{"id":298,"date":"2011-04-20T16:52:52","date_gmt":"2011-04-20T20:52:52","guid":{"rendered":"http:\/\/techtonictimes.com\/?p=298"},"modified":"2014-05-27T03:40:38","modified_gmt":"2014-05-27T03:40:38","slug":"a-cup-of-tea-anyone","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/","title":{"rendered":"A Cup Of Tea Anyone?"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/il_570xN_141316410.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-medium wp-image-328\" title=\"il_570xN_141316410\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/il_570xN_141316410-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/il_570xN_141316410-300x300.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/il_570xN_141316410-150x150.jpg 150w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/il_570xN_141316410.jpg 570w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Which little piggy is \u00a0Epsilon? What was their house built with? Wood, Brick or Straw?<\/p>\n<p style=\"text-align: justify;\">I am curious aren&#8217;t you?<\/p>\n<p style=\"text-align: justify;\">On March 3oth, Epsilon detected that customer information of a subset of its email clients had been exposed by an unauthorized entry into its email system. &#8220;The affected clients represent approximately 2% of Epsilon&#8217;s total client base. Since the discovery of the unauthorized entry, rigorous internal and external reviews continue to confirm that <strong><em>only<\/em><\/strong> email\u00a0\u00a0 addresses and or names were compromised,&#8221; according to Epsilon&#8217;s website.<\/p>\n<p style=\"text-align: justify;\">I can&#8217;t help but to wonder how long the &#8220;wolf,&#8221; had been visiting Epsilon&#8217;s house. He may even have lived there. There are still more questions than there are answers. But one thing is certain, if he didn&#8217;t live there, a good bedside manner was his forte.<\/p>\n<p style=\"text-align: justify;\"><em>&#8220;A cup of tea anyone?&#8221;<\/em><\/p>\n<p>Plausibility for the case that the perpetrator may have been bred from within is rooted in a a simple observation: t<a href=\"http:\/\/www.infoworld.com\/t\/phishing\/epsilons-epic-fail-the-numbers-dont-add-177\">he breadth and depth of the breach.<\/a> &#8220;Epsilon has the world&#8217;s largest email\u00a0 marketing service, and sends more than 40 billion emails a year and manages customer databases from 2500 clients.&#8221;\u00a0 What is 2 percent of\u00a0 2500? I hate math, plus the result would be wrong anyway since, a single Epsilon client could have 2 million customers. So in reality, the number of victims is massive and hard to determine.<\/p>\n<p><span style=\"color: #3366ff;\"><a href=\"http:\/\/forms.aweber.com\/form\/69\/1455032969.htm\" target=\"_blank\">Click here<\/a>\u00a0<\/span><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">to sign up for a free demonstration of our database security solution. Our most recent release help organizations to better\u00a0 insulate themselves\u00a0 against breaches in the following ways.<\/span><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Simplify security and compliance regulations with a set of automated and centralized controls<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Embed data security and privacy capabilities into all of their enterprise databases and applications such as CRM, human resources, ERP, accounting, finance and other applications<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Helps to meet compliance mandates by delivering stronger information governance controls to ensure the privacy and integrity of corporate data while simplifying audits<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Expanded support for the mainframe and also added blocking that is more proactive, so it will block a user from accessing all data until it is resolved.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Fraud protection for SAP systems<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Integration with Tivoli software<br \/>\n<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Have you seen the movie <em>&#8220;<\/em><em>Inside Man?&#8221;<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.youtube.com\/watch?feature=player_detailpage&amp;v=8LWG-ul0rJE\">Dalton Russell<\/a>, the character played by, Clive Owen sums up the aura of the <a href=\"http:\/\/www.pcworld.com\/article\/224147\/massive_epsilon_email_breach_hits_citi_chase_many_more.html#tk.mod_rel\">Epsilon e-mail <\/a> breach. Here is what he said:<\/p>\n<blockquote>\n<p style=\"text-align: center;\"><em>&#8220;<\/em>My name is Dalton Russell. Pay strict attention to what I say because I never repeat myself. Recently I planned and set in motion events to execute the perfect bank robbery. Why? Because I can.&#8221;<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">Our societal code of conduct implies that those who introduce themselves to us\u00a0 are assumed sa<em>fe, <\/em>at least initially. Consider this principle in light of the <a href=\"http:\/\/www.securityweek.com\/massive-breach-epsilon-compromises-customer-lists-major-brands\">massive breach<\/a>, so tagged, by <a href=\"http:\/\/www.securityweek.com\">Security Week&#8217;s <\/a>blogger <a href=\"http:\/\/www.securityweek.com\/authors\/mike-lennon\">Mike Lemon<\/a>. But, unlike &#8216;<em>Inside Man&#8217;s,<\/em>&#8216; sophisticated bank heist, the\u00a0 hostages that extend from Citibank to JP Morgan Chase, and the consumers who have entrusted their <a href=\"http:\/\/www.securityweek.com\/epsilon-confused-about-what-personally-identifiable-information-pii\">personal identifiable information (PII)<\/a> to them may never experience the relief and exhilaration that accompany successful hostage negotiations because their enemies will present themselves as friends and relatives. <a href=\"http:\/\/blog.bit9.com\/\">They will open the door <\/a>for them because they <em>think<\/em> they know them.<\/p>\n<p style=\"text-align: justify;\"><em>&#8220;Perhaps some coffee instead?&#8221;<\/em><\/p>\n<p style=\"text-align: justify;\">Deluded by the notion, that the theft of consumers email\u00a0 addresses, do not present a clear and perpetual danger, or that it is somehow not as serious, as suggested in the published statement from Epsilon\u00a0 when they said that, &#8220;<em>only<\/em> email addresses and or names were compromised,&#8221; provide evidence that the gurus at Epsilon require expertise for which the Tech industry is not equipped.<\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2009.jpg\"><img decoding=\"async\" class=\"alignleft size-full wp-image-401\" title=\"three-pigs-huff-150x200\" src=\"http:\/\/abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2009.jpg\" alt=\"\" width=\"150\" height=\"200\" \/><\/a>Nevertheless PII&#8217;s <a href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-122\/sp800-122.pdf\">published<\/a> definition\u00a0 by the National Institute of Standards and Technology remains. And the best &#8216;hostage negotiators&#8217; will come up short in their efforts, since it will be virtually impossible to ascertain how and when the next victim will get a &#8216;bullet&#8217; to the head.<\/p>\n<p style=\"text-align: justify;\">In the mean time, consumers must fend for themselves. Vigilance is the call of every instance that they are prompted to release any personal information.\u00a0 Suspect everyone and\u00a0 anyone \u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 because the wolf is on the prowl and he may already be in your \u00a0\u00a0\u00a0\u00a0\u00a0 house.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Which little piggy is \u00a0Epsilon? What was their house built with? Wood, Brick or Straw? I am curious aren&#8217;t you? On March 3oth, Epsilon detected that customer information of a subset of its email clients had been exposed by an unauthorized entry into its email system. &#8220;The affected clients represent approximately 2% of Epsilon&#8217;s total [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":299,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,3,4,1137,8,11],"tags":[27,162,42,52,70,80],"class_list":["post-298","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-data-security","category-database-security","category-software","category-techtonic-times","category-vetting-technology","tag-clive-owens","tag-database-security","tag-epsilon-data-breach","tag-inside-man","tag-national-institute-of-standards-and-technology","tag-personal-identifiable-information"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Cup Of Tea Anyone? - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Cup Of Tea Anyone? - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Which little piggy is \u00a0Epsilon? What was their house built with? Wood, Brick or Straw? I am curious aren&#8217;t you? On March 3oth, Epsilon detected that customer information of a subset of its email clients had been exposed by an unauthorized entry into its email system. &#8220;The affected clients represent approximately 2% of Epsilon&#8217;s total [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2011-04-20T20:52:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-27T03:40:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"A Cup Of Tea Anyone?\",\"datePublished\":\"2011-04-20T20:52:52+00:00\",\"dateModified\":\"2014-05-27T03:40:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\"},\"wordCount\":686,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg\",\"keywords\":[\"Clive Owens\",\"Database Security\",\"Epsilon data breach\",\"Inside Man\",\"National Institute of Standards and Technology\",\"Personal Identifiable information\"],\"articleSection\":[\"CipherTrust\",\"Data Security\",\"Database Security\",\"Software\",\"Techtonic Times\",\"Vetting Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\",\"name\":\"A Cup Of Tea Anyone? - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg\",\"datePublished\":\"2011-04-20T20:52:52+00:00\",\"dateModified\":\"2014-05-27T03:40:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg\",\"width\":150,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Cup Of Tea Anyone?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Cup Of Tea Anyone? - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/","og_locale":"en_US","og_type":"article","og_title":"A Cup Of Tea Anyone? - TechTonic Times","og_description":"Which little piggy is \u00a0Epsilon? What was their house built with? Wood, Brick or Straw? I am curious aren&#8217;t you? On March 3oth, Epsilon detected that customer information of a subset of its email clients had been exposed by an unauthorized entry into its email system. &#8220;The affected clients represent approximately 2% of Epsilon&#8217;s total [&hellip;]","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/","og_site_name":"TechTonic Times","article_published_time":"2011-04-20T20:52:52+00:00","article_modified_time":"2014-05-27T03:40:38+00:00","og_image":[{"width":150,"height":200,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"A Cup Of Tea Anyone?","datePublished":"2011-04-20T20:52:52+00:00","dateModified":"2014-05-27T03:40:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/"},"wordCount":686,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg","keywords":["Clive Owens","Database Security","Epsilon data breach","Inside Man","National Institute of Standards and Technology","Personal Identifiable information"],"articleSection":["CipherTrust","Data Security","Database Security","Software","Techtonic Times","Vetting Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/","name":"A Cup Of Tea Anyone? - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg","datePublished":"2011-04-20T20:52:52+00:00","dateModified":"2014-05-27T03:40:38+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/04\/three-pigs-huff-150x2003.jpg","width":150,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/a-cup-of-tea-anyone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Cup Of Tea Anyone?"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/299"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}