{"id":10505,"date":"2021-08-01T00:00:36","date_gmt":"2021-08-01T07:00:36","guid":{"rendered":"https:\/\/todaysveterinarybusiness.com\/?p=10505"},"modified":"2023-03-02T14:15:05","modified_gmt":"2023-03-02T14:15:05","slug":"social-engineering-computer-security","status":"publish","type":"post","link":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/","title":{"rendered":"Tricks of the Trade"},"content":{"rendered":"<p>Criminals who engage in social engineering \u2014 the art of manipulating people into giving up confidential information \u2014 usually hunt for passwords and bank account information, or even for direct access to a computer so that they can secretly install malicious software. They take advantage of a person\u2019s inclination to trust others. One of the primary reasons I decided to focus on the veterinary industry as a cybersecurity consultant is because of the people it employs. Their empathy, trust and integrity are second to none. However, those qualities are exactly what hackers look for.<\/p>\n<p>Cybersecurity is all about knowing who and what to trust. In the case of social engineering, you as a potential victim need to know when to take people at their word. You need to know when and how to validate their legitimacy. The same can be said about your online activity. Is the website where you shop for personal protective equipment a trustworthy seller? Will it protect your credit card information?<\/p>\n<p>Whenever I train hospital staff to recognize cybersecurity risks, I always get this question: What is the weakest link in the chain that a hacker will exploit? The answer is simple: It\u2019s the human who accepts any person or scenario at face value. All the layers of protection you put in place won\u2019t matter when someone on your team trusts a masked hacker.<\/p>\n<h3>How to Spot an Attack<\/h3>\n<p>The easiest way for someone with criminal intent to enter the hacking world is by email. Entire password databases can be found online. Don\u2019t believe me? Google the phrase \u201cGoogle Hacking Database.\u201d The database shows the search operators, or commands, that can find all sorts of information online. Now, type \u201cPassword\u201d into the search field. With a bit of technical ability, you can customize the search operators to focus on the veterinary practice you want to hack.<\/p>\n<p>Once I have your email password, I likely have the email address and password associated with a majority of your practice\u2019s accounts. This is because most people and practices use one password everywhere. And now that I control your email account, I can email all your contacts, post to <a href=\"https:\/\/todaysveterinarybusiness.com\/column\/socially-acceptable\/\">your social media pages<\/a> and do much more.<\/p>\n<p>The emails that hackers send from your account generally contain a link. Because the email came from you, your clients and colleagues think it\u2019s legitimate. The likelihood that they click the link is much higher because they trust you. Clicking on the link often downloads malicious software without the user\u2019s knowledge. The process then starts again as the hackers gain access to your friends\u2019 and colleagues\u2019 accounts.<\/p>\n<p>If the hacker email doesn\u2019t contain a link, a downloadable file, such as a photo, song, movie or document, might be present. These aren\u2019t ordinary files. They contain embedded malicious software designed to give the criminal access to the recipient\u2019s computer.<\/p>\n<p>Another danger involves emails from another trusted source. They don\u2019t have to originate at your clinic, meaning I can hack one of your clients to access your practice\u2019s computer system. These phishing attacks are a subset of social engineering in that they imitate a trusted source. According to an annual Verizon report, social engineering attacks are responsible for 93% of successful data breaches.<\/p>\n<h3>A Real-World Example<\/h3>\n<p>A South Texas pet owner\u2019s email account was compromised. Once inside the account, the hacker saw communication between the client and a <a href=\"https:\/\/todaysveterinarybusiness.com\/column\/take-charge\/\">veterinary practice manager<\/a> over disputed charges for a dental extraction. The practice manager had sent copies of the dental radiology images. The hacker emailed the practice manager from the client\u2019s account and asked her to review an attached file. Because of the trust established between the client and practice manager, the manager downloaded the file to her computer and opened the image. She saw a photo of a dog, but it wasn\u2019t the client\u2019s pet. Thinking a mistake had occurred, the practice manager closed the file and went about her work.<\/p>\n<p>Nothing happened for about three days. Then, it happened. She logged into QuickBooks and noticed that hundreds of invoices had been sent to clients and were requesting payment to an account that wasn\u2019t the hospital\u2019s. She also realized that she hadn\u2019t received emails in about two days.<\/p>\n<p>All this activity was the work of a keylogger. The image opened three days earlier contained a malicious program that recorded everything the practice manager typed and reported it to the hacker. Now, the hacker had the usernames and passwords to all her accounts. The hacker set up an inbox rule automatically moving new emails to the trash folder. The hacker sent thousands of emails from the account in an attempt to perform the same social engineering hack on all her contacts.<\/p>\n<h3>Don\u2019t Become a Victim<\/h3>\n<p>While social engineering attacks are rampant, short-lived and need only a few users to take the bait, you can protect yourself. Here are five tips:<\/p>\n<ul>\n<li>Slow down. Hackers want you to act first and think later. If an email conveys a sense of urgency or uses high-pressure tactics, be skeptical. Never let urgency influence your careful review.<\/li>\n<li>Visit VirusTotal. Raise your hand if your hospital is hiring people. I\u2019ve seen countless practices get hacked through fake emailed resumes. Before you open any file or attachment, run it through <a href=\"http:\/\/virustotal.com\">virustotal.com<\/a>, a free and simple analysis tool that could save your practice from spending thousands of dollars to repair your computer system.<\/li>\n<li>Review your backups. Do you know how your practice\u2019s computer data is protected? How long would you need to restore all your data if you were socially engineered?<\/li>\n<li>Be skeptical about antivirus programs. When I got into the technology field, you could install antivirus software and be on your merry way. Not anymore. Today, you need layered security. Look into getting complete endpoint security that includes some form of artificial-intelligence protection.<\/li>\n<li>Update your computer network. One of the easiest and most cost-effective actions is to always make sure your hospital\u2019s computers and the applications used are up to date. Technology professionals can do this for you behind the scenes and after hours. If you are a do-it-yourself type, pick one day a week to check that all your computers, operating systems and applications are current.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div id=\"attachment_10510\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" aria-describedby=\"caption-attachment-10510\" class=\"wp-image-10510\" src=\"http:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/08\/Gooegle-Hacking-Database.jpg\" alt=\"social engineering\" width=\"800\" height=\"425\" srcset=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/08\/Gooegle-Hacking-Database.jpg 2000w, https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/08\/Gooegle-Hacking-Database-300x159.jpg 300w, https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/08\/Gooegle-Hacking-Database-1024x544.jpg 1024w, https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/08\/Gooegle-Hacking-Database-768x408.jpg 768w, https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/08\/Gooegle-Hacking-Database-1536x816.jpg 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-10510\" class=\"wp-caption-text\">The Google Hacking Database documents search queries, also known as dorks, to call attention to potentially sensitive information available to the public.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Criminals who engage in social engineering \u2014 the art of manipulating people into giving up confidential information \u2014 usually hunt for passwords and bank account information, or even for direct access to a computer so that they can secretly install malicious software.<\/p>\n","protected":false},"author":188,"featured_media":10507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"iawp_total_views":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","clinical_topics-innovation-technology"],"acf":{"hide_sidebar":false,"hide_sidebar_ad":false,"hide_all_ads":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.7 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tricks of the Trade | Today&#039;s Veterinary Business<\/title>\n<meta name=\"description\" content=\"Criminals who engage in social engineering, or manipulating people into giving up confidential information, count on a person\u2019s trust.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tricks of the Trade\" \/>\n<meta property=\"og:description\" content=\"Criminals who engage in social engineering, or manipulating people into giving up confidential information, count on a person\u2019s trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Today&#039;s Veterinary Business\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/todaysveterinarybusiness\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-01T07:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-02T14:15:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/07\/Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"544\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Vetalytix Report\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tvbpublication\" \/>\n<meta name=\"twitter:site\" content=\"@tvbpublication\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Vetalytix Report\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/\"},\"author\":{\"name\":\"The Vetalytix Report\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/person\\\/5fe7086add7bab15c9fca46fc65419d6\"},\"headline\":\"Tricks of the Trade\",\"datePublished\":\"2021-08-01T07:00:36+00:00\",\"dateModified\":\"2023-03-02T14:15:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/\"},\"wordCount\":1087,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/Security.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/\",\"name\":\"Tricks of the Trade | Today&#039;s Veterinary Business\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/Security.jpg\",\"datePublished\":\"2021-08-01T07:00:36+00:00\",\"dateModified\":\"2023-03-02T14:15:05+00:00\",\"description\":\"Criminals who engage in social engineering, or manipulating people into giving up confidential information, count on a person\u2019s trust.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/Security.jpg\",\"contentUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/07\\\/Security.jpg\",\"width\":1024,\"height\":544,\"caption\":\"social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/social-engineering-computer-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tricks of the Trade\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#website\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\",\"name\":\"Today&#039;s Veterinary Business\",\"description\":\"Veterinary Business Magazine\",\"publisher\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\",\"name\":\"Today's Veterinary Business\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/02\\\/tvb-logo.png\",\"contentUrl\":\"https:\\\/\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/02\\\/tvb-logo.png\",\"width\":258,\"height\":71,\"caption\":\"Today's Veterinary Business\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/todaysveterinarybusiness\",\"https:\\\/\\\/x.com\\\/tvbpublication\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/todaysveterinarybusiness\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/person\\\/5fe7086add7bab15c9fca46fc65419d6\",\"name\":\"The Vetalytix Report\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9da187657d33157989b0cd2300d3f074c826dc372d0737e81ecc47cc1ad778a3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9da187657d33157989b0cd2300d3f074c826dc372d0737e81ecc47cc1ad778a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9da187657d33157989b0cd2300d3f074c826dc372d0737e81ecc47cc1ad778a3?s=96&d=mm&r=g\",\"caption\":\"The Vetalytix Report\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tricks of the Trade | Today&#039;s Veterinary Business","description":"Criminals who engage in social engineering, or manipulating people into giving up confidential information, count on a person\u2019s trust.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Tricks of the Trade","og_description":"Criminals who engage in social engineering, or manipulating people into giving up confidential information, count on a person\u2019s trust.","og_url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/","og_site_name":"Today&#039;s Veterinary Business","article_publisher":"https:\/\/www.facebook.com\/todaysveterinarybusiness","article_published_time":"2021-08-01T07:00:36+00:00","article_modified_time":"2023-03-02T14:15:05+00:00","og_image":[{"width":1024,"height":544,"url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/07\/Security.jpg","type":"image\/jpeg"}],"author":"The Vetalytix Report","twitter_card":"summary_large_image","twitter_creator":"@tvbpublication","twitter_site":"@tvbpublication","twitter_misc":{"Written by":"The Vetalytix Report","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#article","isPartOf":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/"},"author":{"name":"The Vetalytix Report","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/person\/5fe7086add7bab15c9fca46fc65419d6"},"headline":"Tricks of the Trade","datePublished":"2021-08-01T07:00:36+00:00","dateModified":"2023-03-02T14:15:05+00:00","mainEntityOfPage":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/"},"wordCount":1087,"commentCount":0,"publisher":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/07\/Security.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/","name":"Tricks of the Trade | Today&#039;s Veterinary Business","isPartOf":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#primaryimage"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#primaryimage"},"thumbnailUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/07\/Security.jpg","datePublished":"2021-08-01T07:00:36+00:00","dateModified":"2023-03-02T14:15:05+00:00","description":"Criminals who engage in social engineering, or manipulating people into giving up confidential information, count on a person\u2019s trust.","breadcrumb":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#primaryimage","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/07\/Security.jpg","contentUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2021\/07\/Security.jpg","width":1024,"height":544,"caption":"social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/social-engineering-computer-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/"},{"@type":"ListItem","position":2,"name":"Tricks of the Trade"}]},{"@type":"WebSite","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#website","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/","name":"Today&#039;s Veterinary Business","description":"Veterinary Business Magazine","publisher":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization","name":"Today's Veterinary Business","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/logo\/image\/","url":"https:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2022\/02\/tvb-logo.png","contentUrl":"https:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2022\/02\/tvb-logo.png","width":258,"height":71,"caption":"Today's Veterinary Business"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/todaysveterinarybusiness","https:\/\/x.com\/tvbpublication","https:\/\/www.linkedin.com\/company\/todaysveterinarybusiness"]},{"@type":"Person","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/person\/5fe7086add7bab15c9fca46fc65419d6","name":"The Vetalytix Report","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9da187657d33157989b0cd2300d3f074c826dc372d0737e81ecc47cc1ad778a3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9da187657d33157989b0cd2300d3f074c826dc372d0737e81ecc47cc1ad778a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9da187657d33157989b0cd2300d3f074c826dc372d0737e81ecc47cc1ad778a3?s=96&d=mm&r=g","caption":"The Vetalytix Report"}}]}},"_links":{"self":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/10505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/comments?post=10505"}],"version-history":[{"count":4,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/10505\/revisions"}],"predecessor-version":[{"id":23361,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/10505\/revisions\/23361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/media\/10507"}],"wp:attachment":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/media?parent=10505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/categories?post=10505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/tags?post=10505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}