{"id":8908,"date":"2018-10-31T14:54:00","date_gmt":"2018-10-31T14:54:00","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=8908"},"modified":"2022-03-24T15:12:37","modified_gmt":"2022-03-24T15:12:37","slug":"infographic-top-5-spookiest-cybersecurity-threats","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/","title":{"rendered":"Infographic: top 5 spookiest cybersecurity threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8908\" class=\"elementor elementor-8908\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3e17f0e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3e17f0e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58b7d775\" data-id=\"58b7d775\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f0907c6 elementor-widget elementor-widget-text-editor\" data-id=\"6f0907c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>And people get tricked all the time.<\/p><p>A\u00a0<a href=\"https:\/\/www.theguardian.com\/technology\/2018\/jan\/23\/cybercrime-130bn-stolen-consumers-2017-report-victims-phishing-ransomware-online-hacking\">report published by Norton<\/a>\u00a0confirmed that last year 978 million people have been victim of cybercrime, with hackers stealing an astonishing total of $166bn from customers. And often, victims don\u2019t just end up losing money but also valuable working time, as dealing with each cybercrime typically results in two full working days spent dealing with the aftermath.<\/p><p>These eerie numbers mean that each of us should always keep an eye out for the latest cyber threats skulking in the shadow. And the best way to protect yourself is to\u00a0exorcise\u00a0exercise common sense and learn about the techniques used by hackers and fiends to haunt their victims.<\/p><p>We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52e41f18 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52e41f18\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3bdcae9f\" data-id=\"3bdcae9f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-558f8daf elementor-widget elementor-widget-image\" data-id=\"558f8daf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"693\" height=\"980\" src=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Infographic-Top-5-Spookiest-Cybersecurity-Threats-693px-Blog-1.jpg\" class=\"attachment-full size-full wp-image-8783\" alt=\"Infographic Top-5 Spookiest Cybersecurity Threats\" srcset=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Infographic-Top-5-Spookiest-Cybersecurity-Threats-693px-Blog-1.jpg 693w, https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Infographic-Top-5-Spookiest-Cybersecurity-Threats-693px-Blog-1-212x300.jpg 212w\" sizes=\"(max-width: 693px) 100vw, 693px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-238cd461 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"238cd461\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8c77ea1\" data-id=\"8c77ea1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-450f5eb5 elementor-widget elementor-widget-text-editor\" data-id=\"450f5eb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you want to know more about RealVNC&#8217;s security strategy and the measures we take to ensure VNC Connect remote access connections are as secure as possible,\u00a0<a href=\"https:\/\/www.realvnc.com\/en\/connect\/security\/\">check out our Security page.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>It\u2019s Halloween again, the time of the year where everyone is suddenly into anything spooky. Unfortunately, in the online world there are some truly scary threats lurking all year round that should be avoided at all costs.<\/p>\n","protected":false},"author":19,"featured_media":8778,"template":"","blog_category":[267,257,270],"class_list":["post-8908","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-privacy","blog_category-security","blog_category-technology-trends"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infographic: top 5 spookiest cybersecurity threats<\/title>\n<meta name=\"description\" content=\"In the online world there are some truly scary threats lurking all year round that should be avoided at all costs. And people get tricked all the time. We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographic: top 5 spookiest cybersecurity threats\" \/>\n<meta property=\"og:description\" content=\"In the online world there are some truly scary threats lurking all year round that should be avoided at all costs. And people get tricked all the time. We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-24T15:12:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/cybersecurity-threats-header-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"683\" \/>\n\t<meta property=\"og:image:height\" content=\"496\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/\"},\"author\":{\"name\":\"David\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\"},\"headline\":\"Infographic: top 5 spookiest cybersecurity threats\",\"datePublished\":\"2018-10-31T14:54:00+00:00\",\"dateModified\":\"2022-03-24T15:12:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/\"},\"wordCount\":167,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cybersecurity-threats-header-1.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/\",\"name\":\"Infographic: top 5 spookiest cybersecurity threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cybersecurity-threats-header-1.jpg\",\"datePublished\":\"2018-10-31T14:54:00+00:00\",\"dateModified\":\"2022-03-24T15:12:37+00:00\",\"description\":\"In the online world there are some truly scary threats lurking all year round that should be avoided at all costs. And people get tricked all the time. We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cybersecurity-threats-header-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/cybersecurity-threats-header-1.jpg\",\"width\":683,\"height\":496,\"caption\":\"cybersecurity-threats-header\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/infographic-top-5-spookiest-cybersecurity-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infographic: top 5 spookiest cybersecurity threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\",\"name\":\"David\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"caption\":\"David\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infographic: top 5 spookiest cybersecurity threats","description":"In the online world there are some truly scary threats lurking all year round that should be avoided at all costs. And people get tricked all the time. We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/","og_locale":"en_US","og_type":"article","og_title":"Infographic: top 5 spookiest cybersecurity threats","og_description":"In the online world there are some truly scary threats lurking all year round that should be avoided at all costs. And people get tricked all the time. We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-03-24T15:12:37+00:00","og_image":[{"width":683,"height":496,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/cybersecurity-threats-header-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/"},"author":{"name":"David","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6"},"headline":"Infographic: top 5 spookiest cybersecurity threats","datePublished":"2018-10-31T14:54:00+00:00","dateModified":"2022-03-24T15:12:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/"},"wordCount":167,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/cybersecurity-threats-header-1.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/","url":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/","name":"Infographic: top 5 spookiest cybersecurity threats","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/cybersecurity-threats-header-1.jpg","datePublished":"2018-10-31T14:54:00+00:00","dateModified":"2022-03-24T15:12:37+00:00","description":"In the online world there are some truly scary threats lurking all year round that should be avoided at all costs. And people get tricked all the time. We made a Halloween-themed infographic to talk about some of the spookiest cybersecurity threats.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/cybersecurity-threats-header-1.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/cybersecurity-threats-header-1.jpg","width":683,"height":496,"caption":"cybersecurity-threats-header"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/infographic-top-5-spookiest-cybersecurity-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Infographic: top 5 spookiest cybersecurity threats"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6","name":"David","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","caption":"David"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/19"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/8908\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/8778"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=8908"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=8908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}