{"id":299,"date":"2023-10-05T10:56:07","date_gmt":"2023-10-05T15:56:07","guid":{"rendered":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg"},"modified":"2023-10-05T10:56:07","modified_gmt":"2023-10-05T15:56:07","slug":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information","status":"inherit","type":"attachment","link":"https:\/\/iowamediagroup.com\/public_html\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information\/","title":{"rendered":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information"},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"tdm_status":"","tdm_grid_status":""},"class_list":["post-299","attachment","type-attachment","status-inherit"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-300x200.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-300x200.jpg 300w, https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-768x512.jpg 768w, https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-150x100.jpg 150w, https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-696x464.jpg 696w, https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>cyber security concept, Login, User, identification information security and encryption, secure Internet access, cybersecurity, secure access to user&#8217;s personal information,<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":800,"height":533,"file":"2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg","filesize":77929,"sizes":{"medium":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-300x200.jpg","width":300,"height":200,"filesize":35026,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-300x200.jpg"},"thumbnail":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-150x150.jpg","width":150,"height":150,"filesize":28639,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-150x150.jpg"},"medium_large":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-768x512.jpg","width":768,"height":512,"filesize":76399,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-768x512.jpg"},"td_150x0":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-150x100.jpg","width":150,"height":100,"filesize":26657,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-150x100.jpg"},"td_218x150":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-218x150.jpg","width":218,"height":150,"filesize":30370,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-218x150.jpg"},"td_300x0":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-300x200.jpg","width":300,"height":200,"filesize":35026,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-300x200.jpg"},"td_324x400":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-324x400.jpg","width":324,"height":400,"filesize":47104,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-324x400.jpg"},"td_485x360":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-485x360.jpg","width":485,"height":360,"filesize":52463,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-485x360.jpg"},"td_696x0":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-696x464.jpg","width":696,"height":464,"filesize":68925,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-696x464.jpg"},"td_265x198":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-265x198.jpg","width":265,"height":198,"filesize":34208,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-265x198.jpg"},"td_741x486":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-741x486.jpg","width":741,"height":486,"filesize":73379,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information-741x486.jpg"},"full":{"file":"cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg","width":800,"height":533,"mime_type":"image\/jpeg","source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg"}},"image_meta":{"aperture":"2","credit":"","camera":"Canon EOS 80D","caption":"cyber security concept, Login, User, identification information security and encryption, secure Internet access, cybersecurity, secure access to user's personal information,","created_timestamp":"1640100522","copyright":"","focal_length":"50","iso":"200","shutter_speed":"0.01","title":"","orientation":"1","keywords":["access","anonymous","anti","anti virus","attack","code","computer","confidential","connection","crime","cyber","cyberspace","database","datum","digital","finger","firewall","hacker","hacking","information","key","laptop","lock","login","monitor","network","networking","online","password","person","pressing","privacy","private","programming","protect","protection","safe","safety","screen","secure","secured","security","server","shield","software","system","tech","technology","virus","web"]}},"post":null,"source_url":"https:\/\/iowamediagroup.com\/public_html\/wp-content\/uploads\/2023\/10\/cyber-security-concept-login-user-identification-information-security-encryption-secure-internet-access-cybersecurity-secure-access-users-personal-information.jpg","_links":{"self":[{"href":"https:\/\/iowamediagroup.com\/public_html\/wp-json\/wp\/v2\/media\/299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iowamediagroup.com\/public_html\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/iowamediagroup.com\/public_html\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/iowamediagroup.com\/public_html\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/iowamediagroup.com\/public_html\/wp-json\/wp\/v2\/comments?post=299"}]}}