
{"id":2522,"date":"2013-07-11T00:00:00","date_gmt":"2013-07-11T00:00:00","guid":{"rendered":"http:\/\/otava.test\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/"},"modified":"2013-07-11T00:00:00","modified_gmt":"2013-07-11T00:00:00","slug":"achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/","title":{"rendered":"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption"},"content":{"rendered":"<p>Join Zoe Lindsey, Regional Director of Duo Security and April Sage, Director Healthcare Vertical of Online Tech for an informative webinar on how to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.<\/p>\n<p><strong>Title<\/strong>:\u00a0<em>Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption<\/em><br \/>\n<strong>When:\u00a0<\/strong>Tuesday, July 23 @2PM ET<br \/>\n<strong>Register:<\/strong>\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\">Visit for Registration Link<\/a><br \/>\n<strong>Description<\/strong>: Passwords are flawed; they are shared among users, easy to guess, and increasingly easy to breach.\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Two-factor authentication<\/a>\u00a0(using two different types of authentication), provides a higher level of security and assurance. Two-factor authentication is now offered by the Department of Health &amp; Human Services\/Centers for Medicare &amp; Medicaid Services (CMS) as guidance for remotely accessing electronic protected health information (ePHI) for entities that must adhere to the\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA\u00a0<\/a>security regulations.<\/p>\n<p>The vulnerability of static passwords has led to a wide range of regulatory provisions mandating the use of two-factor authentication to secure remote access to sensitive or private information, such as PHI, NIST, PCI and more.<\/p>\n<p>Historically, costs and scalability issues have limited the use of two factor authentication to very small implementations for users with the most privileged access. Workplace trends and new technology are changing that.<\/p>\n<p>Also, don&#8217;t miss our upcoming webinar on Tuesday, July 16 &#8211;\u00a0<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/why-is-it-so-hard-to-secure-a-company-security-expert-answers-tuesday\/\">Why Is It So Hard to Secure a Company?<\/a>\u00a0<\/em>with\u00a0Adam Goslin, COO of High Bit Security as he discusses the latest information on cyber-theft, and the very real security challenges all businesses face.<\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"HIPAA Compliant Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\" alt=\"HIPAA Compliant Hosting White Paper\" width=\"252\" height=\"114\" \/><\/a>For a complete guide to HIPAA\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">technical<\/a>,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">administrative<\/a>\u00a0and\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">physical security<\/a>, read our\u00a0<a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting white paper<\/a>. This white paper explores the impact of HITECH and HIPAA on data centers. It includes a description of a\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a>\u00a0IT architecture, contractual requirements, benefits and risks of\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\">data center<\/a>\u00a0outsourcing, and <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting<\/a> vendor selection criteria.<\/p>\n<hr \/>\n<p><strong>Zoe Lindsey,\u00a0Regional Director, Enterprise Sales at Duo Security<\/strong><\/p>\n<p>Zoe has worked in tech for years, and came to Duo with a background in cellular and medical technology. Ever since getting her first Commodore64 at age 10, her passion has drawn her back again and again to working with technology and information. Zoe works with her team to introduce Duo to as many new users as possible &#8212; she has assisted surgical centers, general hospitals, and specialty clinic to implement two-factor authentication solutions.<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/april-sage.jpg\" alt=\"april-sage\" width=\"60\" height=\"90\" \/>April Sage, Director of Healthcare Vertical Online Tech<\/strong><\/p>\n<p>April Sage has been involved in the IT industry for over two decades, initially founding a technology vocational program. In 2000, April founded a bioinformatics company that supported biotech, pharma, and bioinformatic companies in the development of research portals, drug discovery search engines, and other software systems. Since then, April has been involved in the development and implementation of online business plans and integrated marketing strategies across insurance, legal, entertainment, and retail industries until her current position as Director, Healthcare Vertical of Online Tech.<\/p>\n<hr \/>\n<p>Related Articles:<\/p>\n<p><strong><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-first-steps-to-identifying-and-securing-health-data\/\">HIPAA Encryption: First Steps to Identifying and Securing Health Data<\/a><\/em><\/strong><br \/>\nAccording to DetroitNews.com, personal information of 49,000 individuals \u2013 including that of names, SSNs, DOB, cancer screening test results and dates of completion \u2013 were accessed by hackers recently. The data resided in a password-protected area of the Michigan Cancer \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-first-steps-to-identifying-and-securing-health-data\/\">Continue reading \u2192<\/a><\/p>\n<p><strong><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/offsite-hipaa-data-centers-are-key-to-health-organization-disaster-recovery\/\">Offsite HIPAA Data Centers are Key to Health Organization Disaster Recovery<\/a><\/em><\/strong><br \/>\nOffsite Data Centers are Key to Healthcare\u2019s Disaster Recovery Catastrophes can happen at anytime and anywhere. Just ask the staff and patients at the Moore Medical Center in Moore, Oklahoma, when last month a deadly tornado struck the medical facility \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/offsite-hipaa-data-centers-are-key-to-health-organization-disaster-recovery\/\">Continue reading \u2192<\/a><\/p>\n<p><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/unencrypted-laptop-stolen-13k-patients-affected\/\">HIPAA Compliant Data Centers: Preventing Health Data Loss<\/a><\/strong><\/em><br \/>\nAccording to HealthDataManagement.com, a laptop that may have operating room information on nearly 13,000 pediatric patients was stolen from a badge-controlled access area of the Lucile Packard Children\u2019s Hospital at Stanford in early May. While the electronic systems were encrypted, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/unencrypted-laptop-stolen-13k-patients-affected\/\">Continue reading \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join Zoe Lindsey, Regional Director of Duo Security and April Sage, Director Healthcare Vertical of Online Tech for an informative webinar on how to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow. Title:\u00a0Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption When:\u00a0Tuesday, July 23 @2PM ET Register:\u00a0Visit for Registration Link Description: Passwords are flawed; they are shared among users, easy to guess, and increasingly easy to breach.\u00a0Two-factor authentication\u00a0(using two different types of authentication), provides a higher level of security and assurance. Two-factor authentication is now offered by the Department of Health &amp; Human Services\/Centers for Medicare &amp; Medicaid Services (CMS) as guidance for remotely accessing electronic protected health information (ePHI) for entities that must adhere to the\u00a0HIPAA\u00a0security regulations. The vulnerability of static passwords has led to a wide range of regulatory provisions mandating the use of two-factor authentication to secure remote access to sensitive or private information, such as PHI, NIST, PCI and more. Historically, costs and scalability issues have limited the use of two factor authentication to very small implementations for users with the most privileged access. Workplace trends and new technology are changing that. Also, don&#8217;t miss&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2522","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption | OTAVA<\/title>\n<meta name=\"description\" content=\"How to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption\" \/>\n<meta property=\"og:description\" content=\"How to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-11T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption\",\"datePublished\":\"2013-07-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\"},\"wordCount\":647,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\",\"url\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\",\"name\":\"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\",\"datePublished\":\"2013-07-11T00:00:00+00:00\",\"description\":\"How to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption | OTAVA","description":"How to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/","og_locale":"en_US","og_type":"article","og_title":"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption","og_description":"How to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.","og_url":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/","og_site_name":"OTAVA","article_published_time":"2013-07-11T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption","datePublished":"2013-07-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/"},"wordCount":647,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/","url":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/","name":"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","datePublished":"2013-07-11T00:00:00+00:00","description":"How to secure access to confidential health information in a cost effective and scalable way without interrupting your users\u2019 workflow.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2522"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2522\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2522"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}