{"id":85754,"date":"2024-08-26T16:59:11","date_gmt":"2024-08-26T08:59:11","guid":{"rendered":"https:\/\/version-2.com\/?p=85754"},"modified":"2024-08-20T17:24:35","modified_gmt":"2024-08-20T09:24:35","slug":"10-business-email-security-best-practices","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/08\/10-business-email-security-best-practices\/","title":{"rendered":"10 Business Email Security Best Practices"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"85754\" class=\"elementor elementor-85754\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"Article_wrapper__8_7eU\"><div class=\"richtext\"><h2 id=\"what-is-email-security-for-business\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What is email security for business?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Email security for business is a rather broad term but can be defined as all the measures companies take to protect their email systems, networks, and data from cyber threats. With hacker techniques becoming more sophisticated every single day, companies must stay <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/cybersecurity-trends-2024\/\" data-ga-slug=\"Link to \/blog\/cybersecurity-trends-2024\/\">on top of the evolving cybersecurity landscape<\/a> and adjust their security tools and strategies accordingly.<\/p><p class=\"nord-text text-base leading-normal text-black\">Enterprise email security deals with a much larger scale of email users, infrastructure, and data than email security for small businesses. While the size of the company requires complex, robust, and scalable security solutions, secure online behaviors are universal and protect employees regardless of where they work.<\/p><h2 id=\"what-is-business-email-compromise-bec\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What is Business Email Compromise (BEC)?<\/h2><p class=\"nord-text text-base leading-normal text-black\">BEC is a type of cybercrime that involves impersonating a trusted business contact, such as a CEO or supplier, to trick employees into transferring money or sensitive information. These scams are often the result of careful research and social engineering to create a convincing ruse.<\/p><p class=\"nord-text text-base leading-normal text-black\">According to the <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" data-link=\"NordUIlink\">FBI<\/a>, BEC fraud has cost companies over $26 billion globally since 2016, and the threat continues to grow. Small businesses are particularly vulnerable, as they may not have the resources or expertise to detect and prevent these attacks.<\/p><p class=\"nord-text text-base leading-normal text-black\">One example of a BEC scam involved the director of Puerto Rico\u2019s Industrial Development Company, Ruben Rivera, who mistakenly made a transaction of $2.6 million to a fake bank account. In another case, Ubiquiti Networks Inc. the San Jose-based manufacturer of high-performance networking technologies, fell victim to a BEC attack that resulted in a loss of $46.7 million.<\/p><p class=\"nord-text text-base leading-normal text-black\">As the use of email continues to be an essential aspect of business communication, companies must remain vigilant and take proactive measures to defend against the threat of BEC. It applies to all kinds of companies: Email security for small businesses is as fundamental as for big corporations.<\/p><h2 id=\"why-is-email-security-important\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Why is email security important?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Email has become an integral part of our digital lives, functioning almost like a virtual ID card that allows us to identify ourselves online and sign up for services. As one of the most popular methods of online communication, our emails contain sensitive information about us. If malicious parties gain access, they can take over the user\u2019s other online accounts, steal their confidential data, and pose serious financial and reputational threats to that user. This is why email is so often targeted by cybercriminals; according to Verizon\u2019s Data Breach Investigations Report, 94% of malware is delivered via email. Given the risks and the frequency of email malware attacks, ensuring email security is crucial, especially in business environments.<\/p><p>\u00a0<\/p><h2 id=\"phishing-is-the-number-one-email-security-threat\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Phishing is the number one email security threat<\/h2><p class=\"nord-text text-base leading-normal text-black\">Phishing is a type of digital scam that is <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-phishing-email\/\" data-ga-slug=\"Link to \/blog\/what-is-phishing-email\/\" data-link=\"NordUIlink\">especially common in emails<\/a>. It\u2019s a form of social engineering where a hacker tries to deceive an employee into believing the email is coming from a credible source. Such emails usually have a CTA: it\u2019s like a form of marketing. Except that phishing CTAs usually involve clicking on a malicious link or revealing sensitive company data to outsiders.<\/p><p class=\"nord-text text-base leading-normal text-black\">Well, just like any other marketer, hackers employ creative techniques to improve the conversion rates of their scams. The more deceitful the email, the higher the conversion rate. That\u2019s why phishing emails can be difficult to spot at times. This highlights the importance of email security for business. Examples of phishing emails include:<\/p><ul class=\"leading-relaxed List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Account verification scam. You may receive a phishing email that looks something like this: \u201cDue to a recent security threat, we would like to ask you to verify your account by signing in through the link below. Failing to do so will result in the permanent deactivation of your account.\u201d<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Fake invoice scam. Hackers may send out emails saying, \u201cWe still haven\u2019t received your payment for our services. Please use the link below to complete the transaction.\u201d<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Spear phishing. This is a more advanced and tailored form of phishing that requires hackers to do some research on your company. For instance, an employee may receive an email that looks like it\u2019s coming from a specific coworker, instructing them to visit a website or disclose information.<\/p><\/li><\/ul><h2 id=\"best-practices-for-business-email-security\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Best practices for business email security<\/h2><p class=\"nord-text text-base leading-normal text-black\">Falling for phishing scams can expose your company to data breaches and malware. Taking steps to appropriately ensure the security of your email will help protect your business from phishing and other forms of cybercrime:<\/p><h3 id=\"1-conduct-phishing-awareness-training\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">1. Conduct phishing awareness training<\/h3><p class=\"nord-text text-base leading-normal text-black\">Emails usually get breached through employee negligence and lack of knowledge. So the first way to increase email cybersecurity is to raise awareness about the main threat: phishing. All employees should receive in-depth training on email threat protection \u2014 recognizing and avoiding attempted phishing schemes. The main points to cover here are:<\/p><ul class=\"leading-relaxed List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Becoming familiar with the main phishing schemes<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Being suspicious about unusual requests<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Never click on random links received through email<\/p><\/li><\/ul><p class=\"nord-text text-base leading-normal text-black\">Once employees are familiar with these precautions, your company\u2019s susceptibility to phishing emails will significantly decrease and your business email security will improve in general.<\/p><h3 id=\"2-train-employees-on-how-to-deal-with-email-attachments-and-suspicious-email-links\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">2. Train employees on how to deal with email attachments and suspicious email links<\/h3><p class=\"nord-text text-base leading-normal text-black\">Email attachments and suspicious links are the most common methods cybercrooks use to spread malicious software. To establish well-functioning business or corporate email security, ensure your employees know these devious practices and are trained to spot them in real-life situations. With time and a lot of practice, your team will develop a sense of suspicious email links and attachments, which should considerably lower the potential attack vector and significantly improve your overall security posture.<\/p><h3 id=\"3-enable-multi-factor-authentication\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">3. Enable multi-factor authentication<\/h3><p class=\"nord-text text-base leading-normal text-black\">You can make your account safer from hackers by connecting your smartphone to your email. Even if the passwords to your email accounts are leaked, no outsiders will be able to access them without having access to the device it\u2019s connected to. All vital business accounts, not just email accounts, should have <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-multi-factor-authentication\/\" data-ga-slug=\"Link to \/blog\/what-is-multi-factor-authentication\/\">multi-factor authentication<\/a> enabled.<\/p><h3 id=\"4-avoid-using-email-when-on-public-wi-fi\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">4. Avoid using email when on public Wi-Fi<\/h3><p class=\"nord-text text-base leading-normal text-black\">Public Wi-Fi poses massive risks to email security. If it\u2019s unencrypted (which it often is), anybody can connect to the same network. You never know when a hacker will be that someone.<\/p><p class=\"nord-text text-base leading-normal text-black\">If a hacker intercepts your connection with unencrypted public Wi-Fi and catches you logging into your email, they can steal your email password. It\u2019s best to steer clear of public Wi-Fi altogether, but if connecting to it is necessary, never transmit important data while on it.<\/p><h3 id=\"5-avoid-using-business-emails-for-private-purposes-and-vice-versa\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">5. Avoid using business emails for private purposes and vice versa<\/h3><p class=\"nord-text text-base leading-normal text-black\">Most office jobs these days come with an email address. Some people get the temptation to use the new email address for all sign-ins. Need to sign up for a new streaming service? Well, why not use your brand-new business email for that? Everybody else does it, anyway, right?<\/p><p class=\"nord-text text-base leading-normal text-black\">At first, it might sound like a great idea. Yet using your enterprise email for private purposes and vice versa could cause significant security concerns for you as an individual and the company.<\/p><p class=\"nord-text text-base leading-normal text-black\">First, using a company email for your personal online activities allows for easier and simpler profiling. Consequently, that could lead to spear-phishing \u2014 a targeted phishing campaign or other targeted cyberattacks.<\/p><h3 id=\"6-encrypt-company-email\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">6. Encrypt company email<\/h3><p class=\"nord-text text-base leading-normal text-black\">Encrypting company email using special email security software is a great way to steer hackers away. Encryption ensures that the only people able to view the emails are the sender and recipient. If a hacker intercepts an employee\u2019s Wi-Fi connection or email account, they will not see any sensitive data.<\/p><h3 id=\"7-set-up-email-security-protocols\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">7. Set up email security protocols<\/h3><p class=\"nord-text text-base leading-normal text-black\">Email security protocols are immensely important because they provide an extra layer of security to your digital communications. The protocols are designed to ensure the safety of your communications as they pass through webmail services over the internet. Without the aid of email security protocols, bad actors can intercept communication in a relatively easy manner. Please familiarize yourself with the three most popular email security protocols and enable them to ensure secure communications.<\/p><ul class=\"leading-relaxed List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Transport Layer Security (TLS): <\/b>TLS \u2014 the successor of SSL, Secure Sockets Layer, protocol \u2014 encrypts email messages when they travel between mail servers. It makes it much harder for hackers to intercept the communication and eavesdrop.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Domain Keys Identified Mail (DKIM): <\/b>DKIM adds a digital signature to emails, allowing receiving mail servers to verify the authenticity of the messages. It protects the company servers from phishing attempts and tampering emails.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Sender Policy Framework (SPF):<\/b> SPF allows domain owners to create a list of mail servers that are authorized to send emails on behalf of their domain. When a company server receives the message, it can authenticate the sender by comparing its email address with the SPF records.<\/p><\/li><\/ul><h3 id=\"8-improve-endpoint-security\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">8. Improve endpoint security<\/h3><p class=\"nord-text text-base leading-normal text-black\">To further fortify your security stance, take action to improve your endpoint security. Often the easiest and most effective way to boost endpoint security is by implementing security tools for company-wide use.<\/p><p class=\"nord-text text-base leading-normal text-black\">Consider deploying a VPN like <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/nordlayer.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/nordlayer.com\/\" data-link=\"NordUIlink\">NordLayer<\/a> \u2014 a tool that encrypts the internet connection and data transferred over your business network. Antivirus software is another tool that should be used on all business workstations to ensure a proactive defense.<\/p><h3 id=\"9-don\u2019t-change-passwords-too-often\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">9. Don\u2019t change passwords too often<\/h3><p class=\"nord-text text-base leading-normal text-black\">Password fatigue is a fact of life \u2014 today, the average user has about 100 passwords on their hands. Keeping track of all the passwords is a challenge.<\/p><p class=\"nord-text text-base leading-normal text-black\">The conventional wisdom regarding password security is that you should change your passwords every 90 days. While that might sound like a reasonable security practice, it could lead to simpler and easy-to-crack passwords being used.<\/p><p class=\"nord-text text-base leading-normal text-black\">If you know that your employees take password hygiene seriously and craft hard-to-guess passwords and that none of their passwords were ever leaked, then they should stick to the passwords they already use. If any password (no matter how strong it is) is leaked or breached \u2014 the change should be immediate.<\/p><h3 id=\"10-use-strong-passwords-for-email-accounts\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">10. Use strong passwords for email accounts<\/h3><p class=\"nord-text text-base leading-normal text-black\">Strong passwords are the backbone of account safety. Yet businesses often fail to secure their emails with <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/secure-password\/\" data-ga-slug=\"Link to \/secure-password\/\" data-link=\"NordUIlink\">strong passwords<\/a>. If your business is like this, you should know that the easier the password, the easier it is to hack, especially through brute-force attacks. <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/brute-force-attack\/\" data-ga-slug=\"Link to \/blog\/brute-force-attack\/\" data-link=\"NordUIlink\">Brute-force attacks<\/a> are when hackers try to guess a password by flooding your account with thousands of attempts.<\/p><p class=\"nord-text text-base leading-normal text-black\">To protect your business email from such attacks, ensure everyone in your organization secures their passwords. Secure email passwords are:<\/p><ul class=\"leading-relaxed List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Long<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Complicated<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Contain different types of characters<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\">Unique (never reused from other accounts)<\/p><\/li><\/ul><p class=\"nord-text text-base leading-normal text-black\">These points are crucial if you want to ensure the safety of your business. However, passwords that are difficult to hack are also difficult to remember. The last thing anyone would want is to secure their account so well that they couldn\u2019t even access it themselves.<\/p><p class=\"nord-text text-base leading-normal text-black\">Luckily, the <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/business-password-manager\/\" data-ga-slug=\"Link to \/business-password-manager\/\" data-link=\"NordUIlink\">business password manager<\/a> and the <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/enterprise-password-manager\/\" data-ga-slug=\"Link to \/enterprise-password-manager\/\">enterprise password manager<\/a> by NordPass can come to the rescue. If all members of your company use it for their accounts, their emails will be safe, and they won\u2019t need to scratch their heads trying to remember their passwords.<\/p><h2 id=\"bottom-line\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Bottom line<\/h2><p class=\"nord-text text-base leading-normal text-black\">Business email security is never a given. Even though platforms like Gmail or Outlook do their best to ensure the safety of their users, you can easily fall victim to hackers if you don\u2019t actively protect your account. By following these ten email security best practices, the chances of getting your business emails hacked will be much slimmer because hackers will likely prefer more vulnerable prey.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What is email security for business? Email security for [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[974,1131,1272],"class_list":["post-85754","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 Business Email Security Best Practices - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Business Email Security Best Practices - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is email security for business? Email security for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-26T08:59:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/10-business-email-security-best-practices\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"10 Business Email Security Best Practices\",\"datePublished\":\"2024-08-26T08:59:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/10-business-email-security-best-practices\\\/\"},\"wordCount\":1893,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/3a8cd1c917\\\/business-email-security.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/10-business-email-security-best-practices\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/\",\"name\":\"10 Business Email Security Best Practices - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/3a8cd1c917\\\/business-email-security.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-08-26T08:59:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/3a8cd1c917\\\/business-email-security.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/3a8cd1c917\\\/business-email-security.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/email-security-best-practices-for-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Business Email Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Business Email Security Best Practices - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/","og_locale":"en_US","og_type":"article","og_title":"10 Business Email Security Best Practices - Version 2","og_description":"What is email security for business? Email security for [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/","og_site_name":"Version 2","article_published_time":"2024-08-26T08:59:11+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/10-business-email-security-best-practices\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"10 Business Email Security Best Practices","datePublished":"2024-08-26T08:59:11+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/10-business-email-security-best-practices\/"},"wordCount":1893,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)","keywords":["Nord Security","NordPass","2024"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/10-business-email-security-best-practices\/","url":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/","name":"10 Business Email Security Best Practices - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-08-26T08:59:11+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/3a8cd1c917\/business-email-security.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/email-security-best-practices-for-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"10 Business Email Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-mj8","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=85754"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85754\/revisions"}],"predecessor-version":[{"id":85760,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85754\/revisions\/85760"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=85754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=85754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=85754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}