{"id":49419,"date":"2026-03-07T11:10:42","date_gmt":"2026-03-07T15:10:42","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=49419"},"modified":"2026-03-07T11:10:45","modified_gmt":"2026-03-07T15:10:45","slug":"the-full-cybersecurity-circle-how-smbs-can-protect-their-business","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/","title":{"rendered":"The Full Cybersecurity Circle: How SMBs Can Protect Their Business"},"content":{"rendered":"\n<p>Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large enterprises with deep pockets and sensitive data.<\/p>\n\n\n\n<p>In reality, cyber threats do not discriminate by company size. Automated attacks, ransomware, and bots exploit weaknesses wherever they find them. Even smaller businesses are frequent targets, and assuming you are invisible puts your operations at serious risk.<\/p>\n\n\n\n<p>Relying on the &#8220;Old Way&#8221; of security\u2014installing antivirus software, setting up a firewall, and hoping for the best\u2014creates a false sense of safety. Modern threats are sophisticated, constantly evolving, and persistent.<\/p>\n\n\n\n<p>To truly safeguard your business, you need a comprehensive approach that addresses every stage of a potential attack, from detecting vulnerabilities to recovery after an incident. This approach forms the foundation of the Full Cybersecurity Circle, ensuring that you are not just blocking attacks but actively preventing and mitigating them. By adopting a holistic strategy, businesses can <a href=\"https:\/\/www.xbase.com\/services\/cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">work with a Toronto cybersecurity team<\/a> to manage risk and strengthen their defenses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Takeaways<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Prevention is not enough:<\/strong> Firewalls and antivirus software alone cannot stop sophisticated attacks.<\/li>\n\n\n\n<li><strong>Follow a structured framework:<\/strong> A strong defense strategy addresses Identify, Protect, Detect, Respond, and Recover.<\/li>\n\n\n\n<li><strong>The \u201cGap\u201d in Defense:<\/strong> Many SMBs have basic protection but fail at detecting and responding to threats, allowing attacks to go unnoticed.<\/li>\n\n\n\n<li><strong>Expert Partnership:<\/strong> Working with skilled cybersecurity professionals gives you access to enterprise-grade monitoring and recovery planning without the cost of an in-house team.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Old Way vs. The New Way of Security<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.andysowards.com\/blog\/2025\/safeguarding-your-network-strategies-for-cyber-resilience\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Cyber-Resilience-Is-Your-Business-How-To-Improve-It.webp\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 959px; --smush-placeholder-aspect-ratio: 959\/548;\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Safeguarding Your Network: Strategies for Cyber Resilience<\/em><\/figcaption><\/figure>\n\n\n\n<p>Traditionally, IT support and cybersecurity were treated as the same service. Businesses hired a generalist or managed service provider to keep systems running, ensuring email functionality, printer operation, and server availability. Security was a product you installed once\u2014antivirus on desktops and a firewall at the perimeter.<\/p>\n\n\n\n<p>This approach relies entirely on prevention and assumes that if you build a strong enough barrier, nothing will get through.<\/p>\n\n\n\n<p>Modern cybersecurity recognizes that attackers will eventually find gaps. A phishing email might slip through, or a new software vulnerability could be exploited.<\/p>\n\n\n\n<p>A true cybersecurity services expert does more than install software\u2014they monitor, detect, and respond to threats continuously. While general IT ensures availability, cybersecurity focuses on keeping data confidential and intact.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Cybersecurity Circle: A Continuous Cycle<\/strong><\/h2>\n\n\n\n<p>Modern cybersecurity is not a static wall; it\u2019s an evolving ecosystem. Experts organize protection into five continuous functions:<\/p>\n\n\n\n<ol>\n<li><strong>Identify<\/strong><\/li>\n\n\n\n<li><strong>Protect<\/strong><\/li>\n\n\n\n<li><strong>Detect<\/strong><\/li>\n\n\n\n<li><strong>Respond<\/strong><\/li>\n\n\n\n<li><strong>Recover<\/strong><\/li>\n<\/ol>\n\n\n\n<p>It is called a &#8220;Cybersecurity Circle&#8221; because security is a continuous process. Lessons learned from recovery feed back into identification, helping businesses strengthen defenses for the next incident.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Identify &amp; Protect: The Foundation<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Identify<\/strong><\/h3>\n\n\n\n<p>You cannot secure what you don\u2019t know exists. Identification involves assessing risk, cataloging hardware, software, and data, and regularly scanning for vulnerabilities.<\/p>\n\n\n\n<p>Identifying weak points\u2014such as outdated software or employees prone to phishing\u2014helps businesses allocate resources effectively and prevent breaches before they happen.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Protect<\/strong><\/h3>\n\n\n\n<p>Protection goes beyond basic antivirus software. It includes advanced security measures and access controls:<\/p>\n\n\n\n<ul>\n<li><strong>Email Security:<\/strong> Scans and removes malicious content before it reaches employees.<\/li>\n\n\n\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/what-is-multifactor-authentication-e5e39437-121c-be60-d123-eda06bddf661\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Multi-Factor Authentication (MFA\/2FA)<\/strong><\/a><strong>:<\/strong> Ensures that stolen passwords alone cannot grant access.<\/li>\n\n\n\n<li><strong>Patch Management:<\/strong> Automatic updates address vulnerabilities as soon as they are discovered.<\/li>\n<\/ul>\n\n\n\n<p>Even the best preventative measures have limits, which is why detection and response capabilities are critical.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Great Gap: Detect &amp; Respond<\/strong><\/h2>\n\n\n\n<p>Many SMBs invest in protection and assume they are safe. Without active detection, attackers can reside in networks for weeks or months, stealing sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Detect<\/strong><\/h3>\n\n\n\n<p>Active monitoring moves beyond passive antivirus. Advanced tools recognize abnormal behavior and suspicious activity. Cybersecurity experts provide 24\/7 oversight, ensuring threats are identified early.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Respond<\/strong><\/h3>\n\n\n\n<p>Speed is essential when a threat is detected. A predefined Incident Response Plan ensures everyone knows their role: shutting down servers, notifying legal counsel, and alerting affected clients. Experts can isolate infected devices remotely to prevent further damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Recover: Ensuring Business Continuity<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.forbes.com\/councils\/forbesbusinesscouncil\/2025\/10\/21\/how-companies-can-emerge-stronger-after-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"683\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks-1024x683.webp\" alt=\"\" class=\"wp-image-49420 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks-1024x683.webp 1024w, https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks-768x512.webp 768w, https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp 1440w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/683;\" \/><\/a><figcaption class=\"wp-element-caption\"><em>How Companies Can Emerge Stronger After Cyberattacks<\/em><\/figcaption><\/figure>\n\n\n\n<p>Downtime and data loss are the consequences every business fears. Recovery focuses on resilience, ensuring operations continue even after a serious incident.<\/p>\n\n\n\n<ul>\n<li><strong>Verified Backups:<\/strong> Backups must be protected from tampering and tested regularly.<\/li>\n\n\n\n<li><strong>Device Encryption:<\/strong> Secures data if a device is lost or stolen.<\/li>\n\n\n\n<li><strong>Cybersecurity Insurance:<\/strong> Experts help businesses meet security requirements to qualify for coverage, providing a financial safety net.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h3>\n\n\n\n<p>Transitioning from basic antivirus to a comprehensive Cybersecurity Circle transforms your business from a vulnerable target into a resilient organization.<\/p>\n\n\n\n<p>Cyber threats are real, automated, and relentless. Assuming your business is too small to be noticed is a risky gamble. Partnering with experts allows you to take control of your risk.<\/p>\n\n\n\n<p>Review your current security measures. If your focus is only on protection without a strategy for detecting or responding to threats, it\u2019s time to address the gaps and strengthen your defenses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large enterprises with deep pockets and sensitive data.<\/p>\n","protected":false},"author":1,"featured_media":49420,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,5695,16698],"tags":[6396,5891,5973,7846,6117,6020,6474,11850,4377,988,5925,4375,5759,177,3199,5879,21,115,5890,10330],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Full Cybersecurity Circle: How SMBs Can Protect Their Business<\/title>\n<meta name=\"description\" content=\"Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Full Cybersecurity Circle: How SMBs Can Protect Their Business\" \/>\n<meta property=\"og:description\" content=\"Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-07T15:10:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-07T15:10:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/\",\"name\":\"The Full Cybersecurity Circle: How SMBs Can Protect Their Business\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp\",\"datePublished\":\"2026-03-07T15:10:42+00:00\",\"dateModified\":\"2026-03-07T15:10:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp\",\"width\":1440,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Full Cybersecurity Circle: How SMBs Can Protect Their Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Full Cybersecurity Circle: How SMBs Can Protect Their Business","description":"Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/","og_locale":"en_US","og_type":"article","og_title":"The Full Cybersecurity Circle: How SMBs Can Protect Their Business","og_description":"Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large","og_url":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2026-03-07T15:10:42+00:00","article_modified_time":"2026-03-07T15:10:45+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp","type":"image\/webp"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/","url":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/","name":"The Full Cybersecurity Circle: How SMBs Can Protect Their Business","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp","datePublished":"2026-03-07T15:10:42+00:00","dateModified":"2026-03-07T15:10:45+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Many small and medium-sized businesses (SMB) owners assume their company is too small to attract cybercriminals. They believe hackers focus only on large","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/How-Companies-Can-Emerge-Stronger-After-Cyberattacks.webp","width":1440,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2026\/the-full-cybersecurity-circle-how-smbs-can-protect-their-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Full Cybersecurity Circle: How SMBs Can Protect Their Business"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/49419"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=49419"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/49419\/revisions"}],"predecessor-version":[{"id":49421,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/49419\/revisions\/49421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/49420"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=49419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=49419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=49419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}