{"id":941,"date":"2024-07-19T13:10:30","date_gmt":"2024-07-19T13:10:30","guid":{"rendered":"https:\/\/atb.tech\/blog\/?p=941"},"modified":"2024-07-19T13:12:03","modified_gmt":"2024-07-19T13:12:03","slug":"free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/","title":{"rendered":"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"430\" src=\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg\" alt=\"\" class=\"wp-image-944\" srcset=\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg 1024w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-300x126.jpg 300w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-768x323.jpg 768w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1536x645.jpg 1536w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-2048x860.jpg 2048w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-260x109.jpg 260w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-50x21.jpg 50w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-150x63.jpg 150w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>&#8220;<strong>As a Business owner, you must know the Essential Strategies to Protect Your Company\u2019s Data and Infrastructure<\/strong>&#8220;<\/p>\n\n\n\n<p>The internet keeps our businesses connected and growing, but it&#8217;s also opened the door to sneaky cybercriminals. These digital thieves are after one thing: your stuff. That means customer information, financial records, and even your secret business ideas. If they get in, it can be a total disaster for your company<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Free Download \u2013 Shielding Your Business: A Comprehensive Guide to Cybersecurity<\/strong><\/h2>\n\n\n\n<div style=\"text-align: left\" class=\"sender-form-field\" data-sender-form-id=\"d864e7078e0fca43wHB\"><\/div>\n\n\n\n<p>In this eBook we discuss topics such as: <\/p>\n\n\n\n<ul>\n<li>Understanding Cyber Threats<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Building a Robust Cybersecurity Framework<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Implementing Key Security Measures<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Monitoring, Responding, and Adapting<\/li>\n<\/ul>\n\n\n\n<p>Some of the key reasons why cybersecurity is important for business are:<\/p>\n\n\n\n<ul>\n<li>Data Protection: Businesses store massive amounts of data, including customer information, financial records, and intellectual property. A cyberattack can lead to data breaches, which can be disastrous.&nbsp; Data breaches can result in fines, legal trouble, and a damaged reputation.\u2019<\/li>\n\n\n\n<li>Financial Losses: Cyberattacks can disrupt operations, leading to lost revenue and productivity. In some cases, they can also result in financial losses due to theft or ransom payments.<\/li>\n\n\n\n<li>Compliance: Many regulations require businesses to implement cybersecurity measures to protect sensitive data. Failing to comply can lead to fines and other penalties.<\/li>\n\n\n\n<li>Customer Trust: Customers expect businesses to protect their data. A cyberattack can erode customer trust and loyalty.<\/li>\n\n\n\n<li>Evolving Threats: The cybercrime landscape constantly evolves, with new threats emerging. Businesses need to be continually vigilant and update their cybersecurity defenses.<\/li>\n<\/ul>\n\n\n\n<p>By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success. This includes implementing strong security measures, educating employees about cybersecurity best practices, and having a plan in place for responding to cyberattacks. Get full Insights in eBook by\u00a0<a href=\"https:\/\/atb.tech\/\">ATB Tech<\/a>, a full fledged technology company.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"430\" src=\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1024x430.jpg\" alt=\"\" class=\"wp-image-943\" srcset=\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1024x430.jpg 1024w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-300x126.jpg 300w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-768x323.jpg 768w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1536x645.jpg 1536w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-2048x860.jpg 2048w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-260x109.jpg 260w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-50x21.jpg 50w, https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-150x63.jpg 150w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ATB Tech and Our Commitment to Security<\/strong><\/h2>\n\n\n\n<p>Security is a basic human concept that has become more difficult to define and enforce in the modern age. In primitive societies, security was limited to ensuring the safety of the group\u2019s members and protecting physical resources.<\/p>\n\n\n\n<p>In a complex society like ours, the significance of sharing and securing important resources has increased. IT security is the process of implementing measures and systems designed to securely protect and safeguard information (data \u2013 business, personal including those not yet conceived) utilizing various forms of technology developed to create, store, use, and exchange such information against any unauthorized access, misuse, malfunction, destruction, or improper disclosure. <\/p>\n\n\n\n<p>At <a href=\"http:\/\/atb.tech\">ATB Tech<\/a>, We implement security to protect information assets through the use of technology, processes, and training thereby preserving value, confidentiality, integrity, availability, intended use, and its ability to perform their permitted functions. <\/p>\n\n\n\n<div style=\"text-align: left\" class=\"sender-form-field\" data-sender-form-id=\"d864e7078e0fca43wHB\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;As a Business owner, you must know the Essential Strategies to Protect Your Company\u2019s Data and Infrastructure&#8220; The internet keeps our businesses connected and growing, but<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[32],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity - ATB Tech<\/title>\n<meta name=\"description\" content=\"By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity - ATB Tech\" \/>\n<meta property=\"og:description\" content=\"By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ATB Tech\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-19T13:10:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T13:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg\" \/>\n<meta name=\"author\" content=\"Ezechinmere Goodluck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ezechinmere Goodluck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\"},\"author\":{\"name\":\"Ezechinmere Goodluck\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/person\/00d8405595674be77223c5f72ed466c9\"},\"headline\":\"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity\",\"datePublished\":\"2024-07-19T13:10:30+00:00\",\"dateModified\":\"2024-07-19T13:12:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\"},\"wordCount\":451,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/atb.tech\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"MyXalary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\",\"url\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\",\"name\":\"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity - ATB Tech\",\"isPartOf\":{\"@id\":\"https:\/\/atb.tech\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg\",\"datePublished\":\"2024-07-19T13:10:30+00:00\",\"dateModified\":\"2024-07-19T13:12:03+00:00\",\"description\":\"By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success.\",\"breadcrumb\":{\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-scaled.jpg\",\"contentUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-scaled.jpg\",\"width\":2560,\"height\":1075},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/atb.tech\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/atb.tech\/blog\/#website\",\"url\":\"https:\/\/atb.tech\/blog\/\",\"name\":\"ATB Tech\",\"description\":\"Welcome To ATB Tech&#039;s Blog\",\"publisher\":{\"@id\":\"https:\/\/atb.tech\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/atb.tech\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/atb.tech\/blog\/#organization\",\"name\":\"ATB Tech\",\"url\":\"https:\/\/atb.tech\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png\",\"contentUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png\",\"width\":1459,\"height\":259,\"caption\":\"ATB Tech\"},\"image\":{\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/person\/00d8405595674be77223c5f72ed466c9\",\"name\":\"Ezechinmere Goodluck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d74f8a6f52b64b2ca2a218c25d7a7621?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d74f8a6f52b64b2ca2a218c25d7a7621?s=96&d=mm&r=g\",\"caption\":\"Ezechinmere Goodluck\"},\"url\":\"https:\/\/atb.tech\/blog\/author\/eze\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity - ATB Tech","description":"By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity - ATB Tech","og_description":"By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success.","og_url":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/","og_site_name":"ATB Tech","article_published_time":"2024-07-19T13:10:30+00:00","article_modified_time":"2024-07-19T13:12:03+00:00","og_image":[{"url":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg"}],"author":"Ezechinmere Goodluck","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ezechinmere Goodluck","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/"},"author":{"name":"Ezechinmere Goodluck","@id":"https:\/\/atb.tech\/blog\/#\/schema\/person\/00d8405595674be77223c5f72ed466c9"},"headline":"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity","datePublished":"2024-07-19T13:10:30+00:00","dateModified":"2024-07-19T13:12:03+00:00","mainEntityOfPage":{"@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/"},"wordCount":451,"commentCount":0,"publisher":{"@id":"https:\/\/atb.tech\/blog\/#organization"},"image":{"@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg","keywords":["cybersecurity"],"articleSection":["MyXalary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/","url":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/","name":"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity - ATB Tech","isPartOf":{"@id":"https:\/\/atb.tech\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-1024x430.jpg","datePublished":"2024-07-19T13:10:30+00:00","dateModified":"2024-07-19T13:12:03+00:00","description":"By investing in cybersecurity, businesses can protect themselves from these risks and ensure their continued success.","breadcrumb":{"@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#primaryimage","url":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-scaled.jpg","contentUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2024\/07\/a-comprehensive-guide-to-cybersecurity-email-b-1-scaled.jpg","width":2560,"height":1075},{"@type":"BreadcrumbList","@id":"https:\/\/atb.tech\/blog\/free-ebook-shielding-your-business-a-comprehensive-guide-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/atb.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"[Free eBook] Shielding Your Business: A Comprehensive Guide to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/atb.tech\/blog\/#website","url":"https:\/\/atb.tech\/blog\/","name":"ATB Tech","description":"Welcome To ATB Tech&#039;s Blog","publisher":{"@id":"https:\/\/atb.tech\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/atb.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/atb.tech\/blog\/#organization","name":"ATB Tech","url":"https:\/\/atb.tech\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png","contentUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png","width":1459,"height":259,"caption":"ATB Tech"},"image":{"@id":"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/atb.tech\/blog\/#\/schema\/person\/00d8405595674be77223c5f72ed466c9","name":"Ezechinmere Goodluck","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atb.tech\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d74f8a6f52b64b2ca2a218c25d7a7621?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d74f8a6f52b64b2ca2a218c25d7a7621?s=96&d=mm&r=g","caption":"Ezechinmere Goodluck"},"url":"https:\/\/atb.tech\/blog\/author\/eze\/"}]}},"_links":{"self":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts\/941"}],"collection":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/comments?post=941"}],"version-history":[{"count":2,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts\/941\/revisions"}],"predecessor-version":[{"id":945,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts\/941\/revisions\/945"}],"wp:attachment":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/media?parent=941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/categories?post=941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/tags?post=941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}