
{"id":2867,"date":"2014-06-16T00:00:00","date_gmt":"2014-06-16T00:00:00","guid":{"rendered":"http:\/\/otava.test\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/"},"modified":"2014-06-16T00:00:00","modified_gmt":"2014-06-16T00:00:00","slug":"friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/","title":{"rendered":"Friend or foe? Cybersecurity risks for shared data and a few precautions"},"content":{"rendered":"<p>Mom always said to choose your friends wisely. Maybe she was trying to protect you from a data breach.<\/p>\n<p>AT&amp;T learned that lesson the hard way. From a statement released by the company :<\/p>\n<blockquote><p>&#8220;We recently learned that three employees of one of our vendors accessed some AT&amp;T customer accounts without proper authorization. This is completely counter to the way we require our vendors to conduct business. We know our customers count on us and those who support our business to act with integrity and trust, and we take that very seriously. We have taken steps to help prevent this from happening again, notified affected customers, and reported this matter to law enforcement.&#8221;<\/p><\/blockquote>\n<p>This breach was less nefarious than the recent credit card data theft at <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/another-u-s-retailer-hit-by-data-breach-consumers-holding-them-responsible\/\">P.F. Changs<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/data-breaches-ending-careers-right-to-the-top-of-c-suite\/\">Target<\/a> and other retailers. While the employees of the vendor had access to sensitive data (such as Social Security numbers), their intent reportedly was to find codes used to unlock mobile phones in the secondary market.<\/p>\n<p>As <em>Washington Post<\/em> technology writer Brian Fung noted, the heavy restrictions mobile carriers place on unlocking your phone likely motivated the breach: \u201cIt\u2019s clear there are people out there who will compromise our most sensitive information just to make it easier to recycle used devices.\u201d<\/p>\n<p>Regardless of the intent or the result, there\u2019s one key sentence in the letter AT&amp;T sent to affected customers: <em>&#8220;Employees of one of our service providers <strong>violated our strict privacy and security guidelines<\/strong> by accessing your account without authorization.\u201d<\/em><\/p>\n<p>This isn\u2019t the only breach in the news recently that harkens back to Mom\u2019s advice mentioned above. In May, New York Presbyterian Hospital and Columbia University agreed to pay the Department of Health and Human Services $4.8 million to settle an alleged violation of the HIPAA Privacy and Security Rules. It\u2019s the largest payment in history.<\/p>\n<p>Tatiana Melnik, an attorney who focuses on data privacy and security issues, <a href=\"https:\/\/www.melniklegal.com\/programs\/weblog.cgi?showpage=1399561833_Data-Breach\" target=\"_blank\" rel=\"noopener noreferrer\">offered her thoughts<\/a> on the case involving the affiliated, but separate, entities that operate a shared data network:<\/p>\n<blockquote><p>This settlement is a good reminder that covered entities, business associates, and subcontractors must choose their partners carefully. As more organizations implement data sharing agreements, form strategic healthcare IT partnerships (e.g., those involving big data, analytics, etc.), and otherwise store their data with vendors, data breach issues are inevitable. Healthcare providers and vendors must carefully review their agreements to ensure that each party bears the appropriate amount of risk. Provisions related to indemnification, limitation of liability, damages caps, and insurance requirements should be reviewed with special attention.<\/p><\/blockquote>\n<p>A lack of trust between business associates isn\u2019t unusual when it comes to data breaches. A recent Ponemon Institute study revealed that 73 percent of organizations are either \u201csomewhat confident\u201d (33 percent) or \u201cnot confident\u201d (40 percent) that their business associates would be able to detect, perform an incident risk assessment and notify their organization in the event of a data breach incident as required under the business associate agreement.<\/p>\n<p>The good news: An iHT2 report presents data that indicates business associates are paying greater attention to data security. From 2009 to 2012, business associates were involved in 56 percent of large-scale data breaches of 500 records or more. In 2013, that number was reduced to just 10 percent of breaches.<\/p>\n<p>What can you do to make sure your IT friends are an alliance for good in the battle to protect sensitive data?<\/p>\n<ol>\n<li>When did the business associate last perform a comprehensive risk assessment? If it\u2019s been more than a year, move on.<\/li>\n<li>Ask for a copy of their audit report \u2013 and actually read it. A business associate that invests in a culture of <a href=\"https:\/\/onlinetech.com\/compliant-hosting\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">compliance <\/a>and <a href=\"https:\/\/onlinetech.com\/secure-hosting\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">security <\/a>is comfortable and confident in sharing details of their controls. In addition to sleeping better at night, you\u2019ll also save a lot of time and money by being able to provide this documentation during your own audits.<\/li>\n<li>Visit your business associates in person. If you have sensitive data, it\u2019s worth whatever airfare and time it takes to visit them face-to-face. You\u2019ll know a lot about the reality of their attitude towards their clients and security from experiencing it yourself.<\/li>\n<li>Consult with references. Don\u2019t just take your associate\u2019s word for it \u2013 ask their clients. If they keep their clients happy, this list will be readily available.<\/li>\n<li>Do they have insurance against data breaches to help with remediation costs and understand what\u2019s at stake in terms of timeliness and thoroughness of a response and investigation into any suspicious activity?<\/li>\n<li>How would they know if a data breach happened? Is there enough monitoring in place, and detailed logging, to know if something is amiss and have the information to assess damage and risk?<\/li>\n<\/ol>\n<p><strong>RESOURCES<br \/>\nMelnikLegal: <\/strong><a href=\"https:\/\/www.melniklegal.com\/programs\/weblog.cgi?showpage=1399561833_Data-Breach\">OCR reminds covered entities to choose friends carefully<\/a><strong><br \/>\nFierceWireless: <\/strong><a href=\"https:\/\/www.fiercewireless.com\/story\/att-confirms-data-breach-hackers-hunted-codes-unlock-phones\/2014-06-16\">AT&amp;T confirms data breach as hackers hunted for codes to unlock phones<\/a><br \/>\n<strong>Washington Post:<\/strong> <a href=\"https:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2014\/06\/13\/carriers-tight-grip-on-cellphone-unlocking-seems-to-have-resulted-in-a-cyberattack\/\">Carriers\u2019 tight grip on cellphone unlocking seems to have resulted in a cyberattack<\/a><br \/>\n<a href=\"https:\/\/www2.idexpertscorp.com\/ponemon-report-on-patient-privacy-data-security-incidents\/\">IHT2\u2019s 10 Steps to Maintaining Data Privacy in a Changing Mobile World<\/a><a href=\"https:\/\/www2.idexpertscorp.com\/ponemon-report-on-patient-privacy-data-security-incidents\/\"><br \/>\n<\/a><a href=\"https:\/\/www2.idexpertscorp.com\/ponemon-report-on-patient-privacy-data-security-incidents\/\">Ponemon Institute\u2019s Benchmark Study on Patient Privacy and Data Security<\/a><\/p>\n<hr \/>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/bridging-the-software-and-infosec-professional-chasm\/download-mobile\/\" rel=\"attachment wp-att-9199\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-9199\" title=\"Download Mobile Security White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\" alt=\"Download Mobile Security White Paper\" width=\"314\" height=\"141\" \/><\/a>RELATED<\/strong><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Mobile Security white paper<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/iht2-recommendations-for-hipaa-compliant-cloud-business-associates\/\">iHT2 recommendations for HIPAA-compliant cloud business associates<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-to-look-for-in-a-hipaa-cloud-provider\/\">What to look for in a HIPAA cloud provider<\/a><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/top-5-healthcare-cloud-security-guides\/\"><br \/>\nTop 5 healthcare cloud security guides<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mom always said to choose your friends wisely. Maybe she was trying to protect you from a data breach. AT&amp;T learned that lesson the hard way. From a statement released by the company : &#8220;We recently learned that three employees of one of our vendors accessed some AT&amp;T customer accounts without proper authorization. This is completely counter to the way we require our vendors to conduct business. We know our customers count on us and those who support our business to act with integrity and trust, and we take that very seriously. We have taken steps to help prevent this from happening again, notified affected customers, and reported this matter to law enforcement.&#8221; This breach was less nefarious than the recent credit card data theft at P.F. Changs, Target and other retailers. While the employees of the vendor had access to sensitive data (such as Social Security numbers), their intent reportedly was to find codes used to unlock mobile phones in the secondary market. As Washington Post technology writer Brian Fung noted, the heavy restrictions mobile carriers place on unlocking your phone likely motivated the breach: \u201cIt\u2019s clear there are people out there who will compromise our most sensitive information&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2867","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Friend or foe? Cybersecurity risks for shared data and a few precautions | OTAVA<\/title>\n<meta name=\"description\" content=\"While the employees of the vendor had access to sensitive data, their intent reportedly was to find codes used to unlock mobile phones in the secondary market.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Friend or foe? Cybersecurity risks for shared data and a few precautions\" \/>\n<meta property=\"og:description\" content=\"While the employees of the vendor had access to sensitive data, their intent reportedly was to find codes used to unlock mobile phones in the secondary market.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Friend or foe? Cybersecurity risks for shared data and a few precautions\",\"datePublished\":\"2014-06-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\"},\"wordCount\":889,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\",\"url\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\",\"name\":\"Friend or foe? Cybersecurity risks for shared data and a few precautions | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\",\"datePublished\":\"2014-06-16T00:00:00+00:00\",\"description\":\"While the employees of the vendor had access to sensitive data, their intent reportedly was to find codes used to unlock mobile phones in the secondary market.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Friend or foe? Cybersecurity risks for shared data and a few precautions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Friend or foe? Cybersecurity risks for shared data and a few precautions | OTAVA","description":"While the employees of the vendor had access to sensitive data, their intent reportedly was to find codes used to unlock mobile phones in the secondary market.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/","og_locale":"en_US","og_type":"article","og_title":"Friend or foe? Cybersecurity risks for shared data and a few precautions","og_description":"While the employees of the vendor had access to sensitive data, their intent reportedly was to find codes used to unlock mobile phones in the secondary market.","og_url":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/","og_site_name":"OTAVA","article_published_time":"2014-06-16T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Friend or foe? Cybersecurity risks for shared data and a few precautions","datePublished":"2014-06-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/"},"wordCount":889,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/","url":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/","name":"Friend or foe? Cybersecurity risks for shared data and a few precautions | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","datePublished":"2014-06-16T00:00:00+00:00","description":"While the employees of the vendor had access to sensitive data, their intent reportedly was to find codes used to unlock mobile phones in the secondary market.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-mobile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/friend-or-foe-cybersecurity-risks-for-shared-data-and-a-few-precautions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Friend or foe? Cybersecurity risks for shared data and a few precautions"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2867"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2867\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2867"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}