{"id":19118,"date":"2023-10-19T16:20:42","date_gmt":"2023-10-19T14:20:42","guid":{"rendered":"https:\/\/www.irontree.co.za\/?p=19118"},"modified":"2025-01-29T16:00:19","modified_gmt":"2025-01-29T14:00:19","slug":"safeguarding-smes-top-8-cybersecurity-strategies","status":"publish","type":"post","link":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/","title":{"rendered":"Safeguarding SMEs: Top 8 Cybersecurity Strategies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19118\" class=\"elementor elementor-19118\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f5a46b5 e-flex e-con-boxed e-con e-parent\" data-id=\"3f5a46b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69a3905f elementor-widget elementor-widget-text-editor\" data-id=\"69a3905f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity has shifted to not only be critical for large corporations and governments. Small and medium-sized enterprises (SMEs) have also started to become prime targets for cyberattacks. In fact,\u00a0<a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/small-business-cyber-attack-statistics\/#:~:text=Small%20businesses%20account%20for%2043,%2425%2C000%20due%20to%20cyber%20attacks.\">Accenture\u2019s Cybercrime Study<\/a>reveals that nearly 43% of cyberattacks are on small businesses. Cybercriminals often view SMEs as easier targets with data that is still extremely valuable. For many small businesses, a data breach or cyberattack could be catastrophic, potentially leading to financial losses, a damaged reputation, and even business closure.<\/p>\n<p>The good news is that you don\u2019t need a huge budget to protect your SME from cyberthreats. Let\u2019s explore some of the best cybersecurity strategies, tailored specifically for SMEs.<\/p>\n<h4 id=\"h-back-up-your-critical-data\"><strong>Back Up Your Critical Data<\/strong><\/h4>\n<p>Data loss can be a devastating outcome of a cyberattack. Regular data backups are a simple and effective way to mitigate this risk. Ensure that you have\u00a0<a href=\"https:\/\/metrofile.com\/cloud\/cloudnew\/storeit\/\">automated backups<\/a>\u00a0that are stored securely, both on and off-site. It is also important to test your backups periodically to ensure they can be successfully restored when need be.<\/p>\n<h4 id=\"h-firewall-amp-antivirus-software\"><strong>Firewall &amp; Antivirus Software<\/strong><\/h4>\n<p>Invest in a reputable\u00a0<a href=\"https:\/\/metrofile.com\/cloud\/cloudnew\/protectit\/\">firewall and antivirus software<\/a>. These are essential for protecting your organisation\u2019s systems from malware and unauthorised access. Malware is software that is specifically designed to harm computer systems.<\/p>\n<h4 id=\"h-multi-factor-authentication-mfa\"><strong>Multi-Factor Authentication (MFA)<\/strong><\/h4>\n<p>MFA adds an additional layer of security by requiring users to provide more verification factors to access the account. This can significantly reduce the risk of unauthorised access, even if passwords are compromised. SMEs should enable MFA for all critical accounts and services.<\/p>\n<h4 id=\"h-employee-awareness-amp-training\"><strong>Employee Awareness &amp; Training<\/strong><\/h4>\n<p>One of the most cost-effective cybersecurity measures is investing in employee training and awareness. Your employees are both your first line of defence and a potential weak link in your cybersecurity chain. By educating them about common cyberthreats like<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/phishing\">\u00a0phishing<\/a>\u00a0and the importance of strong passwords, you can significantly reduce the risk of a cyberattack on your organisation.<\/p>\n<h4 id=\"h-incident-response-plan\"><strong>Incident Response Plan<\/strong><\/h4>\n<p>Having a well-defined\u00a0<a href=\"https:\/\/hyperproof.io\/resource\/cybersecurity-incident-response-plan\/\">incident response plan<\/a>\u00a0is invaluable in the event of a cybersecurity breach. It helps in minimising the damage, containing the threat, and recovering quickly. SMEs should develop a comprehensive incident response plan that outlines roles and responsibilities. Test the plan regularly through simulated cyberattack scenarios.<\/p>\n<h4 id=\"h-vendor-amp-third-party-risk-assessment\"><strong>Vendor &amp; Third-Party Risk Assessment<\/strong><\/h4>\n<p>Assess the cybersecurity practices of vendors and third-party partners that you work with. Their vulnerabilities can become your vulnerabilities. Review and update vendor contracts to include cybersecurity clauses.<\/p>\n<h4 id=\"h-cybersecurity-policies-amp-documentation\"><strong>Cybersecurity Policies &amp; Documentation<\/strong><\/h4>\n<p>Document all your cybersecurity policies and procedures. Having clear guidelines in place makes it easier for employees to follow your organisation\u2019s cybersecurity best practices. It is important that you regularly review and update your policies to reflect changing security needs.<\/p>\n<h4 id=\"h-physical-security-measures\"><strong>Physical Security Measures<\/strong><\/h4>\n<p>Don\u2019t forget the physical aspect of cybersecurity. SMEs should secure their physical infrastructure, including servers, routers, and switches, to prevent unauthorised access. Implement proper cable management and labelling to prevent unauthorised tampering.<\/p>\n<p>SMEs may not have the same resources as larger corporations, but they are just as vulnerable to cyberthreats. Implementing these cost-effective cybersecurity strategies can go a long way in protecting your valuable business. Remember, cybersecurity is an ongoing process, and staying vigilant is key to your survival as a SME.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has shifted to not only be critical for large corporations and governments. Small and medium-sized enterprises (SMEs) have also started to become prime targets for cyberattacks. In fact,\u00a0Accenture\u2019s Cybercrime Studyreveals that nearly 43% of cyberattacks are on small businesses. Cybercriminals often view SMEs as easier targets with data that is still extremely valuable. For [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19119,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44,24,23],"tags":[],"class_list":["post-19118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-cloud-backup","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Safeguarding SMEs: Top 8 Cybersecurity Strategies<\/title>\n<meta name=\"description\" content=\"Cybersecurity is also essential for SMEs. From antivirus software to employee awareness, there are many cybersecurity strategies for SMEs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safeguarding SMEs: Top 8 Cybersecurity Strategies\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is also essential for SMEs. From antivirus software to employee awareness, there are many cybersecurity strategies for SMEs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/\" \/>\n<meta property=\"og:site_name\" content=\"Metrofile Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T14:20:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T14:00:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/Cybersecurity-for-SMEs-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CloudAdmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MetrofileRecord\" \/>\n<meta name=\"twitter:site\" content=\"@MetrofileRecord\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CloudAdmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/\"},\"author\":{\"name\":\"CloudAdmin\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#\\\/schema\\\/person\\\/e32cdf0451a6a37ccfd2c882d3277d03\"},\"headline\":\"Safeguarding SMEs: Top 8 Cybersecurity Strategies\",\"datePublished\":\"2023-10-19T14:20:42+00:00\",\"dateModified\":\"2025-01-29T14:00:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/\"},\"wordCount\":536,\"publisher\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Cybersecurity-for-SMEs-1.png\",\"articleSection\":[\"All\",\"Cloud Backup\",\"Cyber Security\"],\"inLanguage\":\"en-ZA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/\",\"url\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/\",\"name\":\"Safeguarding SMEs: Top 8 Cybersecurity Strategies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Cybersecurity-for-SMEs-1.png\",\"datePublished\":\"2023-10-19T14:20:42+00:00\",\"dateModified\":\"2025-01-29T14:00:19+00:00\",\"description\":\"Cybersecurity is also essential for SMEs. From antivirus software to employee awareness, there are many cybersecurity strategies for SMEs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Cybersecurity-for-SMEs-1.png\",\"contentUrl\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Cybersecurity-for-SMEs-1.png\",\"width\":1200,\"height\":630,\"caption\":\"Cybersecurity for SMEs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/safeguarding-smes-top-8-cybersecurity-strategies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safeguarding SMEs: Top 8 Cybersecurity Strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#website\",\"url\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/\",\"name\":\"Metrofile Cloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#organization\"},\"alternateName\":\"Comprehensive cloud solutions for the modern enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#organization\",\"name\":\"Metrofile Cloud\",\"url\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/metrofile-cloud-icon.png\",\"contentUrl\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/metrofile-cloud-icon.png\",\"width\":630,\"height\":630,\"caption\":\"Metrofile Cloud\"},\"image\":{\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/MetrofileRecord\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/metrofile\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/#\\\/schema\\\/person\\\/e32cdf0451a6a37ccfd2c882d3277d03\",\"name\":\"CloudAdmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45f5d7b517406de8f2ef19393126e53359afa8df54251664be75903e273fd9c4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45f5d7b517406de8f2ef19393126e53359afa8df54251664be75903e273fd9c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45f5d7b517406de8f2ef19393126e53359afa8df54251664be75903e273fd9c4?s=96&d=mm&r=g\",\"caption\":\"CloudAdmin\"},\"sameAs\":[\"https:\\\/\\\/metrofile.com\\\/cloud\"],\"url\":\"https:\\\/\\\/metrofile.com\\\/cloud\\\/author\\\/cloudadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safeguarding SMEs: Top 8 Cybersecurity Strategies","description":"Cybersecurity is also essential for SMEs. From antivirus software to employee awareness, there are many cybersecurity strategies for SMEs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/","og_locale":"en_US","og_type":"article","og_title":"Safeguarding SMEs: Top 8 Cybersecurity Strategies","og_description":"Cybersecurity is also essential for SMEs. From antivirus software to employee awareness, there are many cybersecurity strategies for SMEs.","og_url":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/","og_site_name":"Metrofile Cloud","article_published_time":"2023-10-19T14:20:42+00:00","article_modified_time":"2025-01-29T14:00:19+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/Cybersecurity-for-SMEs-1.png","type":"image\/png"}],"author":"CloudAdmin","twitter_card":"summary_large_image","twitter_creator":"@MetrofileRecord","twitter_site":"@MetrofileRecord","twitter_misc":{"Written by":"CloudAdmin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#article","isPartOf":{"@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/"},"author":{"name":"CloudAdmin","@id":"https:\/\/metrofile.com\/cloud\/#\/schema\/person\/e32cdf0451a6a37ccfd2c882d3277d03"},"headline":"Safeguarding SMEs: Top 8 Cybersecurity Strategies","datePublished":"2023-10-19T14:20:42+00:00","dateModified":"2025-01-29T14:00:19+00:00","mainEntityOfPage":{"@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/"},"wordCount":536,"publisher":{"@id":"https:\/\/metrofile.com\/cloud\/#organization"},"image":{"@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/Cybersecurity-for-SMEs-1.png","articleSection":["All","Cloud Backup","Cyber Security"],"inLanguage":"en-ZA"},{"@type":"WebPage","@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/","url":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/","name":"Safeguarding SMEs: Top 8 Cybersecurity Strategies","isPartOf":{"@id":"https:\/\/metrofile.com\/cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#primaryimage"},"image":{"@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/Cybersecurity-for-SMEs-1.png","datePublished":"2023-10-19T14:20:42+00:00","dateModified":"2025-01-29T14:00:19+00:00","description":"Cybersecurity is also essential for SMEs. From antivirus software to employee awareness, there are many cybersecurity strategies for SMEs.","breadcrumb":{"@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#primaryimage","url":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/Cybersecurity-for-SMEs-1.png","contentUrl":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/Cybersecurity-for-SMEs-1.png","width":1200,"height":630,"caption":"Cybersecurity for SMEs"},{"@type":"BreadcrumbList","@id":"https:\/\/metrofile.com\/cloud\/safeguarding-smes-top-8-cybersecurity-strategies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/metrofile.com\/cloud\/"},{"@type":"ListItem","position":2,"name":"Safeguarding SMEs: Top 8 Cybersecurity Strategies"}]},{"@type":"WebSite","@id":"https:\/\/metrofile.com\/cloud\/#website","url":"https:\/\/metrofile.com\/cloud\/","name":"Metrofile Cloud","description":"","publisher":{"@id":"https:\/\/metrofile.com\/cloud\/#organization"},"alternateName":"Comprehensive cloud solutions for the modern enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/metrofile.com\/cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Organization","@id":"https:\/\/metrofile.com\/cloud\/#organization","name":"Metrofile Cloud","url":"https:\/\/metrofile.com\/cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/metrofile.com\/cloud\/#\/schema\/logo\/image\/","url":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/metrofile-cloud-icon.png","contentUrl":"https:\/\/metrofile.com\/cloud\/wp-content\/uploads\/2023\/10\/metrofile-cloud-icon.png","width":630,"height":630,"caption":"Metrofile Cloud"},"image":{"@id":"https:\/\/metrofile.com\/cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/MetrofileRecord","https:\/\/www.linkedin.com\/company\/metrofile\/"]},{"@type":"Person","@id":"https:\/\/metrofile.com\/cloud\/#\/schema\/person\/e32cdf0451a6a37ccfd2c882d3277d03","name":"CloudAdmin","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/45f5d7b517406de8f2ef19393126e53359afa8df54251664be75903e273fd9c4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45f5d7b517406de8f2ef19393126e53359afa8df54251664be75903e273fd9c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45f5d7b517406de8f2ef19393126e53359afa8df54251664be75903e273fd9c4?s=96&d=mm&r=g","caption":"CloudAdmin"},"sameAs":["https:\/\/metrofile.com\/cloud"],"url":"https:\/\/metrofile.com\/cloud\/author\/cloudadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/posts\/19118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/comments?post=19118"}],"version-history":[{"count":0,"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/posts\/19118\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/media\/19119"}],"wp:attachment":[{"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/media?parent=19118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/categories?post=19118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/metrofile.com\/cloud\/wp-json\/wp\/v2\/tags?post=19118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}