
{"id":2026,"date":"2012-09-04T00:00:00","date_gmt":"2012-09-04T00:00:00","guid":{"rendered":"http:\/\/otava.test\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/"},"modified":"2012-09-04T00:00:00","modified_gmt":"2012-09-04T00:00:00","slug":"securing-smartphones-simple-steps-to-avoid-a-data-breach","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/","title":{"rendered":"Securing Smartphones: Simple Steps to Avoid a Data Breach"},"content":{"rendered":"<p>BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach.<\/p>\n<p>While different industry compliance standards, such as <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA <\/a>or <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">PCI<\/a>, may require more stringent data security technology, the average mobile device user can take their first steps toward a more protected environment by first enabling remote wipe on their devices.<\/p>\n<p>CIO-Today.com reports that <strong>only 55 percent<\/strong> of mobile users have remote wipe enabled on their smartphones. Remote wipe is offered by default or as an application on many different types of mobile devices that you can install and configure to meet your needs. In the case of a lost or stolen device, remote wipe allows you to log into an interface, click on a button and have the option to permanently delete all data and settings currently on your device.<\/p>\n<p>This is key to remediation in the event of a data breach &#8211; limiting the scope of risk should be part of an incident response plan\u2019s processes. By having the capability to remotely delete data off of a lost or stolen device, you can significantly reduce the chances of data misuse.<\/p>\n<figure id=\"attachment_7835\" aria-describedby=\"caption-attachment-7835\" style=\"width: 397px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7835 \" title=\"Find My iPhone\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png\" alt=\"Find My iPhone\" width=\"397\" height=\"284\" \/><figcaption id=\"caption-attachment-7835\" class=\"wp-caption-text\">Find My iPhone<\/figcaption><\/figure>\n<p>Additionally, if you are using an iPhone, you can enable Find my iPhone; an app that will attempt to locate your lost or stolen iPhone and pinpoint the location on a map. You can choose to send a message or activate a sound to help locate or draw attention to your device.<\/p>\n<figure id=\"attachment_7833\" aria-describedby=\"caption-attachment-7833\" style=\"width: 319px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7833 \" title=\"Mobile Defense App\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Mobile-Defense-App.png\" alt=\"Mobile Defense App\" width=\"319\" height=\"214\" \/><figcaption id=\"caption-attachment-7833\" class=\"wp-caption-text\">Mobile Defense App<\/figcaption><\/figure>\n<p>For Android phones, third-party apps can be used for remote wipe, such as the free <a href=\"https:\/\/www.mobiledefense.com\/\">Mobile Defense<\/a> app. This app can also locate your device with the exact address displayed on an embedded interactive map. Mobile Defense will also email you if someone tries to swap out your SIM card as part of their security measures.<\/p>\n<p>While remote wipe and device locators can be ideal after a device is lost or stolen, another way to prevent a potential data breach is to secure the data in a protected network\/environment, not only on a device. In a blog post I wrote in May, <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/keep-ephi-on-secure-networks-not-mobile-devices-recommends-ocr\/\">Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR<\/a>, two-thirds of large healthcare breach cases involved loss or theft, and one-third involved electronics. Sixty-three thousand individuals were affected by the theft of stolen mobile devices.<\/p>\n<p>Instead of losing the sole copy of your data when you lose your phone or laptop, consider keeping critical data and applications safe in a protected data center with all of the proper physical, network and administrative security in place. That way, you can recover and access important data and it isn\u2019t dependent on access to one device. Read more about <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\">secure data centers<\/a>.<\/p>\n<figure style=\"width: 200px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" title=\"Fall into IT\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/fall-into-IT-shout-box.gif\" alt=\"Fall into IT\" width=\"200\" height=\"300\" \/><figcaption class=\"wp-caption-text\">Fall into IT<\/figcaption><\/figure>\n<p><strong>Interested in BYOD?<\/strong> Attend our <a href=\"https:\/\/www.onlinetech.com\/resources\/events\/seminars\/fall-into-it\">Fall into IT<\/a> tech seminar remotely or in person and listen in on a presentation by a healthcare CIO who accomplished a secure and compliant BYOD environment. Kirk Larson, VP and CIO of the Children\u2019s Hospital Central California will explain how he used virtualization in <em><strong>BYOD: From Concept to Reality<\/strong><\/em>. <a href=\"https:\/\/www.onlinetech.com\/resources\/events\/seminars\/fall-into-it\">Sign up online<\/a> today.<\/p>\n<p><em><strong>Recommended Reading:<\/strong><\/em><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/bring-your-own-device-byod-with-virtualization\/\">Bring Your Own Device (BYOD) with Virtualization<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/simple-security-improvements-with-your-mobile-device\/\">Simple Security Improvements with Your Mobile Device<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/byod-mobile-healthcare-policies\/\">BYOD: Mobile Healthcare Policies<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.cio-today.com\/news\/BYOD-Opens-Gaping-Security-Hole\/story.xhtml?story_id=010000ZELRXU&amp;full_skip=1\">BYOD Trend Opens Companies to Security Breaches<\/a><br \/>\n<a href=\"https:\/\/www.mobiledefense.com\/\">Mobile Defense App<\/a><br \/>\n<a href=\"https:\/\/itunes.apple.com\/us\/app\/find-my-iphone\/id376101648?mt=8\"> Find My iPhone App<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach. While different industry compliance standards, such as HIPAA or PCI, may require more stringent data security technology, the average mobile device user can take their first steps toward a more protected environment by first enabling remote wipe on their devices. CIO-Today.com reports that only 55 percent of mobile users have remote wipe enabled on their smartphones. Remote wipe is offered by default or as an application on many different types of mobile devices that you can install and configure to meet your needs. In the case of a lost or stolen device, remote wipe allows you to log into an interface, click on a button and have the option to permanently delete all data and settings currently on your device. This is key to remediation in the event of a data breach &#8211; limiting the scope of risk should be part of an incident response plan\u2019s processes. By&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2026","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Smartphones: Simple Steps to Avoid a Data Breach | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Smartphones: Simple Steps to Avoid a Data Breach\" \/>\n<meta property=\"og:description\" content=\"BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach. While different industry compliance standards, such as HIPAA or PCI, may require more stringent data security technology, the average mobile device user can take their first steps toward a more protected environment by first enabling remote wipe on their devices. CIO-Today.com reports that only 55 percent of mobile users have remote wipe enabled on their smartphones. Remote wipe is offered by default or as an application on many different types of mobile devices that you can install and configure to meet your needs. In the case of a lost or stolen device, remote wipe allows you to log into an interface, click on a button and have the option to permanently delete all data and settings currently on your device. This is key to remediation in the event of a data breach &#8211; limiting the scope of risk should be part of an incident response plan\u2019s processes. By...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-04T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Securing Smartphones: Simple Steps to Avoid a Data Breach\",\"datePublished\":\"2012-09-04T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\"},\"wordCount\":614,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png\",\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\",\"url\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\",\"name\":\"Securing Smartphones: Simple Steps to Avoid a Data Breach | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png\",\"datePublished\":\"2012-09-04T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Smartphones: Simple Steps to Avoid a Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Smartphones: Simple Steps to Avoid a Data Breach | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"Securing Smartphones: Simple Steps to Avoid a Data Breach","og_description":"BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach. While different industry compliance standards, such as HIPAA or PCI, may require more stringent data security technology, the average mobile device user can take their first steps toward a more protected environment by first enabling remote wipe on their devices. CIO-Today.com reports that only 55 percent of mobile users have remote wipe enabled on their smartphones. Remote wipe is offered by default or as an application on many different types of mobile devices that you can install and configure to meet your needs. In the case of a lost or stolen device, remote wipe allows you to log into an interface, click on a button and have the option to permanently delete all data and settings currently on your device. This is key to remediation in the event of a data breach &#8211; limiting the scope of risk should be part of an incident response plan\u2019s processes. By...","og_url":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/","og_site_name":"OTAVA","article_published_time":"2012-09-04T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Securing Smartphones: Simple Steps to Avoid a Data Breach","datePublished":"2012-09-04T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png","articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/","url":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/","name":"Securing Smartphones: Simple Steps to Avoid a Data Breach | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png","datePublished":"2012-09-04T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Find-My-iPhone.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/securing-smartphones-simple-steps-to-avoid-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Securing Smartphones: Simple Steps to Avoid a Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2026"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2026\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2026"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}