{"id":459,"date":"2019-01-24T14:40:58","date_gmt":"2019-01-24T14:40:58","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/email-security-does-not-end-with-your-password\/"},"modified":"2019-06-07T09:45:02","modified_gmt":"2019-06-07T09:45:02","slug":"email-security-does-not-end-with-your-password","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/","title":{"rendered":"Email security does not end with your password"},"content":{"rendered":"\n<p>A strong password is a great start, but there are more ways to make sure that your email is as secure as possible.<\/p>\n\n\n\n<p>Email is a crucial part of most people\u2019s daily lives, but few people consider how it\u2019s secured, apart&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/01\/08\/new-years-resolutions-passwords-shipshape\/\" target=\"_blank\" rel=\"noreferrer noopener\">from entering a password<\/a>&nbsp;to access our accounts. What options are available or even advisable to use for securing email?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is email security?<\/strong><\/h2>\n\n\n\n<p>For the purposes of this post, I\u2019ll define email security as pertaining to both the content of messages, as well as the accounts people use to access their emails.<\/p>\n\n\n\n<p>Email security does not end with authentication for accessing our accounts: message content can be validated and secured, sender identity can be authenticated, authorization of email senders can be maintained, and the integrity and functionality of the email app itself can be better secured.<\/p>\n\n\n\n<p>If you\u2019re the administrator of your email account, you\u2019ll naturally have a different subset of options than if your account is being administered by someone else. Depending on your threat model, which options are needed may vary somewhat, but most of us could benefit from adding more methods to our repertoires.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Securing message content<\/strong><\/h2>\n\n\n\n<p>Few people seem to be aware that sending an email&nbsp;<em>can<\/em>&nbsp;be as open to eavesdropping as sending a message on a postcard. Fortunately, there are a&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Email_encryption\" target=\"_blank\" rel=\"noreferrer noopener\">variety of ways<\/a>&nbsp;to add layers of security to the process of sending a message. One method is akin to putting a message in an envelope; people can still see where the message came from, and where it was sent to, as well as the content of the message if an eavesdropper is able to intercept it at some point in the process (especially after the envelope is opened). This type of protection is considered \u201ctransport-level\u201d, as it helps protect the message in transit across the internet.<\/p>\n\n\n\n<p>It\u2019s also possible to secure the message from \u201cend to end\u201d, meaning the message is encrypted at the source before it ever hits the network, and then decrypted by the recipient. This shortens the time that a message might be read even by an eavesdropper, as it can\u2019t be read when it\u2019s in transit or until its contents are decrypted. The eavesdropper would also need to have the decryption key as well as the email to access the data within an intercepted message.<\/p>\n\n\n\n<p>Administrators often choose to implement transport-level protection, as it\u2019s the type that\u2019s most transparent to users and because it usually doesn\u2019t require their direct interaction. If end-to-end encryption is needed, it\u2019s a good idea to choose technologies that make this process simple, and to create policies that dictate when this type of encryption&nbsp;<em>must<\/em>&nbsp;be used.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ensuring valid, appropriate content<\/strong><\/h2>\n\n\n\n<p>It\u2019s a fact of modern life that much of what arrives in our inbox is not anything we want to receive. When you add up the amount of spam, scams, phishing and malware that\u2019s being sent, there\u2019s a lot of traffic that is wholly unwelcome. Most organizations and email service providers have some manner of filtering for this sort of detritus in place already, to help stem the flow. Depending on our own levels of risk tolerance, there are a variety of ways that this can be done.<\/p>\n\n\n\n<p>Most email providers operate a simple blacklist of known spam, phishing and malware to decrease the amount of unwanted and malicious email that reaches their customers. But many organizations would be wise to be more proactive with their filtering. You could also limit messages by attachment type; either allowing only those files from an approved list of safer or more common file types, or excluding unusual or more-risky file types.<\/p>\n\n\n\n<p>Keep in mind that while many popular file types may seem safer, they can still include powerful macro code or malicious, embedded files. No file type should be considered completely safe. It may be more helpful to view file types less in terms of their potential danger, and more in terms of their level of risk versus potential impact on workflow. While many people send things like documents, spreadsheets, or presentations, very few people have valid work-appropriate reasons to send or receive executable file types via email, so these can be excluded in most organizations with a minimum of hassle.<\/p>\n\n\n\n<p>Some organizations also choose to screen emails before they\u2019re sent out from their network too, for malware and\/or confidential company data. Most companies maintain some sort of sensitive files or information such as payment or ID card details, healthcare information, or confidential company data and would do well to log its whereabouts. It can be useful to set gateway anti-malware scanners to more \u201cparanoid\u201d settings, as a potentially slower scan of files going through email will be less noticeable or disruptive.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Email authorization and authentication<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/01\/Email_Security2.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/01\/Email_Security2.jpg\" alt=\"\" class=\"wp-image-121262\"\/><\/a><\/figure><\/div>\n\n\n\n<p>Spoofing email is trivially easy for miscreants, and while there are ways to limit this, the&nbsp;<a href=\"https:\/\/blog.higherlogic.com\/spf-dkim-dmarc-email-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">available options<\/a>&nbsp;are not yet widely used. These techniques help authenticate message content, indicate which users and accounts are authorized to send from your domain, and can help verify that email headers are internally consistent.<\/p>\n\n\n\n<p>Because these authorization and authentication techniques are not commonly implemented, the best-use case for most companies is to deploy these methods to help protect your brand integrity or prevent certain types of&nbsp;<a href=\"https:\/\/resources.infosecinstitute.com\/bec-attacks-email-account-compromise-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Email Compromise (BEC).<\/a>&nbsp;You can also use them to log emails that fail to authenticate properly, for forensic purposes.<\/p>\n\n\n\n<p>Use of email authentication and authorization should be considered part of good administration hygiene, like promptly removing (or at least changing the passwords of) accounts that are no longer in use (such as those formerly belonging to employees who are no longer with the company).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Account protection<\/strong><\/h2>\n\n\n\n<p>Most of us are aware of authentication for our email accounts, as this is the type of email security most of us have. Several of the other types of email security we\u2019ve discussed in the previous paragraphs exist in part to help mitigate the damage caused by stolen login credentials, which is to say it\u2019s a huge problem that causes a cascade of other woes. But&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/05\/03\/authentication-101\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication<\/a>&nbsp;is another very effective level of protection for access to our email accounts.<\/p>\n\n\n\n<p>Rather than just providing a username and password, which is one single \u201cfactor\u201d of verifying that you are who you say you are, multi-factor authentication combines these credentials with another method. The most common example of a second method is a one-time key \u2013 often sent by email or&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/08\/09\/nist-time-move-sms-2fa\/\" target=\"_blank\" rel=\"noreferrer noopener\">SMS<\/a>, or created by an app or dongle \u2013 that is input after you\u2019ve successfully entered your username and password. Multi-factor authentication can either be tied directly to the login process for an email app, or to a network login process, depending on your specific needs and threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Software protection<\/strong><\/h2>\n\n\n\n<p>Last but not least, it\u2019s also important to protect your email by regularly updating the software you use, including your operating system and the app or browser you use to access email. This will help address vulnerabilities that could allow attackers to access your emails. You may wish to do this with automatic update capabilities in the software itself or in your operating system, or by going directly to the vendor\u2019s website for downloads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Final Thoughts<\/strong><\/h2>\n\n\n\n<p>Whatever methods you choose to incorporate \u2013 be it for email or computer security in general \u2013 it\u2019s important that they be things people in your organization can and will use. This means observing the workflow of the people who will be using these technologies, choosing options that are either applied automatically or are easy to use, and then training users about how and when to use protection methods.<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/01\/22\/email-security-does-not-end-with-password\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A strong password is a great start, but there are more ways to make sure that your email is as secure as possible. Email is a crucial part of most people\u2019s daily lives, but few people consider how it\u2019s secured, apart&nbsp;from entering a password&nbsp;to access our accounts. What options are available or even advisable to<\/p>\n","protected":false},"author":5,"featured_media":1859,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[149],"tags":[],"class_list":["post-459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email security does not end with your password - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email security does not end with your password\" \/>\n<meta property=\"og:description\" content=\"A strong password is a great start, but there are more ways to make sure that your email is as secure as possible. Email is a crucial part of most people\u2019s daily lives, but few people consider how it\u2019s secured, apart&nbsp;from entering a password&nbsp;to access our accounts. What options are available or even advisable to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-24T14:40:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-07T09:45:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/lock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Email security does not end with your password\",\"datePublished\":\"2019-01-24T14:40:58+00:00\",\"dateModified\":\"2019-06-07T09:45:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/\"},\"wordCount\":1311,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/lock.jpg\",\"articleSection\":[\"EMAIL\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/\",\"name\":\"Email security does not end with your password - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/lock.jpg\",\"datePublished\":\"2019-01-24T14:40:58+00:00\",\"dateModified\":\"2019-06-07T09:45:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/lock.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/lock.jpg\",\"width\":1000,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email security does not end with your password\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/01\\\/24\\\/email-security-does-not-end-with-your-password\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email security does not end with your password - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/","og_locale":"en_US","og_type":"article","og_title":"Email security does not end with your password","og_description":"A strong password is a great start, but there are more ways to make sure that your email is as secure as possible. Email is a crucial part of most people\u2019s daily lives, but few people consider how it\u2019s secured, apart&nbsp;from entering a password&nbsp;to access our accounts. What options are available or even advisable to","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-01-24T14:40:58+00:00","article_modified_time":"2019-06-07T09:45:02+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/lock.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Email security does not end with your password","datePublished":"2019-01-24T14:40:58+00:00","dateModified":"2019-06-07T09:45:02+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/"},"wordCount":1311,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/lock.jpg","articleSection":["EMAIL"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/","name":"Email security does not end with your password - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/lock.jpg","datePublished":"2019-01-24T14:40:58+00:00","dateModified":"2019-06-07T09:45:02+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/lock.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/lock.jpg","width":1000,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Email security does not end with your password"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/01\/24\/email-security-does-not-end-with-your-password\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=459"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/459\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1859"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}