{"id":49246,"date":"2015-10-19T00:00:00","date_gmt":"2015-10-19T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/5-easy-ways-to-keep-your-business-secure-online\/"},"modified":"2015-10-19T11:06:47","modified_gmt":"2015-10-19T11:06:47","slug":"5-easy-ways-to-keep-your-business-secure-online","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online","title":{"rendered":"5 Easy Ways to Keep Your Business Secure Online"},"content":{"rendered":"

In July 2015, Google released an important paper<\/a> on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software<\/a>, use strong passwords, only visit websites they know and don\u2019t share personal information. While these aren\u2019t necessarily bad practices, they can seem a bit like a cargo cult where people take these steps without really understanding the underlying principles.\n<\/p>\n

Security experts tend to follow a scheme that looks deceptively simple: they keep their software updated, use unique passwords, use strong passwords and use a password manager<\/a>. All of these practices are easy to carry out on an individual machine, but how do you scale up to an enterprise?\n<\/p>\n

You probably know how easy it is to keep your own computer secure. How about managing tens, hundreds, even thousands of computers? It\u2019s also surprisingly easy to scale up security to the enterprise. All you need are the right tools.\n<\/p>\n

Keep Your Software Updated<\/span><\/h2>\n

The best defense against hackers<\/a> is keeping all your software patched<\/a>. It\u2019s an arms race with the hackers to discover security breaches before the vendors do. That\u2019s why it\u2019s important to keep all your software as up to date as possible.\n<\/p>\n

That\u2019s why Windows 10<\/a> requires users to actually install updates for the home versions, which hasn\u2019t necessarily been a popular decision. Business users can hold off actually installing them, so they can make sure the updates don\u2019t break anything, but they\u2019ll have to install the updates eventually. The faster update cadence in Windows 10 is an attempt to keep up, with weekly cumulative updates.\n<\/p>\n

While Linux<\/a> distributions offer various package managers and Ubuntu<\/a> offers business users a paid tool to synchronize updates across fleets of computers, most businesses are going to be running Windows and are only going to wait to upgrade to Windows 10 until the bugs are completely ironed out.\n<\/p>\n

That makes the use of third-party tools to manage software updates important. One possible tool is Ninite Pro<\/a>. While Ninite lets ordinary users download, install and update a range of popular applications, Ninite Pro lets businesses manage updates across large numbers of computers. Large organizations like NASA and Tupperware already rely on it.\n<\/p>\n

Windows Server Update Services (WSUS)<\/a> let you roll out Windows updates from Windows Server<\/a> installations to Windows desktops.\n<\/p>\n

Use Unique\/Strong Passwords<\/span><\/h2>\n

You probably already know not to use the same password everywhere. But, in practice, it\u2019s not always easy to use unique and strong passwords everywhere. Even the lowliest office worker will have multiple logins with usernames and passwords to remember. There\u2019s a lot of temptation to reuse passwords across accounts. Attackers know this, and if they can break into one account, they know that it can be the domino that brings down an entire organization.\n<\/p>\n

Using unique and strong passwords is something that experts and non-experts have in common, according to Google\u2019s research cited earlier.\n<\/p>\n

You can encourage good password use by doing things like sending out periodic reminders to employees, all the way to requiring users to change their passwords every so often.\n<\/p>\n

That\u2019s why it\u2019s a good idea to have a little help in picking good passwords, which leads to\u2026\n<\/p>\n

Use a Password Manager<\/span><\/h2>\n

While using strong and unique passwords ranks up there with working smoke detectors as an essential practice, it\u2019s hard to remember all of the passwords for the different accounts most people have. Using good passwords was something that both expert and non-expert users had in common, but smart users know when they can automate tedious processes. Password managers are a good example.\n<\/p>\n

There have been several tools to help users keep strong passwords with a minimum of effort. The most well known is LastPass<\/a>. While LastPass is best known as a consumer-based application, the company offers a version for enterprise<\/a> designed to support large organizations. LastPass attempts to create truly randomized passwords while users only have to remember one login. Even though LastPass had a well-publicized breach earlier this year, it uses strong encryption<\/a>. The passwords are only decrypted on the local machine, so having access to the password vault<\/a> is virtually useless for an attacker.\n<\/p>\n

Use Multi-Factor Authentication<\/span><\/h2>\n

Multi-factor authentication<\/a> is one way to limit the damage an attacker can do if a login does fall into the wrong hands. It requires users to enter something like a code as well as a password in order to gain access. The most familiar use is a debit card that requires users to enter a PIN as well as swipe a card to make purchases.\n<\/p>\n

The theory of multi-factor authentication is that it requires something that both the user has<\/i> as well as something the user knows<\/i>. Google offers<\/a> a multi-factor authentication service that can be used to secure Gmail accounts as well as any number of other applications, including LastPass.\n<\/p>\n

Conclusion<\/span><\/h2>\n

While there are a lot of threats against organizations, with the right tools, keeping them secure is surprisingly easy.<\/p>\n","protected":false},"excerpt":{"rendered":"

In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and don\u2019t share personal information. While these aren\u2019t necessarily bad practices, they can seem a bit like a cargo cult where […]<\/p>\n","protected":false},"author":7684,"featured_media":49247,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[561,548,558],"tags":[],"category_partsoff":[],"class_list":["post-49246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-business-alignment","category-cybersecurity","category-risk-management"],"acf":[],"yoast_head":"\n5 Easy Ways to Keep Your Business Secure Online - Techopedia<\/title>\n<meta name=\"description\" content=\"In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and...\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Easy Ways to Keep Your Business Secure Online\" \/>\n<meta property=\"og:description\" content=\"In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/david.delony\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-19T11:06:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Delony\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@http:\/\/twitter.com\/ddelony\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Delony\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online\"},\"author\":{\"name\":\"David Delony\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/5d75de05bfecdaf4200aff335e03a9b6\"},\"headline\":\"5 Easy Ways to Keep Your Business Secure Online\",\"datePublished\":\"2015-10-19T00:00:00+00:00\",\"dateModified\":\"2015-10-19T11:06:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online\"},\"wordCount\":842,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg\",\"articleSection\":\"\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#respond\"]}],\"copyrightYear\":\"2015\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online\",\"url\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online\",\"name\":\"5 Easy Ways to Keep Your Business Secure Online - Techopedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg\",\"datePublished\":\"2015-10-19T00:00:00+00:00\",\"dateModified\":\"2015-10-19T11:06:47+00:00\",\"description\":\"In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg\",\"caption\":\"Photoinnovation\/Dreamstime.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.techopedia.com\/topic\/4\/cybersecurity\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5 Easy Ways to Keep Your Business Secure Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg\",\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/5d75de05bfecdaf4200aff335e03a9b6\",\"name\":\"David Delony\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-head-dimples-hair-haircut-man.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-head-dimples-hair-haircut-man.jpg\",\"caption\":\"David Delony\"},\"description\":\"David Delony is a Bay Area expatriate living in Ashland, Oregon, where he combines his love of words and technology in his career as a freelance writer. He's covered everything from TV commercials to video games. David holds a B.A. in communication from California Sate University, East Bay.\",\"sameAs\":[\"http:\/\/www.rebelmouse.com\/ddelony\",\"https:\/\/www.facebook.com\/david.delony\",\"http:\/\/www.linkedin.com\/in\/ddelony\",\"https:\/\/x.com\/http:\/\/twitter.com\/ddelony\"],\"knowsAbout\":[\"Contributor\"],\"url\":\"https:\/\/www.techopedia.com\/contributors\/david-delony\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 Easy Ways to Keep Your Business Secure Online - Techopedia","description":"In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and...","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"5 Easy Ways to Keep Your Business Secure Online","og_description":"In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and...","og_url":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_author":"https:\/\/www.facebook.com\/david.delony","article_published_time":"2015-10-19T00:00:00+00:00","article_modified_time":"2015-10-19T11:06:47+00:00","og_image":[{"url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg","width":1,"height":1,"type":"image\/jpeg"}],"author":"David Delony","twitter_card":"summary_large_image","twitter_creator":"@http:\/\/twitter.com\/ddelony","twitter_site":"@techopedia","twitter_misc":{"Written by":"David Delony","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online"},"author":{"name":"David Delony","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/5d75de05bfecdaf4200aff335e03a9b6"},"headline":"5 Easy Ways to Keep Your Business Secure Online","datePublished":"2015-10-19T00:00:00+00:00","dateModified":"2015-10-19T11:06:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online"},"wordCount":842,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"image":{"@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg","articleSection":"","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#respond"]}],"copyrightYear":"2015","copyrightHolder":{"@id":"https:\/\/www.techopedia.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online","url":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online","name":"5 Easy Ways to Keep Your Business Secure Online - Techopedia","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage"},"image":{"@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg","datePublished":"2015-10-19T00:00:00+00:00","dateModified":"2015-10-19T11:06:47+00:00","description":"In July 2015, Google released an important paper on how security experts stay secure as opposed to less sophisticated users. Average users rely on antivirus software, use strong passwords, only visit websites they know and...","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#primaryimage","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/sign-text-word-page-alphabet-ampersand-2.jpg","caption":"Photoinnovation\/Dreamstime.com"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/2\/31395\/security\/5-easy-ways-to-keep-your-business-secure-online#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.techopedia.com\/topic\/4\/cybersecurity"},{"@type":"ListItem","position":3,"name":"5 Easy Ways to Keep Your Business Secure Online"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg","caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/5d75de05bfecdaf4200aff335e03a9b6","name":"David Delony","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-head-dimples-hair-haircut-man.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-head-dimples-hair-haircut-man.jpg","caption":"David Delony"},"description":"David Delony is a Bay Area expatriate living in Ashland, Oregon, where he combines his love of words and technology in his career as a freelance writer. He's covered everything from TV commercials to video games. David holds a B.A. in communication from California Sate University, East Bay.","sameAs":["http:\/\/www.rebelmouse.com\/ddelony","https:\/\/www.facebook.com\/david.delony","http:\/\/www.linkedin.com\/in\/ddelony","https:\/\/x.com\/http:\/\/twitter.com\/ddelony"],"knowsAbout":["Contributor"],"url":"https:\/\/www.techopedia.com\/contributors\/david-delony"}]}},"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/49246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7684"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=49246"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/49246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media\/49247"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=49246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/categories?post=49246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/tags?post=49246"},{"taxonomy":"category_partsoff","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/category_partsoff?post=49246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}