

{"id":12708,"date":"2018-04-16T16:18:19","date_gmt":"2018-04-16T10:48:19","guid":{"rendered":"https:\/\/www.360technosoft.com\/blog\/?p=12708"},"modified":"2024-09-20T14:32:30","modified_gmt":"2024-09-20T09:02:30","slug":"10-tips-for-not-getting-infected-by-malware","status":"publish","type":"post","link":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/","title":{"rendered":"10 Tips for Not Getting Infected by Malware"},"content":{"rendered":"<p style=\"text-align: justify;\">When surfing the Internet, accessing\u00a0<strong>social networks<\/strong>, emails or filling out an online form, there are a number of problems that many users usually encounter.\u00a0Many problems that can cause the infection of a computer, smartphone or leakage of information are reported daily and the number of users who see their information compromised is considerable.\u00a0That is why today, we are going to review 10 tips to avoid infection of a system or device.<\/p>\n<h2>Tips for Not Getting Infected by Malware<\/h2>\n<p style=\"text-align: justify;\"><strong>1) Use a Secure Connection<\/strong><\/p>\n<p style=\"text-align: justify;\">It seems simple, but many users often overlook that when connecting to a website, the connection is through\u00a0<strong>HTTPS<\/strong>\u00a0(Hypertext Transfer Protocol Secure).\u00a0When accessing a web page using this protocol, the communication between the client and the server travels encrypted, which increases security and minimizes the possibility of password theft.\u00a0When accessing these types of sites, you can see the difference between accessing using\u00a0<strong>HTTPS<\/strong>\u00a0or without security through\u00a0<strong>HTTP<\/strong>.\u00a0It is possible to\u00a0configure a secure connection in social networks, so that all communication with the site is encrypted. All websites owners need to install SSL certificate on their website to move a website on https protocol. They Should buy\u00a0<a style=\"color: #1155cc;\" href=\"https:\/\/www.ssl2buy.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.ssl2buy.com&amp;source=gmail&amp;ust=1539939430205000&amp;usg=AFQjCNGU1TZd7-MnSEES8_EEjDd7uhH8KQ\">Cheap SSL from SSL2BUY<\/a>.<\/p>\n<p style=\"text-align: justify;\"><strong>2) Avoid Deceptive Links<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-12709 size-full\" style=\"text-align: justify;\" src=\"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/effective-strategies-to-prevent-malware-attacks.jpg\" alt=\"effective-strategies-to-prevent-malware-attacks\" width=\"800\" height=\"521\" \/><\/p>\n<p style=\"text-align: justify;\">When receiving\u00a0emails of dubious origin, such as from a contact that speaks in Spanish we receive an email in Portuguese, a supposed email from a bank to update the information, mail chains about the change of a free email service to payment or a multimillionaire who wants to give away his money.\u00a0On more than one occasion we have shared with you the analyzes and investigations where the attackers\u00a0hide the real link within a\u00a0YouTube\u00a0<em>link<\/em>\u00a0or another similar strategy.<\/p>\n<p style=\"text-align: justify;\"><strong>3. Analyze Attachments<\/strong><\/p>\n<p style=\"text-align: justify;\">When sending and receiving emails, the user must take certain considerations to avoid infecting his or her device or device through the attachments in the emails, since repeatedly, for a matter of time they do not analyze the attachments in the emails with a antivirus solution and in this way the security of your information could be exposed.<\/p>\n<p style=\"text-align: justify;\"><strong>4. Analyze Removable Devices<\/strong><\/p>\n<p style=\"text-align: justify;\">External storage media, where USB devices are included, is one of the channels for spreading malicious code with the highest detection rate in Latin America.\u00a0By connecting a memory to an unknown computer, users often infect their devices with malicious code, and then use it to transport job information.\u00a0In this way an employee who does not analyze your USB device could infect the entire network of the company.<\/p>\n<p style=\"text-align: justify;\"><strong>5. Configure Privacy Policies in Social Networks<\/strong><\/p>\n<p style=\"text-align: justify;\">By using\u00a0<strong>social networks such<\/strong>\u00a0as\u00a0<strong>Facebook<\/strong>,\u00a0<strong>Twitter<\/strong>\u00a0or\u00a0<strong>Google+<\/strong>,\u00a0users often leave privacy parameters aside and share not only their information, but also share the data of their contacts with anyone accessing their profile.\u00a0The\u00a0configuration of privacy policies\u00a0is one of the barriers to be implemented to prevent an attacker from collecting user information.<\/p>\n<p style=\"text-align: justify;\"><strong>6. Use Strong Passwords<\/strong><\/p>\n<p style=\"text-align: justify;\">When creating an account on a website, you should always use keys that are a combination of numbers, uppercase and lowercase letters and if possible use special characters.\u00a0In this way, the possibility of an attacker\u00a0discovering the password\u00a0is minimal.\u00a0Different studies have shown that users do not usually\u00a0use strong passwords\u00a0to access their accounts on the Internet, which presents a gateway for attackers.\u00a0Some examples of strong keys are &#8220;Jos33ntr @&#8221;, &#8220;C0ntr @ z3n @ #&#8221;, &#8220;Jp3t? Xi9-\u201d,: &#8220;4ApEKzqK&#8221; or &#8220;L @ # nt67nx&#8221;<\/p>\n<p style=\"text-align: justify;\"><strong>7. Update the Programs and the Operating System<\/strong><\/p>\n<p style=\"text-align: justify;\">Both the different operating systems (Windows,\u00a0<strong>Mac OS<\/strong>, or the different distributions of\u00a0<strong>GNU Linux)<\/strong>\u00a0and the applications that can be installed on them (web browsers, office applications, video players, design programs, etc.), have updates of security that solve different inconveniences that could lead to the infection of the equipment.\u00a0When a user does not perform the installation of these updates, it leaves your\u00a0<strong>system vulnerable<\/strong>\u00a0to a possible infection with a malicious code that turns your computer into part of a network of zombie computers, known as\u00a0<strong>botnets<\/strong>.<\/p>\n<p style=\"text-align: justify;\"><strong>8. Search for Information Safely<\/strong><\/p>\n<p style=\"text-align: justify;\">When trying to access information through search engines such as\u00a0<strong>Google<\/strong>,\u00a0<strong>Bing,<\/strong>\u00a0or\u00a0<strong>Yahoo!<\/strong>, the user could be a victim of\u00a0BlackHat SEO and linked to a fake page from which he could download a\u00a0fake security solution\u00a0or other malicious code.\u00a0These methodologies of propagation of\u00a0<strong>malware<\/strong>, use events of global repercussion to attract the attention of the users when trying to be informed of the news of last moment.<\/p>\n<p style=\"text-align: justify;\"><strong>9. Use a Security Solution<\/strong><\/p>\n<p style=\"text-align: justify;\">The use of an\u00a0antivirus solution with proactive detection capability\u00a0allows to protect the computer in real time from the infection of a malicious code, detecting its presence before it infects the computer and can compromise the security of the information stored in it.\u00a0In addition there are also tools such as\u00a0<strong>firewalls<\/strong>\u00a0and\u00a0<strong>antispam<\/strong>\u00a0to increase the protection of the equipment. Do you know which one best suits your needs?\u00a0Savenit has\u00a0the best antivirus for pc.<\/p>\n<p style=\"text-align: justify;\"><strong>10. Caring for Information in Public Places<\/strong><\/p>\n<p style=\"text-align: justify;\">With the massive use of\u00a0<strong>smartphones<\/strong>,\u00a0<strong>notebooks<\/strong>\u00a0and\u00a0<strong>tablets<\/strong>, users usually connect to which network they find available, without taking into account the risks that this may imply for their information.\u00a0When a user decides to connect to a wireless network, from a cafeteria or other must pay attention to the safety of it and is recommended not to access sites such as electronic banking, as an attacker could be analyzing network traffic and steal your information.<\/p>\n<p style=\"text-align: justify;\">In addition to the technological tools, it is recommended that users follow the\u00a0good practices to navigate the Internet, and in this way to be able to guarantee greater protection to their equipment and their information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually encounter.\u00a0Many problems that can cause the infection of a computer, smartphone or leakage of information are reported daily and the number of users who see their information compromised is considerable.\u00a0That is why [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":16645,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Tips for Not Getting Infected by Malware<\/title>\n<meta name=\"description\" content=\"When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Tips for Not Getting Infected by Malware\" \/>\n<meta property=\"og:description\" content=\"When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"360 Degree Technosoft\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/360DegreeTechnosoft\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-16T10:48:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-20T09:02:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/2018\/04\/Not-Getting-Infected-by-Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"494\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mitra Joshi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@360technosoft_1712\" \/>\n<meta name=\"twitter:site\" content=\"@360technosoft\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mitra Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\"},\"author\":{\"name\":\"Mitra Joshi\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#\/schema\/person\/5e2a4536ee64d2ffae720e8c6de33e03\"},\"headline\":\"10 Tips for Not Getting Infected by Malware\",\"datePublished\":\"2018-04-16T10:48:19+00:00\",\"dateModified\":\"2024-09-20T09:02:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\"},\"wordCount\":949,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#organization\"},\"articleSection\":[\"IT Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\",\"url\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\",\"name\":\"10 Tips for Not Getting Infected by Malware\",\"isPartOf\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#website\"},\"datePublished\":\"2018-04-16T10:48:19+00:00\",\"dateModified\":\"2024-09-20T09:02:30+00:00\",\"description\":\"When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually\",\"breadcrumb\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.360technosoft.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Technology\",\"item\":\"https:\/\/www.360technosoft.com\/blog\/it-technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"10 Tips for Not Getting Infected by Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#website\",\"url\":\"https:\/\/www.360technosoft.com\/blog\/\",\"name\":\"360 Degree Technosoft\",\"description\":\"Mobile App Development Company\",\"publisher\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.360technosoft.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#organization\",\"name\":\"360 Degree Technosoft\",\"url\":\"https:\/\/www.360technosoft.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/2018\/12\/profile_img_2501.jpg\",\"contentUrl\":\"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/2018\/12\/profile_img_2501.jpg\",\"width\":250,\"height\":250,\"caption\":\"360 Degree Technosoft\"},\"image\":{\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/360DegreeTechnosoft\",\"https:\/\/twitter.com\/360technosoft\",\"https:\/\/www.instagram.com\/360degreetechnosoft\/\",\"https:\/\/www.linkedin.com\/company\/360-degree-technosoft\",\"https:\/\/in.pinterest.com\/360technosoft\/\",\"http:\/\/www.youtube.com\/360Technosoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#\/schema\/person\/5e2a4536ee64d2ffae720e8c6de33e03\",\"name\":\"Mitra Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.360technosoft.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fa06666a07b07964b0c71aa1f2b13360?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fa06666a07b07964b0c71aa1f2b13360?s=96&d=mm&r=g\",\"caption\":\"Mitra Joshi\"},\"description\":\"Working as a content writer in 360 Degree Technosoft with 5+ years of experience. An avid reader and loves to cover any and every trending topic in the IT industry. Loves to write on business, marketing, apps, designing, AI, machine learning, and chatbots, and many more.\",\"sameAs\":[\"https:\/\/twitter.com\/360technosoft_1712\"],\"url\":\"https:\/\/www.360technosoft.com\/blog\/author\/mitra-joshi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Tips for Not Getting Infected by Malware","description":"When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/","og_locale":"en_US","og_type":"article","og_title":"10 Tips for Not Getting Infected by Malware","og_description":"When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually","og_url":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/","og_site_name":"360 Degree Technosoft","article_publisher":"https:\/\/www.facebook.com\/360DegreeTechnosoft","article_published_time":"2018-04-16T10:48:19+00:00","article_modified_time":"2024-09-20T09:02:30+00:00","og_image":[{"width":1170,"height":494,"url":"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/2018\/04\/Not-Getting-Infected-by-Malware.jpg","type":"image\/jpeg"}],"author":"Mitra Joshi","twitter_card":"summary_large_image","twitter_creator":"@360technosoft_1712","twitter_site":"@360technosoft","twitter_misc":{"Written by":"Mitra Joshi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#article","isPartOf":{"@id":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/"},"author":{"name":"Mitra Joshi","@id":"https:\/\/www.360technosoft.com\/blog\/#\/schema\/person\/5e2a4536ee64d2ffae720e8c6de33e03"},"headline":"10 Tips for Not Getting Infected by Malware","datePublished":"2018-04-16T10:48:19+00:00","dateModified":"2024-09-20T09:02:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/"},"wordCount":949,"commentCount":0,"publisher":{"@id":"https:\/\/www.360technosoft.com\/blog\/#organization"},"articleSection":["IT Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/","url":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/","name":"10 Tips for Not Getting Infected by Malware","isPartOf":{"@id":"https:\/\/www.360technosoft.com\/blog\/#website"},"datePublished":"2018-04-16T10:48:19+00:00","dateModified":"2024-09-20T09:02:30+00:00","description":"When surfing the Internet, accessing\u00a0social networks, emails or filling out an online form, there are a number of problems that many users usually","breadcrumb":{"@id":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.360technosoft.com\/blog\/10-tips-for-not-getting-infected-by-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.360technosoft.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IT Technology","item":"https:\/\/www.360technosoft.com\/blog\/it-technology\/"},{"@type":"ListItem","position":3,"name":"10 Tips for Not Getting Infected by Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.360technosoft.com\/blog\/#website","url":"https:\/\/www.360technosoft.com\/blog\/","name":"360 Degree Technosoft","description":"Mobile App Development Company","publisher":{"@id":"https:\/\/www.360technosoft.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.360technosoft.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.360technosoft.com\/blog\/#organization","name":"360 Degree Technosoft","url":"https:\/\/www.360technosoft.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.360technosoft.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/2018\/12\/profile_img_2501.jpg","contentUrl":"https:\/\/www.360technosoft.com\/blog\/wp-content\/uploads\/2018\/12\/profile_img_2501.jpg","width":250,"height":250,"caption":"360 Degree Technosoft"},"image":{"@id":"https:\/\/www.360technosoft.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/360DegreeTechnosoft","https:\/\/twitter.com\/360technosoft","https:\/\/www.instagram.com\/360degreetechnosoft\/","https:\/\/www.linkedin.com\/company\/360-degree-technosoft","https:\/\/in.pinterest.com\/360technosoft\/","http:\/\/www.youtube.com\/360Technosoft"]},{"@type":"Person","@id":"https:\/\/www.360technosoft.com\/blog\/#\/schema\/person\/5e2a4536ee64d2ffae720e8c6de33e03","name":"Mitra Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.360technosoft.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fa06666a07b07964b0c71aa1f2b13360?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa06666a07b07964b0c71aa1f2b13360?s=96&d=mm&r=g","caption":"Mitra Joshi"},"description":"Working as a content writer in 360 Degree Technosoft with 5+ years of experience. An avid reader and loves to cover any and every trending topic in the IT industry. Loves to write on business, marketing, apps, designing, AI, machine learning, and chatbots, and many more.","sameAs":["https:\/\/twitter.com\/360technosoft_1712"],"url":"https:\/\/www.360technosoft.com\/blog\/author\/mitra-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/posts\/12708"}],"collection":[{"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/comments?post=12708"}],"version-history":[{"count":9,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/posts\/12708\/revisions"}],"predecessor-version":[{"id":21828,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/posts\/12708\/revisions\/21828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/media\/16645"}],"wp:attachment":[{"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/media?parent=12708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/categories?post=12708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.360technosoft.com\/blog\/wp-json\/wp\/v2\/tags?post=12708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}