{"id":1385,"date":"2016-12-28T21:34:43","date_gmt":"2016-12-29T02:34:43","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=1385"},"modified":"2020-03-17T07:50:07","modified_gmt":"2020-03-17T11:50:07","slug":"recover-revenue-ddos-attack-tailspin","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/","title":{"rendered":"How to Recover Revenue from a DDoS Attack Tailspin"},"content":{"rendered":"<p><em>Distributed denial of service<\/em>. It sounds like a boring term, joining a laundry list of IT concepts that may or may not deserve your full attention. Well, increasingly, the threat of a DDoS absolutely does deserve your attention. Just ask any of the thousands of stores that lost sales on October 21, 2016, because they were taken offline by a botnet.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>A DDoS is a Traffic Jam of Driverless Cars<\/strong><\/li>\n<li><strong>Why Worry about DDoS?<\/strong><\/li>\n<li><strong>DDoS Blocks You from Your Customers<\/strong><\/li>\n<li><strong>9 Ways You Can Get Back Sales After a DDoS<\/strong><\/li>\n<li><strong>Free DDoS Protection with Your Hosting?<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>A DDoS is a Traffic Jam of Driverless Cars<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>A DDoS attack can be formulated in various ways, but the basic idea is to barrage a website with a huge number of bogus requests \u2013 in essence, <strong>creating a nearly motionless Internet traffic jam with cars that don\u2019t have any people in them<\/strong>.<\/p>\n<p>In other words, the fake requests inundate the site to such an extent that the site\u2019s infrastructure can\u2019t operate properly. Your real users aren\u2019t able to get through \u2013 they can\u2019t load your site.<\/p>\n<p>&nbsp;<\/p>\n<p>As opposed to a traffic jam, Laura Hautala of <a href=\"https:\/\/www.cnet.com\/how-to\/what-is-a-ddos-attack\/\">CNET<\/a> uses the image of a dam \u2013 the dam representing the effort to filter traffic and let only the legitimate users through. \u201c[I]f someone upstream can send an unexpected torrent down, the dam will overflow and maybe even crack, letting all the water through,\u201d she said. \u201cThat floods the area below &#8212; and in our analogy, it drowns the website you&#8217;re trying to reach.\u201d<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Why Worry about DDoS?<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>During 2016, the size and scope of cybercrime-as-a-service became more evident, and it\u2019s truly disturbing. DDoS is now recognized by security experts as one of the greatest malicious challenges for online business to avoid.<\/p>\n<p>&nbsp;<\/p>\n<p><em>What\u2019s the evidence?<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>First of all, the <a href=\"https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2016\">2016 Internet Organized Crime Threat Assessment<\/a>, issued by Europol on September 28, identified DDoS as the most prominent and devastating form of online crime.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securelist.com\/analysis\/quarterly-malware-reports\/76464\/kaspersky-ddos-intelligence-report-for-q3-2016\/\">Kasperky Labs<\/a> indicated that part of the reason Europol placed DDoS at the top is because of research by security expert Brian Krebs. Krebs posted a <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/israeli-online-attack-service-vdos-earned-600000-in-two-years\/\">report<\/a> on a popular worldwide DDoS service, vDOS. The two young Israeli owners of vDOS were subsequently <a href=\"http:\/\/www.darknet.org.uk\/2016\/09\/two-israeli-men-arrested-running-vdos-s-com-ddos-service\/\">arrested<\/a>, but the size of the operation was shocking.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cBased on a subscription scheme, starting from $19.99 per month, tens of thousands of customers paid more than $600,000 over the past two years to vDOS,\u201d noted Kaspersky Labs. \u201c<strong>In just four months between April and July, vDOS launched more than 277 million seconds of attack time, or approximately 8.81 years\u2019 worth of attack traffic.<\/strong>\u201d<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>DDoS Blocks You from Your Customers<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>You may think that the key cybercrime concern is someone directly hacking your account, or phishing you to get access to your details, and stealing from you. With a DDoS, though, the idea is to block access so that your business can\u2019t operate.<\/p>\n<p>&nbsp;<\/p>\n<p>Ideally, when someone can\u2019t reach your site, they will come back. However, many people will leave for good, assuming you don\u2019t know how to run your website (after all, it is nonfunctional during an attack).<\/p>\n<p>&nbsp;<\/p>\n<p>To make matters worse, you often won\u2019t get any kind of warning that the DDoS is going to occur, and it might take hours before you know something is amiss.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>9 Ways You Can Get Back Sales After a DDoS<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>So, what can you do to recover revenue that gets lost to DDoS? Here are nine ideas from Pamela Hazelton of <a href=\"http:\/\/www.practicalecommerce.com\/articles\/129792-9-Ways-to-Recover-Sales-after-a-DDoS-Attack\">Practical Ecommerce<\/a>. The first two are immediate responses, while the last seven are ongoing protections.<\/p>\n<p><strong>#1. Upfront email<\/strong> \u2013 Write a notification for your newsletter subscribers, advised Hazelton. \u201cBe clear about what happened and what steps were taken as a result,\u201d she said. \u201c[R]eassure customers and subscribers that their information was not compromised.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>If you want help explaining the event, you can always link to a site that describes the nature of DDoS.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#2. Site announcement<\/strong> \u2013 Also post a message straight on your site. It doesn\u2019t need to be more than a sentence or two, along with a link to further details. Make sure to focus on shopper comfort (keeping in mind how common DDoS attacks have become and that you are a victim).<\/p>\n<p>&nbsp;<\/p>\n<p>Give people a discount code if you want \u2013 either through the site or through email. However, be careful that it doesn\u2019t seem you are trying to exploit a security breach to expand your profits.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#3. Shopper tracking<\/strong> \u2013 With script that gauges how people use your site, you are able to better understand your demographics and refine your key personas. This same tracking becomes especially pivotal when the site goes down while a shopper is attempting to browse or purchase. You can contact them once things are resolved.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cThis feature, by the way, could also allow shoppers to pick up the session using a different connection, such as on a smartphone using cellular bandwidth,\u201d said Hazelton. \u201cIt\u2019s a feature designed to boost cross-device conversions, but who says you can\u2019t also use it as part of your backup plan?\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#4. Abandoned cart reports<\/strong> \u2013 Your ecommerce platform should allow you to capture the name, contact info, and products placed in a shopping cart. That way if someone leaves, they\u2019ll get an automated email reminding them to complete the purchase.<\/p>\n<p>&nbsp;<\/p>\n<p>If the site goes down, the abandoned-cart data can be used to send a (carefully worded and not horrifying, of course) explanation about the attack.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#5. Contact details on every site page<\/strong> \u2013 When a site goes down, one of the typical things a shopper will do is click the back button on their browser to access the previous page \u2013 which may be cached and still accessible. If your phone number and email are on each page, they can still get in touch to make their purchase.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#6. Sales chat<\/strong> \u2013 Sales chat is helpful to answer customer questions and can also serve as a DDoS recovery tool.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cThat\u2019s because not all websites are hosted on the same server, nor do they all use the same providers,\u201d said Hazelton. \u201cThis means a third-party solution that allows you to communicate with shoppers may run just fine while your store is actually down.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#7. Multiple payment options<\/strong> \u2013 Sales chat, if it\u2019s third-party, effectively diversifies your site\u2019s infrastructure, protecting from a targeted attack like a DDoS. What is the payment gateway goes offline? Again, it\u2019s wise to diversify. Offer multiple payment options.<\/p>\n<p>&nbsp;<\/p>\n<p>If you can\u2019t back up with another way to enter credit card data and instead must defer to Amazon Checkout, PayPal, and similar, set up a notice to populate when you need to alternatively route shoppers. Give them a phone number as well.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#8. Multiple shipping options<\/strong> \u2013 The same principle applies if a shipping gateway isn\u2019t functioning properly. In those cases, provide a shipping alternative that is set up manually.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>#9. Backup email servers<\/strong> \u2013 We\u2019ve been conditioned over time to expect a receipt of our order by email that arrives nearly instantaneously after making an online purchase. If that server goes down with a DDoS, you could end up with chargebacks and cancellations.<\/p>\n<p>&nbsp;<\/p>\n<p>\u201cIf possible, customize the error message that may appear on the website if the email cannot be sent,\u201d said Hazelton. \u201cAnd, ask your host if there is an alternate server that can be used in case the primary mail server fails.\u201d<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Free DDoS Protection with Your Hosting?<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>As you can see above, beyond recovery, there are many actionable strategies you can use to reduce the damage of future DDoS incidents. However, you also don\u2019t want a DDoS to occur in the first place.<\/p>\n<p>&nbsp;<\/p>\n<p>At <strong><a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a><\/strong>, we offer FREE DDoS protection with every one of our virtual private servers.\u00a0<strong><a href=\"https:\/\/www.knownhost.com\/managed-vps\">Isn&#8217;t it about time you bought your VPS from KnownHost.<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed denial of service. It sounds like a boring term, joining a laundry list of IT concepts that may or may not deserve your full attention. Well, increasingly, the threat of a DDoS absolutely does deserve your attention. Just ask any of the thousands of stores that lost sales on October 21, 2016, because they [&hellip;]<\/p>\n","protected":false},"author":137,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[414,1460,1524],"class_list":["post-1385","post","type-post","status-publish","format-standard","hentry","category-security","tag-ddos","tag-profit","tag-recover"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Recover from a DDoS Attack - Regain Lost Revenue!<\/title>\n<meta name=\"description\" content=\"DDoS recovery is more than technical wizardry. Knowing how to recover from a DDoS attack means re-establishing trust and rebuilding lost income.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Recover from a DDoS Attack - Regain Lost Revenue!\" \/>\n<meta property=\"og:description\" content=\"DDoS recovery is more than technical wizardry. Knowing how to recover from a DDoS attack means re-establishing trust and rebuilding lost income.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-29T02:34:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-17T11:50:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2016\/12\/DDoS-Attack-Tailspin.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1056\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jerry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/\"},\"author\":{\"name\":\"Jerry\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\"},\"headline\":\"How to Recover Revenue from a DDoS Attack Tailspin\",\"datePublished\":\"2016-12-29T02:34:43+00:00\",\"dateModified\":\"2020-03-17T11:50:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/\"},\"wordCount\":1332,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"ddos\",\"profit\",\"recover\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/\",\"name\":\"How to Recover from a DDoS Attack - Regain Lost Revenue!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2016-12-29T02:34:43+00:00\",\"dateModified\":\"2020-03-17T11:50:07+00:00\",\"description\":\"DDoS recovery is more than technical wizardry. Knowing how to recover from a DDoS attack means re-establishing trust and rebuilding lost income.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/recover-revenue-ddos-attack-tailspin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Recover Revenue from a DDoS Attack Tailspin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\",\"name\":\"Jerry\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/jerrysteadydemand-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Recover from a DDoS Attack - Regain Lost Revenue!","description":"DDoS recovery is more than technical wizardry. Knowing how to recover from a DDoS attack means re-establishing trust and rebuilding lost income.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/","og_locale":"en_US","og_type":"article","og_title":"How to Recover from a DDoS Attack - Regain Lost Revenue!","og_description":"DDoS recovery is more than technical wizardry. Knowing how to recover from a DDoS attack means re-establishing trust and rebuilding lost income.","og_url":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2016-12-29T02:34:43+00:00","article_modified_time":"2020-03-17T11:50:07+00:00","og_image":[{"width":1056,"height":750,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2016\/12\/DDoS-Attack-Tailspin.jpeg","type":"image\/jpeg"}],"author":"Jerry","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Jerry","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/"},"author":{"name":"Jerry","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc"},"headline":"How to Recover Revenue from a DDoS Attack Tailspin","datePublished":"2016-12-29T02:34:43+00:00","dateModified":"2020-03-17T11:50:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/"},"wordCount":1332,"commentCount":2,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["ddos","profit","recover"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/","url":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/","name":"How to Recover from a DDoS Attack - Regain Lost Revenue!","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2016-12-29T02:34:43+00:00","dateModified":"2020-03-17T11:50:07+00:00","description":"DDoS recovery is more than technical wizardry. Knowing how to recover from a DDoS attack means re-establishing trust and rebuilding lost income.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/recover-revenue-ddos-attack-tailspin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Recover Revenue from a DDoS Attack Tailspin"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc","name":"Jerry","url":"https:\/\/www.knownhost.com\/blog\/author\/jerrysteadydemand-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/137"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=1385"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/1385\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=1385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=1385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=1385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}