{"id":16770,"date":"2021-10-26T02:32:27","date_gmt":"2021-10-26T06:32:27","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=16770"},"modified":"2024-09-11T23:52:46","modified_gmt":"2024-09-12T03:52:46","slug":"how-biometrics-can-counter-identity-theft","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/","title":{"rendered":"How Biometrics Can Counter Identity Theft"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">May I know your password?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No one in today\u2019s world is fool enough to disclose their passwords that easily. Still, cybercriminals have successfully gathered numerous account details and used them to enter your social media account forcefully.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ordinary people know this method as identity theft. A cybercriminal either uses your account or creates a fake one similar to yours and uses it for notorious purposes. For instance, they can use it to ask for money from your friends, publish sensitive material under your name to harm your reputation, and much more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity theft is a common problem many victims have faced in their lifetime. Biometrics is a step forward to tackle this threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, how secure biometric authentication is still questionable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, I created this guide to answer the reliability of biometric authentication to save yourself from identity theft. Further, we will also discuss the necessary measures to make sure no one can steal your identity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, if you are ready to open your eyes, let\u2019s begin.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is Identity Theft?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Identity theft<\/span><span style=\"font-weight: 400;\"> is when someone uses your credentials to steal your identity. Cybercriminals can sniff into the trash bins to find your bank statement, or they can hack your computer to gain control over your account. In any case, the victim is commonly targeted for financial fraud, bad credit, or unauthorized transactions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A personal motive usually steers identity theft in the case of social media accounts. Let\u2019s say a bully is disturbing some nerd on the playground. So the nerd decides to take revenge by uploading shameful posts from the bully\u2019s account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity theft is a serious crime, no matter what is the motive behind it.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How Biometrics Comes to Rescue?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">One common thing behind all identity theft scams is the exposure of credentials and passwords.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No cybercriminals can steal your identity unless he has your account password. There are several ways to gather that information. For instance, insider news, hacking, sending malware to your device, and much more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even if you haven\u2019t told your password to anyone or it is not saved on your device, a hacker can sniff it out using security questions. Answers to your security questions are readily available on your social media accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What these cybercriminals can not steal (easily) is your biometric information. Let\u2019s see what personal data comes under the biometric section.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Fingerprints<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Humans have shifted from using their thumbprints to sign a document to create a unique signature. However, thumbprints or fingerprints are finding their way back into the world through digital mediums.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is a well-known fact that every person on this planet shares a different fingerprint, even twins. Therefore, they become a reliable way to mark unique identities.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Facial Recognition<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Facial recognition deals with collecting your facial structure for identification. It is the weakest section of all biometric authentication methods, which led to a series of iterations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initially, facial recognition was so dim that you could have fooled it using a picture. Later, developers introduced eye movements to make it robust.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The facial recognition technology currently on the market uses an infrared grid to determine your facial structure. Thus, making the technology more robust and reliable.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Voice Recognition<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A voice recognition model registers your speech frequency and pattern to authenticate your identity. You might have seen it in movies where a person unlocks a door by using voice commands.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A hacker would need your voice samples, your exact password, and a mind-blowing skill to mimic your voice to use it against you. Thus, making it much more secure than a traditional password.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Retina\/Iris Scan<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Firstly, keep in mind that both the <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/iris-recognition-2\/iris-recognition-vs-retina-scanning-what-are-the-differences\/\"><span style=\"font-weight: 400;\">Retina scan and Iris scan<\/span><\/a><span style=\"font-weight: 400;\"> are different things. However, since they both deal with your eyes, let us club them for understanding\u2019s sake.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similar to fingerprints, every person\u2019s retinal and iris pattern is unique. In general, eye scanning technology registers your eye pattern and uses it to verify your identity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two significant facts govern the robustness and reliability of this method.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No two people share the same eye patterns.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An amputated eye decomposes quickly and won\u2019t come in any use to criminals.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">How Biometrics Can Protect you from Identity Theft<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Now that we understand what different biometric identification processes are let\u2019s see how they can protect us from identity theft.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">You Become the Password<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">First and foremost comes the fact that you become the password while using biometric technology. Unlike security questions to use two-factor authentication, you become the password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The traditional ways of two-factor authentication either use your phone for OTP or use security questions to confirm your identity. Both of which are easier to crack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once you have entered your biometric details into a system, it becomes nearly impossible for hackers to access your account or device.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Ever-evolving Technology<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Biometric authentication has recently found its way into daily use. We can not imagine using our fingerprint to open a phone in the last decade.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even being new, biometric technology has shown promise to protect individual data significantly. This technology has evolved enormously in a few years. We can expect it to reach new highs in the future as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since developers are trying hard to make biometric authentication more robust each passing day, you can think of using them everywhere, from grocery transactions to cross-country verification, in the coming years.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Extra Measures to Protect your Identity<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">We are hoping for a bright future where identity theft becomes minimal to no threat for ordinary people. Still, biometric authentication has not yet captured every field, device, and area. Therefore, there is a better scope for it in the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meanwhile, it also raises the vulnerabilities this technology has to deal with currently. Developers work days and nights to make it more secure for us. What we can do is take the best precautions to protect ourselves.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some actionable tips you can apply quickly to feel safer with your identity.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Update all your programs to the latest versions<\/b><span style=\"font-weight: 400;\">. Hackers usually benefit from security holes to breach your device. By keeping your software up to date, you make sure of installing a security patch to eliminate previously existing vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Change your passwords frequently<\/b><span style=\"font-weight: 400;\">. You will come across this advice every time you read about cybersecurity. Changing your passwords in a timely fashion helps you keep your data safe. Hackers won\u2019t take much effort to crack the same account password again and again.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use a password manager<\/b><span style=\"font-weight: 400;\">. If you find it difficult to remember passwords, I suggest using a password manager. A good password manager would only require a master password to control all other passwords. You can even keep your fingerprint as the master password for many devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Never reveal answers to security questions publicly<\/b><span style=\"font-weight: 400;\">. Your security questions are usually the only barrier for a hacker to enter your system. Avoid filling online forms for gifts or revealing such information to unknown people.\u00a0<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Although biometric authentication is relatively new in the market, it has proved to be a significant step in personal identification and data protection.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We can also expect it to become more robust, complementing blockchain technology. It is reliable for securing your device and personal information still I suggest taking extra measures to keep yourself safe. Cybercriminals are also evolving, and they already have tools to break previous biometric technologies. It is just a matter of time for cybercriminals to find a way to bypass your biometrics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, the best way to keep your account safe is by using all possible security measures. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>May I know your password? No one in today\u2019s world is fool enough to disclose their passwords that easily. Still,<\/p>\n","protected":false},"author":398,"featured_media":2564,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-16770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Biometrics Can Counter Identity Theft - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Biometrics Can Counter Identity Theft - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"May I know your password? No one in today\u2019s world is fool enough to disclose their passwords that easily. Still,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T06:32:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-12T03:52:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2013\/06\/Medical-Identity-Theft-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\"},\"headline\":\"How Biometrics Can Counter Identity Theft\",\"datePublished\":\"2021-10-26T06:32:27+00:00\",\"dateModified\":\"2024-09-12T03:52:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\"},\"wordCount\":1266,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\",\"name\":\"How Biometrics Can Counter Identity Theft - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2021-10-26T06:32:27+00:00\",\"dateModified\":\"2024-09-12T03:52:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How Biometrics Can Counter Identity Theft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Biometrics Can Counter Identity Theft - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"How Biometrics Can Counter Identity Theft - Digital Transformation of Government Services","og_description":"May I know your password? No one in today\u2019s world is fool enough to disclose their passwords that easily. Still,","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2021-10-26T06:32:27+00:00","article_modified_time":"2024-09-12T03:52:46+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2013\/06\/Medical-Identity-Theft-1.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0"},"headline":"How Biometrics Can Counter Identity Theft","datePublished":"2021-10-26T06:32:27+00:00","dateModified":"2024-09-12T03:52:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/"},"wordCount":1266,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/","name":"How Biometrics Can Counter Identity Theft - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2021-10-26T06:32:27+00:00","dateModified":"2024-09-12T03:52:46+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-biometrics-can-counter-identity-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How Biometrics Can Counter Identity Theft"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/16770"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=16770"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/16770\/revisions"}],"predecessor-version":[{"id":21391,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/16770\/revisions\/21391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/2564"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=16770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=16770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=16770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}