{"id":464,"date":"2023-10-26T13:30:21","date_gmt":"2023-10-26T13:30:21","guid":{"rendered":"https:\/\/jeebr.net\/internet-awareness\/?p=464"},"modified":"2023-10-27T11:38:43","modified_gmt":"2023-10-27T11:38:43","slug":"information-security-programs","status":"publish","type":"post","link":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/","title":{"rendered":"Defining an Information Security Program \u2013 Stay One Step Ahead"},"content":{"rendered":"\n<p>Ensuring robust information security program has become increasingly crucial in an era dominated by constant digital information flow. As a dedicated partner in this endeavor, Jeebr Internet stands ready to assist you. The integration of digital data into both our personal and professional lives necessitates our responsibility to safeguard this information. With the reliable and secure connection provided by Jeebr Internet, we can fulfill this duty effectively. <\/p>\n\n\n\n<p>This session post explores the significance of information security programs in protecting your online data and privacy while fostering a safer digital landscape. Throughout our discussion, we will emphasize how Jeebr Internet guarantees a secure online experience for all users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Foundation of Information Security with Jeebr Internet<\/strong><\/h2>\n\n\n\n<p>Information security protects digital information, like personal data, business records, and private communications. Jeebr Internet provides a secure and stable connection that helps enhance this protection. This field has grown because of increasing threats like cyberattacks and data breaches. Jeebr Internet is committed to protecting against these threats. Here are some reasons why security programs, with Jeebr Internet as your partner, are essential.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Data Protection<\/strong><\/h3>\n\n\n\n<p>Information security programs are designed to safeguard data against unauthorized access, alteration, or theft, all while ensuring that your data remains confidential and secure with Jeebr Internet. This is crucial in preventing data breaches that can have severe consequences for individuals and organizations alike.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Privacy Preservation<\/strong><\/h3>\n\n\n\n<p>In a world where personal data is shared and collected at an unprecedented scale, information security programs ensure that privacy is respected and protected, with Jeebr Internet&#8217;s commitment to privacy protection. They help maintain the confidentiality of sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Legal Compliance<\/strong><\/h3>\n\n\n\n<p>Many regions and industries have strict regulations governing the protection of data and privacy, such as the <a href=\"https:\/\/jeebr.net\/internet-awareness\/cybercrime-awareness\/\"><strong>cybersecurity regulations and data protection<\/strong><\/a> (GDPR) in the European Union. This effective security program help organizations comply with these laws, with Jeebr Internet ensuring that your online activities adhere to legal standards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Business Continuity<\/strong><\/h3>\n\n\n\n<p>Information security is not only about defense but also about ensuring business continuity. In the face of cyberattacks, a well-prepared organization can recover more swiftly, with the support of a stable and dedicated internet connection provided by Jeebr Internet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Components of Information Security Programs with Jeebr Internet<\/strong><\/h2>\n\n\n\n<p>Effective security programs typically include the following components, all of which are further fortified by Jeebr Internet&#8217;s commitment to a secure online environment:<\/p>\n\n\n\n<p><strong>1. Risk Assessment<\/strong><\/p>\n\n\n\n<p>Identifying and assessing risks is the first step in creating a robust information security program, and Jeebr Internet ensures that your online risks are minimized. It helps organizations understand the vulnerabilities and threats they face.<\/p>\n\n\n\n<p><strong>2. Security Policies and Procedures<\/strong><\/p>\n\n\n\n<p>Clear and comprehensive security policies and procedures provide guidance on how to protect data and ensure compliance with regulations, all while ensuring that your online activities align with security standards.<\/p>\n\n\n\n<p><strong>3. Security Awareness Training<\/strong><\/p>\n\n\n\n<p>Educating employees and users about security best practices is essential, with human error being a significant factor in security breaches. Jeebr Internet supports security awareness and training.<\/p>\n\n\n\n<p><strong>4. Access Control<\/strong>&nbsp;<\/p>\n\n\n\n<p>Controlled access to data and systems ensures that only authorized individuals can interact with sensitive information, and Jeebr Internet ensures that your online access is secure.<\/p>\n\n\n\n<p><strong>5. Incident Response<\/strong><\/p>\n\n\n\n<p>A well-defined incident response plan outlines the steps to take in the event of a security incident or data breach, with Jeebr Internet providing the stable connectivity needed during such incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Safer Digital Environment with Jeebr Internet<\/strong><\/h2>\n\n\n\n<p>Information security programs are not only essential for organizations but also for individuals, and Jeebr Internet ensures that individuals and organizations alike benefit from a secure and reliable online experience. By embracing the principles of information security, you can protect your personal data, safeguard your privacy, and contribute to a safer digital environment for everyone, all with the assurance of Jeebr Internet&#8217;s dedicated care for your online security.<\/p>\n\n\n\n<p>As technology advances, information security programs become more important. To keep your data safe and private, being aware, educated, and proactive is crucial. Jeebr Internet is here to help you with this. Information security is a joint effort whether you are an individual or part of a company. Whether you&#8217;re an individual or part of an institution, a security program is always used in information security management in an organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ensuring robust information security program has become increasingly crucial in an era dominated by constant digital information flow. As a&#8230;<\/p>\n","protected":false},"author":1,"featured_media":473,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,20,24],"tags":[],"class_list":["post-464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-online-privacy","category-social-media-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defining an Information Security Program \u2013 Stay One Step Ahead<\/title>\n<meta name=\"description\" content=\"Find the key elements of an effective Information Security Program. Stay one step ahead in the ever-evolving world of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defining an Information Security Program \u2013 Stay One Step Ahead\" \/>\n<meta property=\"og:description\" content=\"Find the key elements of an effective Information Security Program. Stay one step ahead in the ever-evolving world of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/\" \/>\n<meta property=\"og:site_name\" content=\"Internet Awareness\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/jeebrinternet\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-26T13:30:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T11:38:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeebr Internet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jeebrinternet\" \/>\n<meta name=\"twitter:site\" content=\"@jeebrinternet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeebr Internet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/\"},\"author\":{\"name\":\"Jeebr Internet\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#\\\/schema\\\/person\\\/50f740ed8e3b360c168a2eb9e53c26ba\"},\"headline\":\"Defining an Information Security Program \u2013 Stay One Step Ahead\",\"datePublished\":\"2023-10-26T13:30:21+00:00\",\"dateModified\":\"2023-10-27T11:38:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/\"},\"wordCount\":709,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png\",\"articleSection\":[\"Data Protection\",\"Online Privacy\",\"Social Media Safety\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/\",\"url\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/\",\"name\":\"Defining an Information Security Program \u2013 Stay One Step Ahead\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png\",\"datePublished\":\"2023-10-26T13:30:21+00:00\",\"dateModified\":\"2023-10-27T11:38:43+00:00\",\"description\":\"Find the key elements of an effective Information Security Program. Stay one step ahead in the ever-evolving world of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png\",\"contentUrl\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png\",\"width\":1200,\"height\":600,\"caption\":\"Information Security Program\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/information-security-programs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defining an Information Security Program \u2013 Stay One Step Ahead\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#website\",\"url\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/\",\"name\":\"Internet Awareness - Jeebr Internet\",\"description\":\"Jeebr Internet\",\"publisher\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#organization\",\"name\":\"Jeebr Internet\",\"url\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/jeebr-internet-logo-color.png\",\"contentUrl\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/jeebr-internet-logo-color.png\",\"width\":793,\"height\":351,\"caption\":\"Jeebr Internet\"},\"image\":{\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/jeebrinternet\",\"https:\\\/\\\/x.com\\\/jeebrinternet\",\"https:\\\/\\\/www.instagram.com\\\/jeebrinternet\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/jeebr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/#\\\/schema\\\/person\\\/50f740ed8e3b360c168a2eb9e53c26ba\",\"name\":\"Jeebr Internet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/eb7e642690c392ff99db0e6a3c2c363e9ec7abd25097d1377ce7001989039785?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/eb7e642690c392ff99db0e6a3c2c363e9ec7abd25097d1377ce7001989039785?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/eb7e642690c392ff99db0e6a3c2c363e9ec7abd25097d1377ce7001989039785?s=96&d=mm&r=g\",\"caption\":\"Jeebr Internet\"},\"sameAs\":[\"https:\\\/\\\/jeebr.net\\\/internet-awareness\"],\"url\":\"https:\\\/\\\/jeebr.net\\\/internet-awareness\\\/author\\\/jeebrinternet\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defining an Information Security Program \u2013 Stay One Step Ahead","description":"Find the key elements of an effective Information Security Program. Stay one step ahead in the ever-evolving world of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/","og_locale":"en_US","og_type":"article","og_title":"Defining an Information Security Program \u2013 Stay One Step Ahead","og_description":"Find the key elements of an effective Information Security Program. Stay one step ahead in the ever-evolving world of cybersecurity.","og_url":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/","og_site_name":"Internet Awareness","article_publisher":"https:\/\/www.facebook.com\/jeebrinternet","article_published_time":"2023-10-26T13:30:21+00:00","article_modified_time":"2023-10-27T11:38:43+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png","type":"image\/png"}],"author":"Jeebr Internet","twitter_card":"summary_large_image","twitter_creator":"@jeebrinternet","twitter_site":"@jeebrinternet","twitter_misc":{"Written by":"Jeebr Internet","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#article","isPartOf":{"@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/"},"author":{"name":"Jeebr Internet","@id":"https:\/\/jeebr.net\/internet-awareness\/#\/schema\/person\/50f740ed8e3b360c168a2eb9e53c26ba"},"headline":"Defining an Information Security Program \u2013 Stay One Step Ahead","datePublished":"2023-10-26T13:30:21+00:00","dateModified":"2023-10-27T11:38:43+00:00","mainEntityOfPage":{"@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/"},"wordCount":709,"commentCount":0,"publisher":{"@id":"https:\/\/jeebr.net\/internet-awareness\/#organization"},"image":{"@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png","articleSection":["Data Protection","Online Privacy","Social Media Safety"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/","url":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/","name":"Defining an Information Security Program \u2013 Stay One Step Ahead","isPartOf":{"@id":"https:\/\/jeebr.net\/internet-awareness\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#primaryimage"},"image":{"@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#primaryimage"},"thumbnailUrl":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png","datePublished":"2023-10-26T13:30:21+00:00","dateModified":"2023-10-27T11:38:43+00:00","description":"Find the key elements of an effective Information Security Program. Stay one step ahead in the ever-evolving world of cybersecurity.","breadcrumb":{"@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#primaryimage","url":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png","contentUrl":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/Understanding-the-Importance-of-Information-Security-Programs-with-Jeebr-Internet.png","width":1200,"height":600,"caption":"Information Security Program"},{"@type":"BreadcrumbList","@id":"https:\/\/jeebr.net\/internet-awareness\/information-security-programs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jeebr.net\/internet-awareness\/"},{"@type":"ListItem","position":2,"name":"Defining an Information Security Program \u2013 Stay One Step Ahead"}]},{"@type":"WebSite","@id":"https:\/\/jeebr.net\/internet-awareness\/#website","url":"https:\/\/jeebr.net\/internet-awareness\/","name":"Internet Awareness - Jeebr Internet","description":"Jeebr Internet","publisher":{"@id":"https:\/\/jeebr.net\/internet-awareness\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jeebr.net\/internet-awareness\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jeebr.net\/internet-awareness\/#organization","name":"Jeebr Internet","url":"https:\/\/jeebr.net\/internet-awareness\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jeebr.net\/internet-awareness\/#\/schema\/logo\/image\/","url":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/jeebr-internet-logo-color.png","contentUrl":"https:\/\/jeebr.net\/internet-awareness\/wp-content\/uploads\/2023\/10\/jeebr-internet-logo-color.png","width":793,"height":351,"caption":"Jeebr Internet"},"image":{"@id":"https:\/\/jeebr.net\/internet-awareness\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/jeebrinternet","https:\/\/x.com\/jeebrinternet","https:\/\/www.instagram.com\/jeebrinternet","https:\/\/www.linkedin.com\/company\/jeebr"]},{"@type":"Person","@id":"https:\/\/jeebr.net\/internet-awareness\/#\/schema\/person\/50f740ed8e3b360c168a2eb9e53c26ba","name":"Jeebr Internet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/eb7e642690c392ff99db0e6a3c2c363e9ec7abd25097d1377ce7001989039785?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eb7e642690c392ff99db0e6a3c2c363e9ec7abd25097d1377ce7001989039785?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb7e642690c392ff99db0e6a3c2c363e9ec7abd25097d1377ce7001989039785?s=96&d=mm&r=g","caption":"Jeebr Internet"},"sameAs":["https:\/\/jeebr.net\/internet-awareness"],"url":"https:\/\/jeebr.net\/internet-awareness\/author\/jeebrinternet\/"}]}},"_links":{"self":[{"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/posts\/464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/comments?post=464"}],"version-history":[{"count":2,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/posts\/464\/revisions"}],"predecessor-version":[{"id":496,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/posts\/464\/revisions\/496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/media\/473"}],"wp:attachment":[{"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/media?parent=464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/categories?post=464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jeebr.net\/internet-awareness\/wp-json\/wp\/v2\/tags?post=464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}