{"id":4292,"date":"2018-12-01T00:00:57","date_gmt":"2018-12-01T08:00:57","guid":{"rendered":"https:\/\/todaysveterinarybusiness.com\/?p=4292"},"modified":"2022-06-22T20:43:57","modified_gmt":"2022-06-22T20:43:57","slug":"7-security-essentials","status":"publish","type":"post","link":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/","title":{"rendered":"7 Security Essentials"},"content":{"rendered":"<p>Veterinary practices have become more and more dependent on computers and computer networks as they go paperless or paper light. Because of this dependency, having an information technology security strategy is a must to ensure your hospital\u2019s computer systems stay functional so that you can schedule appointments, provide medical treatments, and charge clients for your services.<\/p>\n<p>A layered approach is necessary to protect hospitals from the many nasty threats in today\u2019s world. The leading threat is ransomware, a virus that encrypts your data, holds it hostage and causes major downtime. I have seen malware infections shut down hospitals\u2019 computers and networks for three to five days and in some cases two weeks.<\/p>\n<p>In a 2017 survey of 1,700 IT professionals, 75 percent reported that ransomware had led to business-threating downtime and 57 percent stated that ransomware had caused the loss of data and even hardware.<\/p>\n<p>Even if you think your computers and networks are secure, there is no 100 percent guarantee. However, you can take steps to provide your practice with reasonable security.<\/p>\n<p>Here is what I do to virtually stop ransomware attacks at my clients\u2019 places of business. Review these seven areas to see if your hospital has gaps that need filling.<\/p>\n<h3>1. Backup<\/h3>\n<p>This is by far the most important measure you must have in place to protect your hospital. Remember that backup systems have changed over time, so a simple data backup is not going to solve your issue. Consider:<\/p>\n<ul>\n<li><strong>RPO (real-time protection option):<\/strong> In other words, how often do you back up your practice data? I recommend hourly throughout the business day. At least every 24 hours is a must.<\/li>\n<li><strong>RTO (real-time objective):<\/strong> How quickly can you be up and running should your main server fail? I recommend solutions that can get hospitals back online in one hour. I often see RTO solutions of three to five days, so be sure to understand what you have in place before an issue occurs. You don\u2019t want a long downtime when your clinic is dependent on technology.<\/li>\n<\/ul>\n<h3>2. Staff Training<\/h3>\n<p>Cybersecurity and phishing education is a must. Malware often gets into computers and networks because of a human mistake. Clicking a hyperlink in a false email can pave the way for malware. Spam protection doesn\u2019t do enough to stop these simple threats, and virus protection can allow the threats to pass through.<\/p>\n<p>I work with companies that offer ethical phishing services. These services can phish, or fool, your employees and look for vulnerabilities. These companies educate your team into the habit of identifying mistakes to avoid and can assist your practice in becoming more secure.<\/p>\n<h3>3. Operating System Patches<\/h3>\n<p>Ensure that the computer or device you use has been updated with critical patches. <a href=\"https:\/\/todaysveterinarybusiness.com\/henry-schein-updates-avimark-impromed-software\/\">Software<\/a> and device manufacturers often release patches monthly. One example is Microsoft and its Windows operating systems. Microsoft\u2019s patches are released every second Tuesday of the month. Ask to see your patching report and make sure all workstations are at least up to date with critical patches. Patches plug security holes that can let malware in, and they help prevent malware from spreading should it get into your computers and networks.<\/p>\n<p>Make sure you understand the patching level of every machine on your network. If you have any operating systems that are no longer supported or patched, like Windows XP, it\u2019s time for an update.\u00a0 Also keep in mind that support for Windows 7 is set to end about a year from now \u2014 in January 2020 \u2014 so having a plan and a budget to retire those old operating systems by the end of 2019 is a must.<\/p>\n<h3>4. Third-Party Critical Software Patches<\/h3>\n<p>Your operating system probably has software installed that must be maintained as well. These are applications like Adobe Flash, Adobe Reader, Java, Silverlight, Firefox and Chrome. All these apps connect and touch the internet in some fashion, and they must be kept up to date. Otherwise, if you happen to be surfing the internet and a website is compromised by malware, sophisticated attackers can use your outdated software to slipstream malware into your computers and networks. This can happen through the simple act of browsing the internet.<\/p>\n<p>Ask to see a report of all the different third-party applications installed on each computer at your hospital. Either uninstall what is not needed or make sure the apps are updated to protect against known threats.<\/p>\n<h3>5. Business-Class Firewall and Security Subscription<\/h3>\n<p>Ensuring that your hospital\u2019s gateway \u2014 all inbound and outbound internet traffic \u2014 is protected by a business-class <a href=\"https:\/\/todaysveterinarybusiness.com\/shared-responsibility\/\">firewall<\/a> is a great security practice. I am not talking about a device issued by your internet service provider or one you purchase from Best Buy or Office Depot. The firewall should have a built-in security subscription to protect your practice by inspecting each and every packet that goes in and out of your network.<\/p>\n<p>These devices also can assist with providing secure Wi-Fi and allowing you to have two configured networks: public for your clients\u2019 and staff\u2019s personal devices and private for any approved devices like hospital laptops and tablets.<\/p>\n<h3>6. Web Protection<\/h3>\n<p>Security beyond the firewall helps protect against threats. DNS (domain name services) protection is a recent security layer that has stopped virtually all infections I have been seeing. Six years ago was the last time I had to clean up an environment from malware infection, and I can honestly say this one layer was crucial.<\/p>\n<p>DNS is a simple service. Instead of remembering an IP address like 173.127.22.5, people remember names like Google.com or Yahoo.com. DNS takes the name and transcribes it into a number. Security services around DNS will help ensure that if you try to visit a website or IP that is compromised, your access will be stopped. If your computer becomes infected and the malware \u201cphones home\u201d to the attacker, the call won\u2019t take place, preventing the machine from becoming fully infected.<\/p>\n<p>Ask what type of protection outside the firewall is in place to protect DNS queries. If you don\u2019t have anything, I recommend adding this layer as soon as possible.<\/p>\n<h3>7. Anti-virus and Anti-malware<\/h3>\n<p>Having a centralized anti-virus solution is a must, but it also should detect and fight malware. These solutions usually require a paid subscription. Free versions work but are often not centralized for management.<\/p>\n<p>Ask to see a report of each and every machine in your hospital and make sure that centralized anti-virus or anti-malware software is installed and active. The software is good only if it is kept up to date and runs correctly.<\/p>\n<p>Using a layered approach to computer security will protect your hospital from costly downtime caused by ransomware and other malware.<\/p>\n<p>If you\u2019re not especially tech-savvy, ask for help from the person responsible for your hospital\u2019s IT operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using a layered approach to computer security will protect your hospital from costly downtime.<\/p>\n","protected":false},"author":40,"featured_media":4293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"iawp_total_views":0,"footnotes":""},"categories":[334],"tags":[],"class_list":["post-4292","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-december-2018-january-2019","column-features","clinical_topics-innovation-technology"],"acf":{"hide_sidebar":false,"hide_sidebar_ad":false,"hide_all_ads":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.7 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>7 Security Essentials | Today&#039;s Veterinary Business<\/title>\n<meta name=\"description\" content=\"Using a layered approach to computer security will help protect your veterinary hospital from costly downtime.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Security Essentials\" \/>\n<meta property=\"og:description\" content=\"Having an information technology security strategy is a must to ensure your hospital\u2019s computer systems stay functional.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/\" \/>\n<meta property=\"og:site_name\" content=\"Today&#039;s Veterinary Business\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/todaysveterinarybusiness\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-01T08:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-22T20:43:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2018\/11\/IT-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"736\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aaron Massecar, MA, Ph.D.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tvbpublication\" \/>\n<meta name=\"twitter:site\" content=\"@tvbpublication\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aaron Massecar, MA, Ph.D.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/\"},\"author\":{\"name\":\"Aaron Massecar, MA, Ph.D.\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/person\\\/02bc96d5463198a43160959397157ae8\"},\"headline\":\"7 Security Essentials\",\"datePublished\":\"2018-12-01T08:00:57+00:00\",\"dateModified\":\"2022-06-22T20:43:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/\"},\"wordCount\":1124,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/11\\\/IT-Security.jpg\",\"articleSection\":[\"December 2018\\\/January 2019\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/\",\"name\":\"7 Security Essentials | Today&#039;s Veterinary Business\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/11\\\/IT-Security.jpg\",\"datePublished\":\"2018-12-01T08:00:57+00:00\",\"dateModified\":\"2022-06-22T20:43:57+00:00\",\"description\":\"Using a layered approach to computer security will help protect your veterinary hospital from costly downtime.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#primaryimage\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/11\\\/IT-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/11\\\/IT-Security.jpg\",\"width\":1200,\"height\":736},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/7-security-essentials\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Security Essentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#website\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\",\"name\":\"Today&#039;s Veterinary Business\",\"description\":\"Veterinary Business Magazine\",\"publisher\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\",\"name\":\"Today's Veterinary Business\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/02\\\/tvb-logo.png\",\"contentUrl\":\"https:\\\/\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/02\\\/tvb-logo.png\",\"width\":258,\"height\":71,\"caption\":\"Today's Veterinary Business\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/todaysveterinarybusiness\",\"https:\\\/\\\/x.com\\\/tvbpublication\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/todaysveterinarybusiness\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/person\\\/02bc96d5463198a43160959397157ae8\",\"name\":\"Aaron Massecar, MA, Ph.D.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/498518940c612a35c44d45f7649f4d55fd0ec5eba6c4a65777290f7c345ee72d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/498518940c612a35c44d45f7649f4d55fd0ec5eba6c4a65777290f7c345ee72d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/498518940c612a35c44d45f7649f4d55fd0ec5eba6c4a65777290f7c345ee72d?s=96&d=mm&r=g\",\"caption\":\"Aaron Massecar, MA, Ph.D.\"},\"sameAs\":[\"http:\\\/\\\/www.tvb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 Security Essentials | Today&#039;s Veterinary Business","description":"Using a layered approach to computer security will help protect your veterinary hospital from costly downtime.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"7 Security Essentials","og_description":"Having an information technology security strategy is a must to ensure your hospital\u2019s computer systems stay functional.","og_url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/","og_site_name":"Today&#039;s Veterinary Business","article_publisher":"https:\/\/www.facebook.com\/todaysveterinarybusiness","article_published_time":"2018-12-01T08:00:57+00:00","article_modified_time":"2022-06-22T20:43:57+00:00","og_image":[{"width":1200,"height":736,"url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2018\/11\/IT-Security.jpg","type":"image\/jpeg"}],"author":"Aaron Massecar, MA, Ph.D.","twitter_card":"summary_large_image","twitter_creator":"@tvbpublication","twitter_site":"@tvbpublication","twitter_misc":{"Written by":"Aaron Massecar, MA, Ph.D.","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#article","isPartOf":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/"},"author":{"name":"Aaron Massecar, MA, Ph.D.","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/person\/02bc96d5463198a43160959397157ae8"},"headline":"7 Security Essentials","datePublished":"2018-12-01T08:00:57+00:00","dateModified":"2022-06-22T20:43:57+00:00","mainEntityOfPage":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/"},"wordCount":1124,"commentCount":1,"publisher":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2018\/11\/IT-Security.jpg","articleSection":["December 2018\/January 2019"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/","name":"7 Security Essentials | Today&#039;s Veterinary Business","isPartOf":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#primaryimage"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2018\/11\/IT-Security.jpg","datePublished":"2018-12-01T08:00:57+00:00","dateModified":"2022-06-22T20:43:57+00:00","description":"Using a layered approach to computer security will help protect your veterinary hospital from costly downtime.","breadcrumb":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#primaryimage","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2018\/11\/IT-Security.jpg","contentUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2018\/11\/IT-Security.jpg","width":1200,"height":736},{"@type":"BreadcrumbList","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/7-security-essentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/"},{"@type":"ListItem","position":2,"name":"7 Security Essentials"}]},{"@type":"WebSite","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#website","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/","name":"Today&#039;s Veterinary Business","description":"Veterinary Business Magazine","publisher":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization","name":"Today's Veterinary Business","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/logo\/image\/","url":"https:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2022\/02\/tvb-logo.png","contentUrl":"https:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2022\/02\/tvb-logo.png","width":258,"height":71,"caption":"Today's Veterinary Business"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/todaysveterinarybusiness","https:\/\/x.com\/tvbpublication","https:\/\/www.linkedin.com\/company\/todaysveterinarybusiness"]},{"@type":"Person","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/person\/02bc96d5463198a43160959397157ae8","name":"Aaron Massecar, MA, Ph.D.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/498518940c612a35c44d45f7649f4d55fd0ec5eba6c4a65777290f7c345ee72d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/498518940c612a35c44d45f7649f4d55fd0ec5eba6c4a65777290f7c345ee72d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/498518940c612a35c44d45f7649f4d55fd0ec5eba6c4a65777290f7c345ee72d?s=96&d=mm&r=g","caption":"Aaron Massecar, MA, Ph.D."},"sameAs":["http:\/\/www.tvb.com"]}]}},"_links":{"self":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/4292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/comments?post=4292"}],"version-history":[{"count":4,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/4292\/revisions"}],"predecessor-version":[{"id":22105,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/4292\/revisions\/22105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/media\/4293"}],"wp:attachment":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/media?parent=4292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/categories?post=4292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/tags?post=4292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}