>; which involves cybercriminals sending out emails pretending to be from a legitimate company and including a link that asks the person to enter his or her personal details.<\/p>\n\n\n\n<p>And you need to make your employees aware of common methods that criminals use to steal a business\u2019s identity.<\/p>\n\n\n\n<p>Your business can then always be alert to the possibility of identity theft and detect suspicious activity.<\/p>\n\n\n\n<p>You should also be wary of fake invoices, particularly for goods or services that you didn\u2019t order or receive, and duplicate bills for invoices you\u2019ve already paid.<\/p>\n\n\n\n<p>Be cautious of bogus or unlicensed credit card processing companies too. If you go with a fraudulent service, your business could end up paying exorbitant fees in addition to risking having its identity stolen.<\/p>\n\n\n\n<p>Also, remember that business identity theft doesn\u2019t only happen online. If paper documents are still a part of your company\u2019s operations, you need to make sure all old records are shredded. If files containing sensitive information are thrown into the trash, a criminal need only fish them out.<\/p>\n\n\n\n<p>Keep up to date with the latest scams and ways of protecting your business. You can then ensure you\u2019re able to detect and prevent business identity theft from occurring.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft involves a criminal impersonating a business, or an<\/p>\n","protected":false},"author":1,"featured_media":43049,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,5695,1],"tags":[5891,14933,7846,10596,8890,6249,6116,14934,988,866,6042,118,4375,11409,5879,21,115,5890],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Prevent and Detect Business Identity Theft<\/title>\n<meta name=\"description\" content=\"Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Prevent and Detect Business Identity Theft\" \/>\n<meta property=\"og:description\" content=\"Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-15T18:11:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-15T18:11:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1477\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/\",\"name\":\"How to Prevent and Detect Business Identity Theft\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg\",\"datePublished\":\"2021-11-15T18:11:27+00:00\",\"dateModified\":\"2021-11-15T18:11:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg\",\"width\":1920,\"height\":1477},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent and Detect Business Identity Theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent and Detect Business Identity Theft","description":"Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"How to Prevent and Detect Business Identity Theft","og_description":"Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft","og_url":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2021-11-15T18:11:27+00:00","article_modified_time":"2021-11-15T18:11:29+00:00","og_image":[{"width":1920,"height":1477,"url":"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/","url":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/","name":"How to Prevent and Detect Business Identity Theft","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg","datePublished":"2021-11-15T18:11:27+00:00","dateModified":"2021-11-15T18:11:29+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Just like individuals can have their personal data stolen by criminals, so too can businesses have their identities stolen. Business identity theft","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/How-to-Prevent-and-Detect-Business-Identity-Theft-1.jpg","width":1920,"height":1477},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2021\/how-to-prevent-and-detect-business-identity-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Prevent and Detect Business Identity Theft"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/43040"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=43040"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/43040\/revisions"}],"predecessor-version":[{"id":43050,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/43040\/revisions\/43050"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/43049"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=43040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=43040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=43040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}