{"id":76,"date":"2019-03-08T20:50:24","date_gmt":"2019-03-08T18:50:24","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=76"},"modified":"2020-05-31T01:39:00","modified_gmt":"2020-05-30T23:39:00","slug":"what-do-you-mean-by-website-security","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/","title":{"rendered":"What Do You Mean By Website Security"},"content":{"rendered":"<p style=\"text-align: justify;\">Website security refers to the methodology of securing sensitive data stored online from illegal access and modification. This is achieved by implementing stringent policy measures. Security threats are common these days and hackers are rigorously finding ways to compromise the sensitive data stored by an organization to support their malicious intentions.<\/p>\n<p style=\"text-align: justify;\"><em><strong>The sole purpose of Website security is to distinguish the following:<\/strong><\/em><br \/>\n\u27a2Important assets of a business<br \/>\n\u27a2Legitimate users who may access sensitive data<br \/>\n\u27a2Level of access (full\/limited) granted to each user<br \/>\n\u27a2The multiple vulnerabilities that may reside in the application<br \/>\n\u27a2Data exposure, criticality and risk analysis<br \/>\n\u27a2Relevant remediation steps<\/p>\n<p style=\"text-align: justify;\"><strong>How Do You Make A Website Secure?<\/strong><\/p>\n<p style=\"text-align: justify;\">The website security is achieved only when the below stated four rules of security are addressed appropriately. These four rules remain uniform for all businesses and organization across the globe.<\/p>\n<p style=\"text-align: justify;\"><em><strong>Confidentiality:-<\/strong><\/em><br \/>\nThe sensitive website data stored on the cloud or servers in the organization should not be exposed under any circumstances.<br \/>\n<em><strong>Integrity:-<\/strong><\/em><br \/>\nThe data received from the website should be consistent and is only to be changed by an approved user.<br \/>\n<em><strong>Availability:-<\/strong><\/em><br \/>\nThe website should remain accessible to all legitimate users within a particularized period of time depending on the request.<br \/>\n<em><strong>Nonrepudiation:-<\/strong><\/em><br \/>\nThe legitimate user cannot deny changing the data held on the Website and that the Website can prove its identity to the legitimate user.<\/p>\n<p style=\"text-align: justify;\">The\u00a0<a href=\"https:\/\/hackercombat.com\/website-malware-scanner\/?key5sk1=e17bcd271c605a3df3f393ac23346311fef25037\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">website security<\/a>\u00a0analysis runs parallel with website development. The programmers and developers who are responsible for website development should execute various strategies, post-risk analysis, mitigation, and monitoring.<\/p>\n<p style=\"text-align: justify;\"><strong>Why Is Website Security Important?<\/strong><\/p>\n<p style=\"text-align: justify;\">Small business owners are not aware of the website security risks and consequences and tend to assume that they\u2019re too small to be noticed by cybercriminals. As a matter of fact, cybercriminals and hackers target small or big businesses based on the vulnerabilities in the sites using automated tools.<\/p>\n<p style=\"text-align: justify;\">Most small business owners fail to think about their website security. Even though they think of usual security concerns, they often don\u2019t connect those concerns with their own business website safety. This prevents them from setting up even the most basic website security precautions that are essential to be followed.<\/p>\n<p style=\"text-align: justify;\">A website builds the brand image of any business, and often acts as the first point of contact for potential customers. When security measures are not met properly, customer relationships can be damaged. Website threats come in many forms and must be dealt with appropriately &#8211; as a single security breach could completely bring destroy a business, its brand and customer loyalty. In the USA, almost all the states now have stringent data breach laws and impose fines, penalties, and other costs for not taking care of the security properly.<\/p>\n<p style=\"text-align: justify;\">An infected website poses security risks to visitors while also presenting additional concerns for non-visitors. Bad actors attack small websites to leverage them as hubs to spread malware attacks on other larger websites. Sometimes these attacks include national targets and infrastructure. When such attacks are carried out, online criminals make use of the combined power of thousands of computers and sites to launch their attacks.<\/p>\n<p style=\"text-align: justify;\"><strong>How can I check a website is safe?<\/strong><\/p>\n<p style=\"text-align: justify;\">Therefore, it is always vital for a business of any size to stay protected by regularly checking on the posture of their website security.\u00a0 Most of the attacks today are carried out through phishing tactics. Therefore it is recommended to browse with caution &#8211; make it a point to double-check the URL especially those sites of banks, social networks, and any e-mail sites before logging in.\u00a0 Of late, Firefox, Chrome, and Internet Explorer browsers now present a color-change on the location bar to symbolize that the website has been authenticated as genuine one. Check for HTTPS instead of the less-secure HTTP which is also a good idea.<\/p>\n<p style=\"text-align: justify;\">There are online tools that will also allow site visitors and website owners alike to protect themselves. Comodo cWatch offers two such tools \u2013 its site score scanner and its cWatch Web security solution.<\/p>\n<p style=\"text-align: justify;\"><strong>Website Check \u2013 A scoring tool<\/strong><\/p>\n<p style=\"text-align: justify;\">The\u00a0<a href=\"https:\/\/cwatch.comodo.com\/sitescanner\/\" target=\"_blank\" rel=\"noopener noreferrer\">cWatch Web Site Score Scanner<\/a>\u00a0is an automatic website scanner that will provide a sites security rating within seconds. Simply type in the URL of any site and within seconds the tool will scan the website with Comodo\u2019s automated scanner and provide score rating based on its security posture such as whether malicious code was detected on the site or whether the website has protection layers enabled to prevent infection. This helpful tool can give great insight for a visitor and determine the level of precaution they should take when engaging with that site.<\/p>\n<p style=\"text-align: justify;\"><strong>Protected Websites<\/strong><\/p>\n<p style=\"text-align: justify;\">Today, all websites of every size are prone to numerous online attacks. Therefore,<br \/>\nA website that enables protection is not only the wisest way to maintain a site, but it is also one that visitors should feel more inclined to visit because they can rest assured that the website owner cares about their safety as well.<\/p>\n<p style=\"text-align: justify;\">The Comodo cWatch website security solution offers comprehensive protection with multiple layers of technology and a team of cyber experts that will handle all the aspects of your security. From complete complimentary scans and malware removal the professional team is ever-ready to support you on a 24\/7 basis. For more details on Comodo cWatch which can effectively help you in checking if your website is safe visit the official page!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Website security refers to the methodology of securing sensitive data stored online from illegal access and modification. This is achieved by implementing stringent policy measures. Security threats are common these days and hackers are rigorously finding ways to compromise the sensitive data stored by an organization to support their malicious intentions. The sole purpose of Website security is to distinguish the following: \u27a2Important assets of a business \u27a2Legitimate users who may access sensitive data \u27a2Level of access (full\/limited) granted to each user \u27a2The multiple vulnerabilities that may reside in the application \u27a2Data exposure, criticality and risk analysis \u27a2Relevant remediation steps\u2026<\/p>\n","protected":false},"author":3,"featured_media":77,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-76","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Do You Mean By Website Security - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Do You Mean By Website Security - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Website security refers to the methodology of securing sensitive data stored online from illegal access and modification. This is achieved by implementing stringent policy measures. Security threats are common these days and hackers are rigorously finding ways to compromise the sensitive data stored by an organization to support their malicious intentions. The sole purpose of Website security is to distinguish the following: \u27a2Important assets of a business \u27a2Legitimate users who may access sensitive data \u27a2Level of access (full\/limited) granted to each user \u27a2The multiple vulnerabilities that may reside in the application \u27a2Data exposure, criticality and risk analysis \u27a2Relevant remediation steps\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T18:50:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:39:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"What Do You Mean By Website Security\",\"datePublished\":\"2019-03-08T18:50:24+00:00\",\"dateModified\":\"2020-05-30T23:39:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/\"},\"wordCount\":900,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/\",\"name\":\"What Do You Mean By Website Security - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg\",\"datePublished\":\"2019-03-08T18:50:24+00:00\",\"dateModified\":\"2020-05-30T23:39:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg\",\"width\":750,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-do-you-mean-by-website-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Do You Mean By Website Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Do You Mean By Website Security - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/","og_locale":"en_US","og_type":"article","og_title":"What Do You Mean By Website Security - MozDomains Blog","og_description":"Website security refers to the methodology of securing sensitive data stored online from illegal access and modification. This is achieved by implementing stringent policy measures. Security threats are common these days and hackers are rigorously finding ways to compromise the sensitive data stored by an organization to support their malicious intentions. The sole purpose of Website security is to distinguish the following: \u27a2Important assets of a business \u27a2Legitimate users who may access sensitive data \u27a2Level of access (full\/limited) granted to each user \u27a2The multiple vulnerabilities that may reside in the application \u27a2Data exposure, criticality and risk analysis \u27a2Relevant remediation steps\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-08T18:50:24+00:00","article_modified_time":"2020-05-30T23:39:00+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"What Do You Mean By Website Security","datePublished":"2019-03-08T18:50:24+00:00","dateModified":"2020-05-30T23:39:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/"},"wordCount":900,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/","name":"What Do You Mean By Website Security - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg","datePublished":"2019-03-08T18:50:24+00:00","dateModified":"2020-05-30T23:39:00+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/bulletproof-tips-for-protecting-wordpress-site-from-hackers.jpg","width":750,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-do-you-mean-by-website-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What Do You Mean By Website Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/76","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/76\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/77"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=76"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=76"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}