{"id":49309,"date":"2026-01-23T16:49:22","date_gmt":"2026-01-23T20:49:22","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=49309"},"modified":"2026-01-23T16:49:24","modified_gmt":"2026-01-23T20:49:24","slug":"why-spyware-is-a-growing-liability-for-private-sector-firms","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/","title":{"rendered":"Why Spyware is a Growing Liability for Private Sector Firms"},"content":{"rendered":"\n<p>A single, undetected piece of software on one employee\u2019s computer can quietly dismantle your company&#8217;s financial stability and regulatory standing. This isn&#8217;t a far-fetched scenario; it&#8217;s the stark <a href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/spyware.html\" target=\"_blank\" rel=\"noreferrer noopener\">reality of modern spyware<\/a>. While you may have basic antivirus in place, these traditional defenses are no longer sufficient to protect against the sophisticated threats targeting private firms today. A successful attack can quickly cascade into a devastating business liability, with the average cost of a data breach reaching $4.88 million in 2024.<\/p>\n\n\n\n<p>This isn&#8217;t just an IT problem\u2014it&#8217;s a critical business risk that lands squarely on the desks of compliance and finance leaders. This article will break down the specific financial, legal, and operational liabilities that spyware poses to private firms. More importantly, it will outline the modern, multi-layered defense strategy required to mitigate these risks and safeguard your company&#8217;s future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Spyware Is and How It Infiltrates Your Business<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.andysowards.com\/blog\/2017\/tips-to-keep-startup-safe-ransomware-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Protect-your-startup-from-Ransomware-threat-2.jpg\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/576;\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Tips to Keep Your Startup Safe From Ransomware Threats<\/em><\/figcaption><\/figure>\n\n\n\n<p>It&#8217;s crucial to move beyond the outdated image of spyware as annoying pop-up software. Today, spyware is malicious code designed for one primary purpose: to secretly gather your most sensitive information and transmit it to attackers. This includes everything from client data and proprietary financial records to login credentials and internal communications.<\/p>\n\n\n\n<p>Unlike a virus that might crash a system, spyware is designed to operate in the shadows, often for months, without being detected. Its goal is not just to disrupt your business but to steal the very data that is critical to your operations and subject to strict regulation.<\/p>\n\n\n\n<p>These threats don&#8217;t typically get in by brute-forcing a server. They infiltrate your business through the path of least resistance\u2014your people. The most common infection vectors are deceptively simple:<\/p>\n\n\n\n<ul>\n<li><strong>Phishing Emails:<\/strong> Deceptive emails that trick an employee into clicking a malicious link or opening an infected attachment.<\/li>\n\n\n\n<li><strong>Malicious Links:<\/strong> Links shared via email or social media that lead to compromised websites designed to discreetly install spyware.<\/li>\n\n\n\n<li><strong>Compromised Software:<\/strong> Legitimate-looking software downloads or updates that have been bundled with malicious code.<\/li>\n\n\n\n<li><strong>Infected Attachments:<\/strong> Seemingly harmless documents, like invoices or resumes, that execute spyware when opened.<\/li>\n<\/ul>\n\n\n\n<p>In fact, spyware is the most common malware type used against individuals, whose personal and professional credentials are often the gateway attackers use to pivot into secure corporate networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Three Reasons Why the Spyware Threat is Growing<\/strong><\/h2>\n\n\n\n<p>The risk of a spyware-related liability is not static; it&#8217;s actively escalating. Three key factors are converging to make private firms more vulnerable than ever before, validating the concern that yesterday&#8217;s security measures are no match for tomorrow&#8217;s threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Unrelenting Volume of New Threats<\/strong><\/h3>\n\n\n\n<p>Traditional antivirus software primarily works by matching files against a database of known threats. This signature-based approach is fundamentally flawed in the modern threat landscape. According to the AV-TEST Institute, security researchers register <a href=\"https:\/\/www.terranovasecurity.com\/blog\/cyber-security-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">over 450,000 new malicious programs and potentially unwanted applications every single day<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Human Element: Your Team is the Primary Target<\/strong><\/h3>\n\n\n\n<p>Attackers know that it is often easier to exploit human psychology than to break through a well-configured firewall. Your employees are not just a part of your organization; they are the primary target for spyware delivery. Staggering data shows that 88% of cybersecurity breaches involve an element of human error.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Shifting Landscape of Liability<\/strong><\/h3>\n\n\n\n<p>The legal and regulatory environment around cybersecurity is becoming more stringent. A trend is emerging globally to hold software vendors and service providers more liable for security flaws in their products. This &#8220;upstream&#8221; shift, however, does not absolve your firm of its responsibility.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Beyond Basic Antivirus: Mitigating Spyware Liabilities<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.forbes.com\/sites\/emilsayegh\/2021\/12\/07\/cyberthreats-are-turning-assets-into-liabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"960\" height=\"640\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp\" alt=\"\" class=\"wp-image-49310 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp 960w, https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities-768x512.webp 768w\" data-sizes=\"(max-width: 960px) 100vw, 960px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 960px; --smush-placeholder-aspect-ratio: 960\/640;\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Cyberthreats Are Turning Assets Into Liabilities<\/em><\/figcaption><\/figure>\n\n\n\n<p>Mitigating the complex liabilities created by spyware requires moving beyond a reactive, tool-based approach to security. A modern defense is a proactive, multi-layered strategy designed to protect your organization at every stage of a potential attack. Integrating <a href=\"https:\/\/www.intellisystems.com\/solutions\/cybersecurity-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity compliance services<\/a> into this framework ensures your technical defenses align with industry standards and legal requirements. This management combines 24\/7 threat monitoring with regular risk assessments, closing the gaps that basic antivirus software misses. By maintaining this high level of oversight, you protect your data and satisfy regulatory audits, turning your security from a technical hurdle into a stable operational asset.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Layer 1: Proactive Prevention<\/strong><\/h3>\n\n\n\n<p>The first layer is about building a fortified cyber defense to block as many threats as possible before they can execute. This goes far beyond a simple antivirus program. It includes implementing advanced, next-generation firewalls, sophisticated email filtering systems to catch phishing attempts, and robust access controls to ensure employees only have access to the data they absolutely need. The goal here is to shrink your attack surface, making it much harder for spyware to gain an initial foothold.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Layer 2: 24\/7 Detection<\/strong><\/h3>\n\n\n\n<p>This layer operates on the principle that no prevention is 100% foolproof. You must assume that a sophisticated threat will eventually slip past your initial defenses. Constant, 24\/7\/365 monitoring is essential for identifying suspicious activity that could indicate a breach in progress. This is often accomplished by a Security Operations Center (SOC), where human experts use advanced, AI-powered tools to analyze network traffic, log data, and endpoint behavior. They look for the subtle anomalies that signal a spyware infection, ensuring potential incidents are flagged and investigated immediately, not weeks or months later.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Layer 3: Rapid Reaction &amp; Recovery<\/strong><\/h3>\n\n\n\n<p>When a threat is detected, a swift and decisive reaction is critical to containing the damage. This layer is about having a pre-planned and practiced incident response plan. A good plan outlines the exact steps to take to isolate affected systems, eradicate the threat, protect critical data, and restore normal operations as quickly as possible. This layer also stresses the absolute necessity of maintaining independent, off-site, and immutable backups. In a worst-case scenario, having a clean backup is the final line of defense that ensures business continuity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Layer 4: Building the &#8220;Human Firewall&#8221;<\/strong><\/h3>\n\n\n\n<p>This final layer closes the loop on the human element, transforming your employees from a potential liability into an active line of defense. It involves more than a once-a-year training session. An effective program includes ongoing security awareness education, specific training on mobile and remote work security, and regular simulated phishing attacks. These tests help reinforce good habits and condition employees to spot and report suspicious emails, effectively creating a &#8220;human firewall&#8221; that is one of the most powerful defenses against spyware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion: Shift from a Reactive Stance to Proactive Defense<\/strong><\/h2>\n\n\n\n<p>Spyware is no longer a minor technical nuisance; it is a significant and growing business liability that poses a direct threat to your firm&#8217;s financial health, compliance standing, and reputation. Relying on outdated, basic antivirus software is akin to leaving the vault door open.<\/p>\n\n\n\n<p>Mitigating this modern liability requires a fundamental shift away from a reactive stance. A proactive, multi-layered strategy that integrates Prevention, Detection, Reaction, and ongoing employee Training is the only effective way to manage this risk. Managing these complex and interconnected security and compliance demands is a significant undertaking that requires deep expertise and constant vigilance. In today&#8217;s threat landscape, investing in a robust, proactive cybersecurity posture is not an expense\u2014it is a fundamental investment in your business&#8217;s resilience, reputation, and continuity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A single, undetected piece of software on one employee\u2019s computer can quietly dismantle your company&#8217;s financial stability and regulatory standing. This isn&#8217;t a far-fetched scenario; it&#8217;s the stark reality of<\/p>\n","protected":false},"author":1,"featured_media":49310,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,16698,1],"tags":[5905,5891,7846,6557,6555,974,988,5925,1076,11418,17128,1492,17126,17127,177,6393,17129,5901,5879,21,115],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Spyware is a Growing Liability for Private Sector Firms<\/title>\n<meta name=\"description\" content=\"Discover how spyware creates massive financial and legal liabilities. Learn why basic antivirus fails and how a multi-layered defense protects your firm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Spyware is a Growing Liability for Private Sector Firms\" \/>\n<meta property=\"og:description\" content=\"Discover how spyware creates massive financial and legal liabilities. Learn why basic antivirus fails and how a multi-layered defense protects your firm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-23T20:49:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T20:49:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/\",\"name\":\"Why Spyware is a Growing Liability for Private Sector Firms\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp\",\"datePublished\":\"2026-01-23T20:49:22+00:00\",\"dateModified\":\"2026-01-23T20:49:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Discover how spyware creates massive financial and legal liabilities. Learn why basic antivirus fails and how a multi-layered defense protects your firm.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp\",\"width\":960,\"height\":640},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Spyware is a Growing Liability for Private Sector Firms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Spyware is a Growing Liability for Private Sector Firms","description":"Discover how spyware creates massive financial and legal liabilities. Learn why basic antivirus fails and how a multi-layered defense protects your firm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/","og_locale":"en_US","og_type":"article","og_title":"Why Spyware is a Growing Liability for Private Sector Firms","og_description":"Discover how spyware creates massive financial and legal liabilities. Learn why basic antivirus fails and how a multi-layered defense protects your firm.","og_url":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2026-01-23T20:49:22+00:00","article_modified_time":"2026-01-23T20:49:24+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp","type":"image\/webp"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/","url":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/","name":"Why Spyware is a Growing Liability for Private Sector Firms","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp","datePublished":"2026-01-23T20:49:22+00:00","dateModified":"2026-01-23T20:49:24+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Discover how spyware creates massive financial and legal liabilities. Learn why basic antivirus fails and how a multi-layered defense protects your firm.","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/Cyberthreats-Are-Turning-Assets-Into-Liabilities.webp","width":960,"height":640},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2026\/why-spyware-is-a-growing-liability-for-private-sector-firms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Spyware is a Growing Liability for Private Sector Firms"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/49309"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=49309"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/49309\/revisions"}],"predecessor-version":[{"id":49311,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/49309\/revisions\/49311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/49310"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=49309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=49309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=49309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}