{"id":5125,"date":"2021-02-13T15:03:28","date_gmt":"2021-02-13T15:03:28","guid":{"rendered":"http:\/\/s876455381.onlinehome.us\/?p=5125"},"modified":"2021-02-13T15:20:31","modified_gmt":"2021-02-13T15:20:31","slug":"cybersecurity-protections","status":"publish","type":"post","link":"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/","title":{"rendered":"Cybersecurity Protections"},"content":{"rendered":"\n<p>What You Should Know so You Don&#8217;t Fall Victim to a Scam<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Whether it\u2019s a smartphone, laptop, tablet, or desktop computer, most of us are dependent on our connection to the internet at some point during the day.\u00a0 We use technology for school, work, and leisure without giving much thought to the dangers that wait for us every time we log in, yet we should proceed with caution.\u00a0 Using many elaborate scams and creative ploys designed to steal your money or identity, cyberthieves will try to get your social security number, banking information, account numbers, birthdate, passwords, and anything else they can obtain. \u00a0As it is much harder to undo damage than prevent it, it\u2019s important we take measures to protect our personal information whenever online so that we don\u2019t fall victim to internet scammers.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2><strong>Tips for Keeping Your Information Safe<\/strong><\/h2>\n\n\n\n<ul><li><strong>Do not click on links or attachments you are not expecting.&nbsp; <\/strong>When opening emails in either your work or personal accounts, use caution.&nbsp; Even if it appears to be sent from someone you know, if you were not expecting to receive a communication with links or attachments, call the sender to verify authenticity before clicking on what might potentially be a malicious link or virus waiting to do harm.<\/li><li><strong>Use multifactor authentication whenever possible.<\/strong>&nbsp; An example is when you enter your username and password and then are sent a verification code by way of email, text, or mobile app to ensure that it is really you attempting to access the account.<\/li><li><strong>Do not reuse passwords.&nbsp; <\/strong>If a scammer finds out a password, they have tools to put it through software that sees what other sites it may \u201copen.\u201d&nbsp; This usually happens within minutes!&nbsp; You can be compromised on multiple platforms before you realize you\u2019ve been hacked.<\/li><li><strong>Do not use public Wi-Fi when accessing information that you want to keep secure.&nbsp; <\/strong>Public Wi-Fi can easily have other \u201ceyes\u201d viewing and capturing your information.<\/li><li><strong>Log out of apps containing sensitive data as soon as you are done using them.<\/strong>&nbsp; Many banking and credit card apps have an automatic timeout feature built in, but you do not want to risk leaving any account open and vulnerable.&nbsp; Make it a habit to log out when you\u2019re finished. &nbsp;<\/li><li><strong>Make sure your devices are protected with current antivirus software and that you install updates when they are available.&nbsp; <\/strong>Software and apps are constantly updating to keep you safe as fraudsters develop more sophisticated means of gaining access to your information. Sometimes a patch of a program will be updated and other times an entire operating system is improved.&nbsp; For the best protection, keep your devices backed up regularly and current with the most recent versions.<\/li><li><strong>Watch out for new scams.<\/strong>&nbsp; While you may already be on guard for<a href=\"https:\/\/frischfinancial.com\/staging\/blog\/telephone-scams\/\"> telephone<\/a> and<a href=\"https:\/\/frischfinancial.com\/staging\/blog\/protect-yourself-from-coronavirus-scams\/\"> pandemic-related scams<\/a>, our society\u2019s general comfort level with social media leaves us vulnerable and con artists continue to develop ways to exploit this.&nbsp;<\/li><\/ul>\n\n\n\n<p><strong>There are many more versions of scams out there, but here&#8217;s a few popular examples:<\/strong><\/p>\n\n\n\n<ol><li><strong>FACEBOOK &#8211;<\/strong> Maybe you get a \u201cfriend request\u201d from someone you don\u2019t exactly remember, but you see that their request has already been accepted by a dozen of your known friends from high school, so you assume this is how this person knows you.&nbsp; Soon after you accept their request, this individual starts a dialogue with you directly by way of online chat or email, and they know enough about your past \u201cshared\u201d experiences that you let your guard down.&nbsp; This may go on for weeks or months but ends with them asking you for money by way of a sad situation or a great opportunity.&nbsp; In reality, this is a con artist, not a long-lost friend.&nbsp; Scammers are willing to play the long game, earning your trust, before asking for anything. &nbsp;<\/li><li><strong>ROMANCE SCAM<\/strong> is a variation of the FACEBOOK scam only they will use dating sites to establish a connection and always have an excuse not to meet in person.<\/li><li><strong>QUICK MONEY WORKING FROM HOME \u2013 <\/strong>You may be solicited by email, phone or even LinkedIn message.&nbsp; You\u2019re getting a special opportunity to make quick cash while working from home.&nbsp; Once you\u2019re \u201chired\u201d your personal information, including social security number and bank account number, will be collected to \u201cpay\u201d you by direct deposit. The best case with this scam is that there is no job, and your information has been compromised.&nbsp; In the worst cases, victims have unwittingly become money launderers, and sometimes criminally liable, as their accounts are used to move stolen or bad checks.&nbsp; &nbsp;&nbsp;<\/li><li><strong>OVERPAYMENT SCAM \u2013 <\/strong>You might be selling an item online.&nbsp; A \u201cbuyer\u201d invents a reason he has to overpay for the item when sending you the money and wants you to wire back the difference right away (before his payment clears your account).&nbsp; Victimized sellers find that the buyer\u2019s payment was fake, and they have lost the money they refunded to the con artist.&nbsp; This scam has also been used repeatedly to target small businesses providing services.<\/li><\/ol>\n\n\n\n<ul><li><strong>Do not give out personal information to anyone who has contacted you unexpectedly.<\/strong>&nbsp; A skilled fraudster may contact you pretending to be a representative of a legitimate company or organization who is trying to help you \u201cunlock your suspended account\u201d or solve some other fictitious problem. They can verify certain information about you but will then press you for more confidential details like your social security number, passwords, or bank account information.<\/li><li><strong>Never make a payment to someone who has contacted you about a bill you were unaware of.<\/strong>&nbsp; While it\u2019s true that you might receive legitimate invoices through email or have the ability to make payments through online apps, it\u2019s most likely you will recognize those charges and have an established, secure way to pay those bills.&nbsp; The biggest red flag that \u201coverdue bill\u201d scams have in common is a sense of urgency and stress.&nbsp; Scammers are hoping you won\u2019t think as clearly when rushed.&nbsp; Always remember you can hang up the phone or ignore the email.&nbsp; If you have any question about the possibility of an overdue or overlooked bill, contact the service provider or agency directly using the phone number from your official account statements.&nbsp; Even if you owe money to an organization, there are procedures in place they will use to collect funds, and they are not as extreme as con artists would have you believe.&nbsp;<strong> <\/strong><\/li><\/ul>\n\n\n\n<p><strong>Some of the false pretenses and threats con artists may contact you with:<\/strong><\/p>\n\n\n\n<ol><li><strong>They are calling on behalf of your doctor.<\/strong>\u00a0 (They may not even know your doctor\u2019s name but will be willing to try in hopes that you will fill in the blanks for them!)\u00a0 You have a past due balance and if you don\u2019t pay it immediately, not only will your appointment be canceled but it will ruin your credit because they will put you in collections.<\/li><li><strong>They are from the IRS.<\/strong>\u00a0 You must pay your overdue taxes over the phone with them, or they will be sending the police to arrest you.<\/li><li><strong>They are a field agent from your electric company.\u00a0<\/strong> They are about to cut your power because you didn\u2019t pay the new federal charge added to your last bill.\u00a0 If you make a payment over the phone right now, they can stop the work order.\u00a0 \u00a0\u00a0<\/li><\/ol>\n\n\n\n<ul><li><strong>Monitor your credit and banking statements.<\/strong>&nbsp; In addition to this being good practice for your personal financial health, if you spot unfamiliar activity, there is a chance your virtual security has been breached.&nbsp; You might be vigilant about protecting your digital information at all times, only to discover that you are seeing unknown charges to your debit card after you filled your car with gas. &nbsp;It\u2019s possible there was a skimming device attached to a card reader at the pump.&nbsp; Some devices are virtually undetectable and can easily be missed.&nbsp; These skimming machines have been discovered in gas stations, grocery stores, major retailers and directly on ATM machines.&nbsp; While it may not be possible to spot the device, if you monitor your accounts for suspicious activity, you can work with your financial institution to reverse any invalid charges and replace any compromised debit cards. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li><li><strong>Always remain on guard.<\/strong>&nbsp; Think twice before sharing anything personal online.&nbsp; Even something as simple as posting a picture of your grandkids getting an award at school on your social media account can reveal details you wouldn\u2019t think of as relevant but could be a starting point for a con artist to enter your world.&nbsp; Use discretion and always keep your account settings private.<\/li><\/ul>\n\n\n\n<p>No one wants to feel as if they are constantly under attack, however exercising caution and a healthy dose of skepticism can be a good policy in the digital world we live in.&nbsp; Taking measures to guard our personal information and carefully choosing who we share details with can prevent us from becoming victims of cyberattacks or scams.&nbsp; If you have any questions about the ways you can protect yourself before or after a cybersecurity breach, please feel free to<a href=\"https:\/\/frischfinancial.com\/staging\/contact\/\"> contact us. &nbsp;<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What You Should Know so You Don&#8217;t Fall Victim to a Scam Whether it\u2019s a smartphone, laptop, tablet, or desktop computer, most of us are dependent on our connection to the internet at some point during the day.\u00a0 We use technology for school, work, and leisure without giving much thought to the dangers that wait [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5126,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>What You Should Know so You Don't Fall Victim to a Scam<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:separator -->\n<hr class=\"wp-block-separator\"\/>\n<!-- \/wp:separator -->\n\n<!-- wp:paragraph -->\n<p>Whether it\u2019s a smartphone, laptop, tablet, or desktop computer, most of us are dependent on our connection to the internet at some point during the day.&nbsp; We use technology for school, work, and leisure without giving much thought to the dangers that wait for us every time we log in, yet we should proceed with caution.&nbsp; Using many elaborate scams and creative ploys designed to steal your money or identity, cyberthieves will try to get your social security number, banking information, account numbers, birthdate, passwords, and anything else they can obtain. &nbsp;As it is much harder to undo damage than prevent it, it\u2019s important we take measures to protect our personal information whenever online so that we don\u2019t fall victim to internet scammers.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2><strong>Tips for Keeping Your Information Safe<\/strong><\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:list -->\n<ul><li><strong>Do not click on links or attachments you are not expecting.\u00a0 <\/strong>When opening emails in either your work or personal accounts, use caution.\u00a0 Even if it appears to be sent from someone you know, if you were not expecting to receive a communication with links or attachments, call the sender to verify authenticity before clicking on what might potentially be a malicious link or virus waiting to do harm.<\/li><li><strong>Use multifactor authentication whenever possible.<\/strong>\u00a0 An example is when you enter your username and password and then are sent a verification code by way of email, text, or mobile app to ensure that it is really you attempting to access the account.<\/li><li><strong>Do not reuse passwords.\u00a0 <\/strong>If a scammer finds out a password, they have tools to put it through software that sees what other sites it may \u201copen.\u201d\u00a0 This usually happens within minutes!\u00a0 You can be compromised on multiple platforms before you realize you\u2019ve been hacked.<\/li><li><strong>Do not use public Wi-Fi when accessing information that you want to keep secure.\u00a0 <\/strong>Public Wi-Fi can easily have other \u201ceyes\u201d viewing and capturing your information.<\/li><li><strong>Log out of apps containing sensitive data as soon as you are done using them.<\/strong>\u00a0 Many banking and credit card apps have an automatic timeout feature built in, but you do not want to risk leaving any account open and vulnerable.\u00a0 Make it a habit to log out when you\u2019re finished. \u00a0<\/li><li><strong>Make sure your devices are protected with current antivirus software and that you install updates when they are available.\u00a0 <\/strong>Software and apps are constantly updating to keep you safe as fraudsters develop more sophisticated means of gaining access to your information. Sometimes a patch of a program will be updated and other times an entire operating system is improved.\u00a0 For the best protection, keep your devices backed up regularly and current with the most recent versions.<\/li><li><strong>Watch out for new scams.<\/strong>\u00a0 While you may already be on guard for<a href=\"http:\/\/s876455381.onlinehome.us\/blog\/telephone-scams\/\"> telephone<\/a> and<a href=\"http:\/\/s876455381.onlinehome.us\/blog\/protect-yourself-from-coronavirus-scams\/\"> pandemic-related scams<\/a>, our society\u2019s general comfort level with social media leaves us vulnerable and con artists continue to develop ways to exploit this.\u00a0<\/li><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>There are many more versions of scams out there, but here's a few popular examples:<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list {\"ordered\":true} -->\n<ol><li><strong>FACEBOOK -<\/strong> Maybe you get a \u201cfriend request\u201d from someone you don\u2019t exactly remember, but you see that their request has already been accepted by a dozen of your known friends from high school, so you assume this is how this person knows you.&nbsp; Soon after you accept their request, this individual starts a dialogue with you directly by way of online chat or email, and they know enough about your past \u201cshared\u201d experiences that you let your guard down.&nbsp; This may go on for weeks or months but ends with them asking you for money by way of a sad situation or a great opportunity.&nbsp; In reality, this is a con artist, not a long-lost friend.&nbsp; Scammers are willing to play the long game, earning your trust, before asking for anything. &nbsp;<\/li><li><strong>ROMANCE SCAM<\/strong> is a variation of the FACEBOOK scam only they will use dating sites to establish a connection and always have an excuse not to meet in person.<\/li><li><strong>QUICK MONEY WORKING FROM HOME \u2013 <\/strong>You may be solicited by email, phone or even LinkedIn message.&nbsp; You\u2019re getting a special opportunity to make quick cash while working from home.&nbsp; Once you\u2019re \u201chired\u201d your personal information, including social security number and bank account number, will be collected to \u201cpay\u201d you by direct deposit. The best case with this scam is that there is no job, and your information has been compromised.&nbsp; In the worst cases, victims have unwittingly become money launderers, and sometimes criminally liable, as their accounts are used to move stolen or bad checks.&nbsp; &nbsp;&nbsp;<\/li><li><strong>OVERPAYMENT SCAM \u2013 <\/strong>You might be selling an item online.&nbsp; A \u201cbuyer\u201d invents a reason he has to overpay for the item when sending you the money and wants you to wire back the difference right away (before his payment clears your account).&nbsp; Victimized sellers find that the buyer\u2019s payment was fake, and they have lost the money they refunded to the con artist.&nbsp; This scam has also been used repeatedly to target small businesses providing services.<\/li><\/ol>\n<!-- \/wp:list -->\n\n<!-- wp:list -->\n<ul><li><strong>Do not give out personal information to anyone who has contacted you unexpectedly.<\/strong>\u00a0 A skilled fraudster may contact you pretending to be a representative of a legitimate company or organization who is trying to help you \u201cunlock your suspended account\u201d or solve some other fictitious problem. They can verify certain information about you but will then press you for more confidential details like your social security number, passwords, or bank account information.<\/li><li><strong>Never make a payment to someone who has contacted you about a bill you were unaware of.<\/strong>\u00a0 While it\u2019s true that you might receive legitimate invoices through email or have the ability to make payments through online apps, it\u2019s most likely you will recognize those charges and have an established, secure way to pay those bills.\u00a0 The biggest red flag that \u201coverdue bill\u201d scams have in common is a sense of urgency and stress.\u00a0 Scammers are hoping you won\u2019t think as clearly when rushed.\u00a0 Always remember you can hang up the phone or ignore the email.\u00a0 If you have any question about the possibility of an overdue or overlooked bill, contact the service provider or agency directly using the phone number from your official account statements.\u00a0 Even if you owe money to an organization, there are procedures in place they will use to collect funds, and they are not as extreme as con artists would have you believe.\u00a0<strong> <\/strong><\/li><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p><strong>Some of the false pretenses and threats con artists may contact you with:<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list {\"ordered\":true} -->\n<ol><li>They are calling on behalf of your doctor.&nbsp; (They may not even know your doctor\u2019s name but will be willing to try in hopes that you will fill in the blanks for them!)&nbsp; You have a past due balance and if you don\u2019t pay it immediately, not only will your appointment be canceled but it will ruin your credit because they will put you in collections.<\/li><li>They are from the IRS.&nbsp; You must pay your overdue taxes over the phone with them, or they will be sending the police to arrest you.<\/li><li>They are a field agent from your electric company.&nbsp; They are about to cut your power because you didn\u2019t pay the new federal charge added to your last bill.&nbsp; If you make a payment over the phone right now, they can stop the work order.&nbsp; &nbsp;&nbsp;<\/li><\/ol>\n<!-- \/wp:list -->\n\n<!-- wp:list -->\n<ul><li><strong>Monitor your credit and banking statements.<\/strong>&nbsp; In addition to this being good practice for your personal financial health, if you spot unfamiliar activity, there is a chance your virtual security has been breached.&nbsp; You might be vigilant about protecting your digital information at all times, only to discover that you are seeing unknown charges to your debit card after you filled your car with gas. &nbsp;It\u2019s possible there was a skimming device attached to a card reader at the pump.&nbsp; Some devices are virtually undetectable and can easily be missed.&nbsp; These skimming machines have been discovered in gas stations, grocery stores, major retailers and directly on ATM machines.&nbsp; While it may not be possible to spot the device, if you monitor your accounts for suspicious activity, you can work with your financial institution to reverse any invalid charges and replace any compromised debit cards. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li><li><strong>Always remain on guard.<\/strong>&nbsp; Think twice before sharing anything personal online.&nbsp; Even something as simple as posting a picture of your grandkids getting an award at school on your social media account can reveal details you wouldn\u2019t think of as relevant but could be a starting point for a con artist to enter your world.&nbsp; Use discretion and always keep your account settings private.<\/li><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>No one wants to feel as if they are constantly under attack, however exercising caution and a healthy dose of skepticism can be a good policy in the digital world we live in.&nbsp; Taking measures to guard our personal information and carefully choosing who we share details with can prevent us from becoming victims of cyberattacks or scams.&nbsp; If you have any questions about the ways you can protect yourself before or after a cybersecurity breach, please feel free to<a href=\"http:\/\/s876455381.onlinehome.us\/contact\/\"> contact us. &nbsp;<\/a><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"1080"},"categories":[16],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Protections - Frisch Financial Group<\/title>\n<meta name=\"description\" content=\"What you should know so you don&#039;t fall victim to a scam. Whether it&#039;s a smartphone, laptop, tablet, or desktop\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/#organization\",\"name\":\"Frisch Financial Group\",\"url\":\"https:\/\/frischfinancial.com\/staging\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Frisch Financial Group\"},\"image\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/#website\",\"url\":\"https:\/\/frischfinancial.com\/staging\/\",\"name\":\"Frisch Financial Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/frischfinancial.com\/staging\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/frischfinancial.com\/staging\/wp-content\/uploads\/2021\/02\/frisch-cybersecurity.png\",\"contentUrl\":\"https:\/\/frischfinancial.com\/staging\/wp-content\/uploads\/2021\/02\/frisch-cybersecurity.png\",\"width\":700,\"height\":466},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#webpage\",\"url\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/\",\"name\":\"Cybersecurity Protections - Frisch Financial Group\",\"isPartOf\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#primaryimage\"},\"datePublished\":\"2021-02-13T15:03:28+00:00\",\"dateModified\":\"2021-02-13T15:20:31+00:00\",\"description\":\"What you should know so you don't fall victim to a scam. Whether it's a smartphone, laptop, tablet, or desktop\",\"breadcrumb\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/frischfinancial.com\/staging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Protections\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#webpage\"},\"author\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/#\/schema\/person\/27c3a1b853d266086608723e20219f06\"},\"headline\":\"Cybersecurity Protections\",\"datePublished\":\"2021-02-13T15:03:28+00:00\",\"dateModified\":\"2021-02-13T15:20:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#webpage\"},\"wordCount\":1579,\"publisher\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/#organization\"},\"image\":{\"@id\":\"https:\/\/frischfinancial.com\/staging\/cybersecurity-protections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/frischfinancial.com\/staging\/wp-content\/uploads\/2021\/02\/frisch-cybersecurity.png\",\"articleSection\":[\"Financial Planning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/#\/schema\/person\/27c3a1b853d266086608723e20219f06\",\"name\":\"Joyce Streithorst\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/frischfinancial.com\/staging\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bb3e0507894a372aee055dbec8088b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bb3e0507894a372aee055dbec8088b?s=96&d=mm&r=g\",\"caption\":\"Joyce Streithorst\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/posts\/5125"}],"collection":[{"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/comments?post=5125"}],"version-history":[{"count":7,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/posts\/5125\/revisions"}],"predecessor-version":[{"id":5137,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/posts\/5125\/revisions\/5137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/media\/5126"}],"wp:attachment":[{"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/media?parent=5125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/categories?post=5125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/frischfinancial.com\/staging\/wp-json\/wp\/v2\/tags?post=5125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}