{"id":2833,"date":"2014-01-07T03:00:06","date_gmt":"2014-01-07T08:00:06","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=2833"},"modified":"2025-04-23T08:04:19","modified_gmt":"2025-04-23T12:04:19","slug":"biometrics-data-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/","title":{"rendered":"Biometrics and Data Security"},"content":{"rendered":"<p>&nbsp;<\/p>\n<figure id=\"attachment_2835\" aria-describedby=\"caption-attachment-2835\" style=\"width: 200px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2835\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers-200x300.jpg\" alt=\"biometric identification management technology can be used to protect corporate data\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers-200x300.jpg 200w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers-606x905.jpg 606w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers.jpg 685w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/a><figcaption id=\"caption-attachment-2835\" class=\"wp-caption-text\">As more companies experience data loss, it&#8217;s time to look at using biometrics for data security.<\/figcaption><\/figure>\n<p><strong>The following guest post was written by Anne Matthews, a professional data security blogger.<\/strong><\/p>\n<p>A few years ago, the popular UK insurance company Zurich, was fined over <strong><a title=\"2.2 million pounds\" href=\"https:\/\/www.bbc.co.uk\/news\/business-11070217\" target=\"_blank\" rel=\"noopener noreferrer\">2.2 million pounds<\/a><\/strong> by the Financial Services Authority for losing the data of over <strong><a title=\"46,000 customers\" href=\"https:\/\/www.bbc.co.uk\/news\/business-11070217\" target=\"_blank\" rel=\"noopener noreferrer\">46,000 customers<\/a><\/strong>. According to the BBC, the data was lost during a routine data transfer. In the article, the FSA stated that Zurich failed to secure the data adequately, so it was easily transferable to a storage device and lacked encryption. Sadly, the entire incident could have been prevented by adding extra security measures to their data transfer methods.<\/p>\n<p>Data loss is a scary prospect for businesses of any size. It causes loss of income, unnecessary downtime and in some cases, irreversible damage to the brand. In a recent survey conducted by <strong>Carbonite<\/strong>, respondents said that it would take 16 days to recreate or recover their lost files and nearly a third of them said they would <em>never <\/em>be able to recover or recreate all of their data, if it were lost. Unfortunately, this type of loss happens every day and Boston Computing warns that <strong><a href=\"https:\/\/www.bostoncomputing.net\/consultation\/databackup\/statistics\/\">60%<\/a><\/strong> of businesses will never reopen after data goes missing.<\/p>\n<h2>Risks Rated to Data Loss<\/h2>\n<p>If your business makes use of any electronic storage medium, it\u2019s at risk of data loss. Natural disasters, break-ins, glitches and damage can all cause businesses to lose valuable information. This information is particularly at risk if it\u2019s being accessed through the Internet. Cyber criminals can phish passwords, hack databases and infect systems to siphon valuable data. The Cancer Care Group, located in Indianapolis, was the latest victim of data theft. The thief made off with a laptop that contained the information of over 55,000 patients, which included identification details and medical records. Unfortunately, the computer hasn\u2019t been retrieved, but the medical group is taking no chances on it ever happening in the future.<\/p>\n<p>The sad truth is that it takes situations like these for businesses to realize that data storage is a tricky game; and this game often ends badly if security measures aren\u2019t taken to prevent data loss. Passwords just aren\u2019t enough for tech savvy criminals, and it definitely isn\u2019t enough to retrieve data if it\u2019s lost due to technical glitches or natural disasters.<\/p>\n<h2>Biometrics for Added Security<\/h2>\n<p>One of the best ways to adequately secure your data is to encrypt it. This adds an additional measure of security to your system so that certain viruses and malware can\u2019t penetrate it. It also makes your data twice as hard for cyber criminals to hack into. Another measure of security that big businesses and medical facilities are starting to use is biometrics. Biometrics is a level of security that requires biological signs for data access. This includes retinal scans, fingerprints, voice patterns and even DNA. According to Raconteur, the most effective form of <strong><a title=\"biometric authentication\" href=\"https:\/\/raconteur.net\/infographics\/biometrics-by-numbers\" target=\"_blank\" rel=\"noopener noreferrer\">biometric authentication<\/a><\/strong> is vein pattern recognition. However, Voice Trust states that <strong>90% of people<\/strong> are comfortable with voice biometrics for added security.<\/p>\n<p>Hospitals are planning to use biometrics as a way to accurately identify patients and to access patient medical records. This minimizes the risk of record mix-ups and it improves treatment times for critical patients who aren\u2019t able to identify themselves. Businesses often use biometrics to secure laptops, vaults, computers and premises. Governments overseas are also utilizing biometrics to secure voting during elections. Since the only person who can access this information is the person linked to it, no thief can gain access.<\/p>\n<p>In natural disasters, prevention is the best key to securing data. For this reason, most businesses choose to add cloud storage to their contingency plans. By backing up data on a server located off-premise, there is little to no risk of data loss in the event of a storm or glitch. Once the premise is safe to resume business, the user logs into the cloud system and picks up where they left off. Google docs uses cloud storage, so if you use Google apps for business, you\u2019ll always be able to retrieve your information as long as you have the internet.<\/p>\n<h2>Disaster Recovery Planning and Data Retrieval<\/h2>\n<p>If your device is damaged and not working, it may still be possible to have the data recovered. In fact, smart phones and storage devices can still have data extracted from them even if they are no longer functioning. In some cases the data is gone for good, but it many cases businesses that offer data recovery services like CBL can still recover the data if you mail in the device.<\/p>\n<p>As always, the best method of safety is prevention, so it\u2019s best to be prepared for any eventuality. Even if your business is in an area that\u2019s not likely to see the effects from a natural disaster, it\u2019s better to be safe. As you can see from the story in the intro, disasters can happen in ways you\u2019d never expect. So, backup your data, invest in biometrics and educate your employees on mobile safety; it\u2019s the only way to keep your data safe and your business running smoothly.<\/p>\n<p><b><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/Anne-guest-blogger.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2841\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/Anne-guest-blogger-258x300.jpg\" alt=\"biometrics and data security\" width=\"93\" height=\"108\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/Anne-guest-blogger-258x300.jpg 258w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/Anne-guest-blogger-606x703.jpg 606w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/Anne-guest-blogger.jpg 768w\" sizes=\"(max-width: 93px) 100vw, 93px\" \/><\/a>About the author:<\/b> <strong><a title=\"Anne Matthews\" href=\"https:\/\/plus.google.com\/106781402993482081528\" target=\"_blank\" rel=\"noopener noreferrer\">Anne Matthews<\/a> is a professional blogger who enjoys writing about data security. She currently writes blogs for<\/strong> CBL Data Recovery.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14px; font-weight: bold; line-height: 21px;\">References:<\/span><\/p>\n<p><a href=\"https:\/\/www.cbldatarecovery.com\/media-coverage\/news-cp248\/\">https:\/\/www.cbldatarecovery.com\/media-coverage\/news-cp248\/<br \/>\n<\/a><a href=\"https:\/\/www.infosecurity-magazine.com\/view\/28466\/michigan-healthcare-providers-turn-to-biometrics-for-patient-data-security\">https:\/\/www.infosecurity-magazine.com\/view\/28466\/michigan-healthcare-providers-turn-to-biometrics-for-patient-data-security<br \/>\n<\/a><a href=\"https:\/\/www.computerdealernews.com\/slideshows\/the-top-10-data-disasters-for-2013\">https:\/\/www.computerdealernews.com\/slideshows\/the-top-10-data-disasters-for-2013<br \/>\n<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ghanaian_general_election,_2012#Biometric_Voters_Registration\">https:\/\/en.wikipedia.org\/wiki\/Ghanaian_general_election,_2012#Biometric_Voters_Registration<br \/>\n<\/a><a href=\"https:\/\/www.theregister.co.uk\/2007\/11\/27\/biometrics_not_magic_bullet\/\">https:\/\/www.theregister.co.uk\/2007\/11\/27\/biometrics_not_magic_bullet\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; The following guest post was written by Anne Matthews, a professional data security blogger. A few years ago, the<\/p>\n","protected":false},"author":398,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometrics","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[396,399,39,6,397,398,400,196],"class_list":["post-2833","post","type-post","status-publish","format-standard","hentry","category-guest-blog-posts","tag-anne-matthews","tag-backup-your-data","tag-biometric","tag-biometrics","tag-biometrics-for-data-security","tag-data-loss","tag-data-protection","tag-guest-post"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics and Data Security - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics and Data Security - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-07T08:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T12:04:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers-200x300.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\"},\"headline\":\"Biometrics and Data Security\",\"datePublished\":\"2014-01-07T08:00:06+00:00\",\"dateModified\":\"2025-04-23T12:04:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\"},\"wordCount\":947,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Anne Matthews\",\"backup your data\",\"biometric\",\"biometrics\",\"biometrics for data security\",\"data loss\",\"data protection\",\"guest post\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\",\"name\":\"Biometrics and Data Security - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2014-01-07T08:00:06+00:00\",\"dateModified\":\"2025-04-23T12:04:19+00:00\",\"description\":\"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics and Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics and Data Security - Digital Transformation of Government Services","description":"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics and Data Security - Digital Transformation of Government Services","og_description":"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2014-01-07T08:00:06+00:00","article_modified_time":"2025-04-23T12:04:19+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/01\/data-servers-200x300.jpg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0"},"headline":"Biometrics and Data Security","datePublished":"2014-01-07T08:00:06+00:00","dateModified":"2025-04-23T12:04:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/"},"wordCount":947,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Anne Matthews","backup your data","biometric","biometrics","biometrics for data security","data loss","data protection","guest post"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/","name":"Biometrics and Data Security - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2014-01-07T08:00:06+00:00","dateModified":"2025-04-23T12:04:19+00:00","description":"As more companies face data breaches and data loss, is the time right to look at biometrics for ID to protect sensitive data?","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics and Data Security"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2833"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=2833"}],"version-history":[{"count":15,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2833\/revisions"}],"predecessor-version":[{"id":13572,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2833\/revisions\/13572"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=2833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=2833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=2833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}