{"id":20470,"date":"2019-10-15T11:30:19","date_gmt":"2019-10-15T11:30:19","guid":{"rendered":"https:\/\/www.heartinternet.uk\/blog\/?p=20470"},"modified":"2019-10-15T11:30:19","modified_gmt":"2019-10-15T11:30:19","slug":"top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure","status":"publish","type":"post","link":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/","title":{"rendered":"Top cybersecurity risks facing your business (and how to stay secure)"},"content":{"rendered":"<p>It seems like every day there\u2019s a new report or an alert of a high-profile data breach that affected a hugely successful company. In reality, the numbers are worse.<\/p>\n<p>According to a Clark School study at the University of Maryland, <a href=\"https:\/\/www.securitymagazine.com\/articles\/87787-hackers-attack-every-39-seconds\">there is a hacker attack every 39 seconds<\/a>. What&#8217;s more, it&#8217;s not just big companies that are being targeted. A surprising <a href=\"https:\/\/www.cybintsolutions.com\/industries-likely-to-get-hacked\/\">65% of cyberattacks are aimed at small and medium-sized businesses<\/a>.<\/p>\n<p>And what happens when they do get hacked?<\/p>\n<p>Attacks don&#8217;t just result in system downtime, loss of productivity, theft of information assets and lawsuits or fines. They can also cause significant damage to a company\u2019s reputation which can result in loss of customers and revenue.<\/p>\n<p>Check out our infographic for the top cybersecurity risks in 10 statistics and then read on for more details on the threats and how to combat them:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20477\" src=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/heart-internet-cybersecurity-infographic.jpg\" alt=\"\" width=\"950\" height=\"4371\" \/><\/p>\n<h3>Top cybersecurity risks and threats to your business<\/h3>\n<p>With the significant increase in cyberattacks, the risks of a lack of cybersecurity are more widely talked about.<\/p>\n<p>These risks include:<\/p>\n<ul>\n<li><strong>Compromised data<\/strong>. Businesses today rely heavily on the data they collect, whether it\u2019s market research, website analytics data, account details or the personal information of customers. When a site is hacked, it\u2019s not only that the data gets stolen but the hacker can also use, sell, alter or expose sensitive information customer information, including credit card information, intellectual properly, financial information, employee records and more.<\/li>\n<li><strong>Damaged reputation<\/strong>. No customer wants to hear that the company they trusted to keep their data safe has been hacked. The next obvious step for most people will be to leave the business and go elsewhere. This results not only in a damaged reputation but also in a loss of customers and revenue.<\/li>\n<li><strong>Financial repercussions and costly recovery expenses. <\/strong>A cyberattack not only puts information at risk but it can also have devastating financial repercussions. Whether it\u2019s in the form of lawsuits or fines, system downtime, loss of productivity, acquiring new software or the lengthy process of restoring lost data, the loss of both time and money can cripple a business. Curious to know how much? According to a recent report, <a href=\"https:\/\/smallbiztrends.com\/2017\/01\/cyber-security-statistics-small-business.html\">companies spent an average of $879,582 because of damage or theft of IT assets<\/a>. In addition, disruption to normal operations cost an average of $955,429.<\/li>\n<\/ul>\n<p>If you want to prevent these losses and keep your site and data safe and secure, you need to get a better understanding of what leads to these cyberattacks.<\/p>\n<p>Here are some of the weakest links for most businesses when it comes to cybersecurity.<\/p>\n<p><strong>People<\/strong><\/p>\n<p>Did you know that 95% of cybersecurity breaches are attributed to human error?<\/p>\n<p>In other words, the majority of data breaches are caused by people, most often your own employees making simple mistakes like visiting malware-infected sites, falling for phishing attempts, bringing compromised USB drives or unprotected personal devices to work.<\/p>\n<p>So what can you do to minimise cybersecurity risks from people:<\/p>\n<ul>\n<li>Provide cybersecurity training. Did you know that 95% of phishing attacks are linked to software installation on a user&#8217;s device? That\u2019s why it\u2019s critical to educate your employees about phishing attacks and malware so they&#8217;re informed and less likely to do something that can compromise your cybersecurity.<\/li>\n<li>Limit their access to only the specific information and resources they need to do their job.<\/li>\n<li>With 230,000 of new malware samples produced every day, it\u2019s essential to use malware scanning software to quickly identify potentially dangerous malware in email attachments and on websites and block users from downloading them in the first place.<\/li>\n<\/ul>\n<p><strong>Passwords<\/strong><\/p>\n<p>Weak passwords provide hackers with an easy way to attack a website. That&#8217;s why it&#8217;s important to ensure that any accounts associated with your site are secured by a strong password and a two-factor authentication, if possible. Make it clear to your employees as well as to your customers that they shouldn&#8217;t reuse passwords from other online accounts.<\/p>\n<p><strong>Patch management<\/strong><\/p>\n<p>Out-of-date or missing patches in software and apps can also make your site vulnerable to cyberattacks. So make sure that any technology you use is up-to-date and that you create and maintain a rigorous patching schedule.<\/p>\n<p>Another thing you can do is to use website security solution to actively monitor and scan your site for indications of compromise.<\/p>\n<p>Why is this important? Because a hacker usually spends an average of 146 days within a network before being detected. So by the time you realise a breach has occurred, it\u2019s too late and the damage is done. That\u2019s why taking regular action to audit and secure a network is essential.<\/p>\n<p>Our <a href=\"https:\/\/www.heartinternet.uk\/website-security\">Website Security tool, which is powered by Sucuri<\/a>, can help with that. It actively scans your site to find malicious payloads, malware locations, security issues, and blocklist status with major authorities. If the site is found to be infected, you\u2019ll get a warning message with further details, including payloads and blocklist warnings.<\/p>\n<h3>In conclusion<\/h3>\n<p>Cyber attackers are smart and they\u2019re constantly finding new ways to access your sensitive data. You can\u2019t afford to ignore the importance of website security, not when there\u2019s so much at stake, including employee and customer data, reputation, revenue as well as sensitive company information.<\/p>\n<p>While using our Website Security tool to protect your website may seem like an added expense, the cost of doing nothing could spell the end for your business. So take steps now to assess your current situation and protect your business against a cyberattack.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a huge issue, but many small businesses don&#8217;t take it seriously. Our infographic explains the threats you face and we also explain how to stay safe. Use it to protect your own site, and then spread the message to your clients.<\/p>\n","protected":false},"author":2,"featured_media":20479,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":{"0":"post-20470","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-your-business"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top cybersecurity risks facing your business (and how to stay secure) - Heart Internet<\/title>\n<meta name=\"description\" content=\"Cybersecurity is a huge issue and small businesses can be at the biggest risk of a security breach. Find out what threats you face and how to stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top cybersecurity risks facing your business (and how to stay secure) - Heart Internet\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a huge issue and small businesses can be at the biggest risk of a security breach. Find out what threats you face and how to stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Heart Internet\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/heartinternet\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-15T11:30:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"619\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eliot Chambers-Ostler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@heartinternet\" \/>\n<meta name=\"twitter:site\" content=\"@heartinternet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eliot Chambers-Ostler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\"},\"author\":{\"name\":\"Eliot Chambers-Ostler\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28\"},\"headline\":\"Top cybersecurity risks facing your business (and how to stay secure)\",\"datePublished\":\"2019-10-15T11:30:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\"},\"wordCount\":923,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg\",\"articleSection\":[\"Your Business\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\",\"name\":\"Top cybersecurity risks facing your business (and how to stay secure) - Heart Internet\",\"isPartOf\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg\",\"datePublished\":\"2019-10-15T11:30:19+00:00\",\"description\":\"Cybersecurity is a huge issue and small businesses can be at the biggest risk of a security breach. Find out what threats you face and how to stay safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg\",\"width\":1100,\"height\":619},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.heartinternet.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top cybersecurity risks facing your business (and how to stay secure)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heartblog.victory.digital\/#website\",\"url\":\"https:\/\/heartblog.victory.digital\/\",\"name\":\"Heart Internet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heartblog.victory.digital\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\",\"name\":\"Heart Internet\",\"url\":\"https:\/\/heartblog.victory.digital\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp\",\"width\":992,\"height\":252,\"caption\":\"Heart Internet\"},\"image\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/heartinternet\/\",\"https:\/\/x.com\/heartinternet\",\"https:\/\/www.linkedin.com\/company\/heart-internet-ltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28\",\"name\":\"Eliot Chambers-Ostler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg\",\"caption\":\"Eliot Chambers-Ostler\"},\"url\":\"https:\/\/www.heartinternet.uk\/blog\/author\/eliot-chambers-ostler\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top cybersecurity risks facing your business (and how to stay secure) - Heart Internet","description":"Cybersecurity is a huge issue and small businesses can be at the biggest risk of a security breach. Find out what threats you face and how to stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/","og_locale":"en_GB","og_type":"article","og_title":"Top cybersecurity risks facing your business (and how to stay secure) - Heart Internet","og_description":"Cybersecurity is a huge issue and small businesses can be at the biggest risk of a security breach. Find out what threats you face and how to stay safe.","og_url":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/","og_site_name":"Heart Internet","article_publisher":"https:\/\/www.facebook.com\/heartinternet\/","article_published_time":"2019-10-15T11:30:19+00:00","og_image":[{"width":1100,"height":619,"url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg","type":"image\/jpeg"}],"author":"Eliot Chambers-Ostler","twitter_card":"summary_large_image","twitter_creator":"@heartinternet","twitter_site":"@heartinternet","twitter_misc":{"Written by":"Eliot Chambers-Ostler","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#article","isPartOf":{"@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/"},"author":{"name":"Eliot Chambers-Ostler","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28"},"headline":"Top cybersecurity risks facing your business (and how to stay secure)","datePublished":"2019-10-15T11:30:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/"},"wordCount":923,"commentCount":0,"publisher":{"@id":"https:\/\/heartblog.victory.digital\/#organization"},"image":{"@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg","articleSection":["Your Business"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/","url":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/","name":"Top cybersecurity risks facing your business (and how to stay secure) - Heart Internet","isPartOf":{"@id":"https:\/\/heartblog.victory.digital\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg","datePublished":"2019-10-15T11:30:19+00:00","description":"Cybersecurity is a huge issue and small businesses can be at the biggest risk of a security breach. Find out what threats you face and how to stay safe.","breadcrumb":{"@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#primaryimage","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2019\/03\/red-light-keyboard.jpg","width":1100,"height":619},{"@type":"BreadcrumbList","@id":"https:\/\/www.heartinternet.uk\/blog\/top-cybersecurity-risks-facing-your-business-and-how-to-stay-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.heartinternet.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Top cybersecurity risks facing your business (and how to stay secure)"}]},{"@type":"WebSite","@id":"https:\/\/heartblog.victory.digital\/#website","url":"https:\/\/heartblog.victory.digital\/","name":"Heart Internet","description":"","publisher":{"@id":"https:\/\/heartblog.victory.digital\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heartblog.victory.digital\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/heartblog.victory.digital\/#organization","name":"Heart Internet","url":"https:\/\/heartblog.victory.digital\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp","width":992,"height":252,"caption":"Heart Internet"},"image":{"@id":"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/heartinternet\/","https:\/\/x.com\/heartinternet","https:\/\/www.linkedin.com\/company\/heart-internet-ltd"]},{"@type":"Person","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28","name":"Eliot Chambers-Ostler","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/image\/","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg","caption":"Eliot Chambers-Ostler"},"url":"https:\/\/www.heartinternet.uk\/blog\/author\/eliot-chambers-ostler\/"}]}},"_links":{"self":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/20470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/comments?post=20470"}],"version-history":[{"count":0,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/20470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/media\/20479"}],"wp:attachment":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/media?parent=20470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/categories?post=20470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/tags?post=20470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}