{"id":109688,"date":"2025-04-17T12:38:30","date_gmt":"2025-04-17T04:38:30","guid":{"rendered":"https:\/\/version-2.com\/?p=109688"},"modified":"2025-04-14T12:43:40","modified_gmt":"2025-04-14T04:43:40","slug":"what-is-internet-of-things-iot-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/04\/what-is-internet-of-things-iot-security\/","title":{"rendered":"What Is Internet of Things (IoT) Security?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"109688\" class=\"elementor elementor-109688\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)\" width=\"828\" height=\"465\" \/><\/p><div class=\"richtext\"><h2 id=\"what-is-iot\" class=\"heading-xl text-primary\">What is IoT?<\/h2><p class=\"body-md text-primary\">The Internet of Things (IoT) is what we call networks of physical objects that are packed with sensors, cameras, listening devices, and other technologies\u2014like today\u2019s smartphones, appliances, wearables, and cars. These devices are connected over the internet or a local network, so they can exchange data with each other. This allows them to work together as part of a smart system, enabling the automation of tasks and the creation of intelligent environments like smart homes or smart workplaces. Because of the way IoT devices operate, the Internet of Things and cybersecurity must go hand in hand to deliver smart experiences while ensuring safety and privacy for all users.<\/p><h2 id=\"what-is-iot-security\" class=\"heading-xl text-primary\">What is IoT security?<\/h2><p class=\"body-md text-primary\">IoT security is all about protecting the interconnected smart devices and the networks they connect to. Since these devices can collect, store, and share data about users\u2019 surroundings, this data must be handled with the utmost care and caution.<\/p><p class=\"body-md text-primary\">IoT devices aren\u2019t just for personal use\u2014more and more are making their way into workplaces. For example, businesses now install smart thermostats, blinds, and seating planners to optimize resources in their offices.<\/p><p class=\"body-md text-primary\">The benefit of these devices syncing and working together is that they regularly share and communicate data to improve functionality. However, since these devices are interconnected, gaining access to one could allow bad actors to exploit and breach your entire network. That\u2019s why Internet of Things device security (as well as IoT network security) is essential to prevent vulnerabilities that could lead to cyberattacks.<\/p><h2 id=\"why-is-iot-security-important\" class=\"heading-xl text-primary\">Why is IoT security important?<\/h2><p class=\"body-md text-primary\">The recent influx of IoT devices has provided another avenue for hackers to exploit in recent years. IoT devices can be particularly vulnerable to security breaches. At the end of 2021, a study concluded that up to <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.hipaajournal.com\/82-of-healthcare-organizations-have-experienced-an-iot-cyberattack-in-the-past-18-months\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"82% of healthcare organizations\" data-testid=\"82-of-healthcare-organizations-in-na\" data-link-full-refresh=\"true\">82% of healthcare organizations<\/a> experienced an IoT cyberattack over 18 months. There are often security oversights regarding the IoT and its apps. For example, <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.businessinsider.com\/teen-security-researcher-describes-how-he-hacked-into-25-teslas-2022-1\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"a German teenager hacked Tesla vehicles\u2019 app\" data-testid=\"a-german-teenager-hacked-tesla-vehicles\u2019-app-in-na\" data-link-full-refresh=\"true\">a German teenager hacked Tesla vehicles\u2019 app<\/a> component not that long ago. While he couldn&#8217;t access the driving functions like steering or brakes, he could still exploit other potentially dangerous features like unlocking doors, playing music at max volume, and flashing lights. The more IoT devices become common, the more widespread their security threats will become.<\/p><h2 id=\"which-industries-need-iot-security\" class=\"heading-xl text-primary\">Which industries need IoT security?<\/h2><p class=\"body-md text-primary\">Smart devices have made their way into almost every part of our lives. However, some industries rely more heavily on IoT technology than others and require additional security due to its strategic meaning for the nations&#8217; and communities\u2019 welfare.<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Healthcare<\/p><\/li><\/ul><p class=\"body-md text-primary\">Patient monitoring, advanced medical equipment, administering treatments and vaccines: Medical services increasingly rely on smart devices. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.cynerio.com\/ponemon-survey-insecurity-of-connected-devices-in-healthcare-2022\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Cynerio and Ponemon's Study\" data-testid=\"cynerio-and-ponemons-study-in-na\" data-link-full-refresh=\"true\">Cynerio and Ponemon&#8217;s Study<\/a> proves that healthcare is especially vulnerable to cyber attacks involving the Internet of Things devices as they constitute 88% of all hospital data breaches. More than half of hospitals in the US have experienced an attack on their smart devices between 2020 and 2022. The damage that cybercriminals can cause in healthcare is horrifying \u2014 the mortality rate increased in 24% of the attacked hospitals.<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Energy and Utilities<\/p><\/li><\/ul><p class=\"body-md text-primary\">Internet of Things devices are widely used in the energy and utilities sector for smart grid management, optimizing energy consumption, and remote monitoring of infrastructure. Monitoring devices such as smart meters, security cameras, and temperature\/fire\/chemical leak controls are prime targets for cybercriminals. Protecting energy infrastructure is essential to prevent disruptions to critical services, including electricity, heating, traffic control, or medical care.<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Manufacturing<\/p><\/li><\/ul><p class=\"body-md text-primary\">It\u2019s hard to imagine a modern factory without Internet of Things solutions enabling process automation, supply chain management, and predictive maintenance. The endless possibilities that smart devices present to this sector can be overshadowed by the costs of cyberattacks, as hackers often target factories to demand ransom.<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Logistics<\/p><\/li><\/ul><p class=\"body-md text-primary\">IoT devices are entering the logistics industry through fleet, vessel, and traffic management systems. Self-driving vehicles are becoming commonplace in major cities. Also, the railway relies on Internet of Things devices for traffic planning and power supply management. Hacking an IoT-reliant logistics system could cause chaos on highways or railroads.<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Supply Chain<\/p><\/li><\/ul><p class=\"body-md text-primary\">In the supply chain industry, connected devices are used for tracking, monitoring, and managing goods throughout transportation. The security risk created by IoT tools used in day-to-day operations grows with the number of vendors a company cooperates with. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/supply-chain-attacks\/\" data-ga-slug=\"Supply chain attacks\" data-testid=\"supply-chain-attacks-in-na\">Supply chain attacks<\/a> often target third-party partners or suppliers to access the company\u2019s assets.<\/p><h2 id=\"iot-security-challenges\" class=\"heading-xl text-primary\">IoT security challenges<\/h2><p class=\"body-md text-primary\">While smart devices introduce plenty of opportunities and convenience to our lives, they also open up the possibility of cyberattacks. Industries such as healthcare and manufacturing increasingly rely on IoT devices, exposing unprepared organizations to cyberattacks. Here are some of the threats IoT devices are susceptible to:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Malware: <\/b>Because cybersecurity isn\u2019t the primary concern of many smart devices, hackers don\u2019t require advanced malicious software to attack. Rudimentary malware can steal data and cause damage to networks and devices. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/medium.com\/@rokkex\/mirai-and-how-your-ip-camera-brought-down-the-internet-15be064ca30f\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/medium.com\/@rokkex\/mirai-and-how-your-ip-camera-brought-down-the-internet-15be064ca30f\" data-testid=\"medium-com-@rokkex-mirai-and-how-your-ip-camera-brought-down-the-internet-15be064ca30f-in-na\" data-link-full-refresh=\"true\">Mirai<\/a> is used to infect security cameras, scan the network for the IP address of IoT devices, and connect. This allows hackers to launch significant DDoS attacks.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Credential-based attacks:<\/b> Using stolen login IDs and passwords is a popular method for hackers because many people\u2019s logins are already floating around online thanks to massive data leaks such as Collection #1. Once a business\u2019s smart device\u2019s application layer is breached, hackers can access any device connected to the network.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Data theft and exposure:<\/b> Adding IoT devices to your home or office will introduce more potential entry points for hackers to access data. This increases the risk of personal information being stolen and exposed on the internet. A good example of this is when <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/03\/attackers-can-force-amazon-echos-to-hack-themselves-with-self-issued-commands\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/arstechnica.com\/information-technology\/2022\/03\/attackers-can-force-amazon-echos-to-hack-themselves-with-self-issued-commands\/\" data-testid=\"arstechnica-com-information-technology-2022-03-attackers-can-force-amazon-echos-to-hack-themselves-with-self-issued-commands-in-na\" data-link-full-refresh=\"true\">hackers used Amazon\u2019s Alexa<\/a> to issue self-commands allowing the attackers to control smart lights, buy items on Amazon, and tamper with calendars.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Incorrect device management and configuration:<\/b> Similar to the above, the more devices and accounts you add, the greater the chance of reusing passwords and usernames. Companies often ship IoT devices <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/nordlayer.com\/blog\/how-to-secure-iot-devices-in-business\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/nordlayer.com\/blog\/how-to-secure-iot-devices-in-business\/\" data-testid=\"nordlayer-com-blog-how-to-secure-iot-devices-in-business-in-na\" data-link-full-refresh=\"true\">with default logins<\/a> that should be changed during their setup. However, a survey of CIOs and IT managers showed that <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/internetofbusiness.com\/password-iot\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/internetofbusiness.com\/password-iot\/\" data-testid=\"internetofbusiness-com-password-iot-in-na\" data-link-full-refresh=\"true\">almost 50%<\/a> of them allowed IoT devices onto their corporate network without changing the default passwords.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Complex ecosystem and smart device diversity:<\/b> An office\u2019s IoT ecosystem can quickly become a juggernaut of interconnected devices. These devices have many moving parts that operate at different levels. Overseeing and managing your wide array of IoT devices will help you prevent IoT attacks.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Not following security by design:<\/b> Cybersecurity is generally not the main focus of many IoT devices, often taking a backseat to its functionality. Your office\u2019s IoT security could be at risk because specific devices may have cybersecurity weaknesses that need to receive software updates. There\u2019s also the possibility that any security features may be obsolete if the product is discontinued and no longer supported by its developer.<\/p><\/li><\/ul><h2 id=\"examples-of-iot-security-threats\" class=\"heading-xl text-primary\">Examples of IoT security threats<\/h2><h3 id=\"jeep-grand-cherokee\" class=\"heading-lg text-primary\">Jeep Grand Cherokee<\/h3><p class=\"body-md text-primary\">Back in 2015, security researchers Charlie Miller and Chris Valasek set out to see if they could remotely hack into and take control of a new Jeep model\u2014the Jeep Grand Cherokee. They ran a series of cybersecurity tests, and sure enough, they found a major backdoor in the Jeep\u2019s built-in infotainment system, which handles things like navigation and entertainment.<\/p><p class=\"body-md text-primary\">Using this vulnerability, they were able to connect to the car\u2019s other systems and take control of the car\u2019s key mechanics like braking, engine control, air conditioning, and transmission. Basically, they turned that Jeep into one of the most expensive remote-controlled toy cars in the world! After this demonstration, Chrysler (the owner of Jeep) had no choice but to recall more than 1 million Grand Cherokees to fix the software vulnerability.<\/p><h3 id=\"mirai-botnet\" class=\"heading-lg text-primary\">Mirai botnet<\/h3><p class=\"body-md text-primary\">Probably the most famous\u2014or infamous, actually\u2014IoT security breach ever, the Mirai botnet was first identified in 2016 and has remained a persistent cyber threat ever since. It works by infecting vulnerable IoT devices\u2014like AVTECH CCTV cameras and Four-Faith industrial routers\u2014and using them to launch large-scale distributed denial-of-service (DDoS) attacks.<\/p><p class=\"body-md text-primary\">In 2018, a Mirai variant was used in a 1.35 Tbps DDoS attack against GitHub, briefly knocking the platform offline. In 2020, the FBI issued a warning that Mirai-based attacks could go beyond websites and target critical infrastructure, like power grids and industrial systems.<\/p><p class=\"body-md text-primary\">But here\u2019s the real problem: the Mirai botnet is still out there. Its original creators released the source code online, and since then, cybercriminals worldwide have been modifying and weaponizing it. Even today, in 2025, Mirai-based botnets are still behind record-breaking cyberattacks, targeting everything from internet service providers to government networks.<\/p><h3 id=\"throughtek\" class=\"heading-lg text-primary\">ThroughTek<\/h3><p class=\"body-md text-primary\">In 2021, security researchers uncovered a serious flaw in ThroughTek\u2019s IoT software, which is used in millions of smart cameras, baby monitors, and security systems around the world. It turned out that hackers could use this vulnerability to remotely access live video and audio streams from the cameras, and in some cases, even take full control of these devices, exposing sensitive footage from homes and businesses in the process.<\/p><p class=\"body-md text-primary\">The vulnerability was so severe that the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning, rating it 9.1 out of 10 on the severity scale.<\/p><h2 id=\"how-to-secure-iot-devices\" class=\"heading-xl text-primary\">How to secure IoT devices<\/h2><p class=\"body-md text-primary\">The good news is that maintaining an overall good cybersecurity policy for your company will help safeguard your IoT devices. Training your staff with cybersecurity best practices and appointing specific admin roles to deal with the security of IoT devices in your organization are all methods for securing your business from IoT threats.<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Regularly updating and checking IoT devices for patches:<\/b> By staying up to date with your IoT devices\u2019 firmware, you\u2019re better equipped to protect your workplace from ever-evolving cyber threats. While people regularly update their computers and phones, they may forget to update their IoT devices.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Monitoring device behavior:<\/b> By knowing your device\u2019s base behavior and aspects such as its performance or regular network activity, you can recognize irregular behavior and intervene if you notice any deviations to your device\u2019s performance.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Using strong and unique passwords:<\/b> Using a password manager for your organization helps secure your IoT data security. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/business-password-manager\/\" data-ga-slug=\"Link to \/business-password-manager\/\" data-testid=\"business-password-manager-in-na\">NordPass Business<\/a> creates unique, complex passwords. Additionally, it regularly reminds you to update passwords if they\u2019re old, reused, or weak.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Checking app permissions for IoT devices:<\/b> If an IoT device comes with an app, it is better to review the permissions it\u2019s requesting before allowing access to your device or network. You shouldn\u2019t grant apps more permissions than are strictly necessary.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Applying network segmentation and network security:<\/b> Your workplace should have a way to monitor network activity and any devices connected to it. Tracking this information will help you recognize irregular internet traffic and act as an additional layer of security. This means that if one device is affected by an attack, it won\u2019t be passed on to your other devices.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Considering additional security solutions and tools:<\/b> To secure the app component of IoT devices, consider only accessing the app via a VPN. Doing so will encrypt the data transferred and give your network an extra layer of security.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Using <\/b><a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/supply-chain-attacks\/\" data-ga-slug=\"Link to \/blog\/supply-chain-attacks\/\" data-testid=\"blog-supply-chain-attacks-in-na\"><b>multi-factor authentication<\/b><\/a><b> (MFA):<\/b> The more layers of security (authentication factors) smart devices used in your workplace have, the safer your company assets are. Incorporating additional factors to authenticate the user, such as biometric data or the user\u2019s geolocation, makes your IoT devices less vulnerable to cyber attacks.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Applying Cloud IoT Security:<\/b> Many IoT applications leverage cloud computing for storing, processing, and analyzing data. Therefore, it&#8217;s essential to implement security strategies, procedures, and tools that encompass <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/cloud-security\/\" data-ga-slug=\"Link to \/blog\/cloud-security\/\" data-testid=\"blog-cloud-security-in-na\">cloud security<\/a> if your organization utilizes smart devices.<\/p><\/li><\/ul><h2 id=\"how-nordpass-business-boosts-your-iot-security\" class=\"heading-xl text-primary\">How NordPass Business boosts your IoT security<\/h2><p class=\"body-md text-primary\">The surge of IoT devices in private and professional settings provides more potential routes for hackers to steal valuable data and information. These devices and networks are more intertwined than ever, meaning cybersecurity for IoT shouldn\u2019t be ignored. For companies working with large amounts of data, <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/enterprise-password-manager\/\" data-ga-slug=\"NordPass Enterprise\" data-testid=\"nordpass-enterprise-in-na\">NordPass Enterprise<\/a> is the cybersecurity solution you\u2019re looking for. With NordPass, you can securely store and share login credentials for all your accounts and generate strong, unique logins in no time. NordPass allows you and your colleagues to quickly access important office notes (alarm PINs, WiFi passwords, and recovery codes) in one place.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What is IoT? The Internet of Things (IoT) is what we ca [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1129,1305,973,61],"tags":[1131,974,1077],"class_list":["post-109688","post","type-post","status-publish","format-standard","hentry","category-nordpass","category-1305","category-nord-security","category-press-release","tag-nordpass","tag-nord-security","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Internet of Things (IoT) Security? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Internet of Things (IoT) Security? - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is IoT? The Internet of Things (IoT) is what we ca [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-17T04:38:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/04\\\/what-is-internet-of-things-iot-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What Is Internet of Things (IoT) Security?\",\"datePublished\":\"2025-04-17T04:38:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/04\\\/what-is-internet-of-things-iot-security\\\/\"},\"wordCount\":2038,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/4830ee20e2\\\/iot-security.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"NordPass\",\"Nord Security\",\"2025\"],\"articleSection\":[\"NordPass\",\"2025\",\"Nord Security\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/04\\\/what-is-internet-of-things-iot-security\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/\",\"name\":\"What Is Internet of Things (IoT) Security? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/4830ee20e2\\\/iot-security.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2025-04-17T04:38:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/4830ee20e2\\\/iot-security.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/4830ee20e2\\\/iot-security.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/iot-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Internet of Things (IoT) Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Internet of Things (IoT) Security? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/iot-security\/","og_locale":"en_US","og_type":"article","og_title":"What Is Internet of Things (IoT) Security? - Version 2","og_description":"What is IoT? The Internet of Things (IoT) is what we ca [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/iot-security\/","og_site_name":"Version 2","article_published_time":"2025-04-17T04:38:30+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/iot-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/04\/what-is-internet-of-things-iot-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What Is Internet of Things (IoT) Security?","datePublished":"2025-04-17T04:38:30+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/04\/what-is-internet-of-things-iot-security\/"},"wordCount":2038,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)","keywords":["NordPass","Nord Security","2025"],"articleSection":["NordPass","2025","Nord Security","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/04\/what-is-internet-of-things-iot-security\/","url":"https:\/\/nordpass.com\/blog\/iot-security\/","name":"What Is Internet of Things (IoT) Security? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/iot-security\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)","datePublished":"2025-04-17T04:38:30+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/iot-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/iot-security\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/4830ee20e2\/iot-security.png\/m\/828x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What Is Internet of Things (IoT) Security?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-sxa","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/109688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=109688"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/109688\/revisions"}],"predecessor-version":[{"id":109702,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/109688\/revisions\/109702"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=109688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=109688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=109688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}