{"id":2202,"date":"2018-07-11T10:00:34","date_gmt":"2018-07-11T09:00:34","guid":{"rendered":"https:\/\/blog.whogohost.com\/?p=2202"},"modified":"2025-10-13T08:47:50","modified_gmt":"2025-10-13T07:47:50","slug":"protect-your-website-from-cyber-attacks","status":"publish","type":"post","link":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/","title":{"rendered":"This Is How To Protect Your Website From Cyber Attacks"},"content":{"rendered":"<p>Do you know that the average website is attacked 44 times per day?<\/p>\n<p>As the digital space evolves, malware and cyber attacks are becoming increasingly common and ever more complex. It&#8217;s now more vital than ever to protect your site and that of your customers (if you are a developer) from cybercriminals. Malware attacks not only cause loss of business and trust but can also result in data breaches that can damage a business&#8217; reputation.<\/p>\n<p>Some Examples of Cybersecurity attacks include &#8211;<\/p>\n<p>Malware, Phishing, SQL Injection Attack, Cross-Site Scripting (XSS), Denial-of-Service (DoS), Session Hijacking,\u00a0 Man-in-the-Middle Attacks, Credential Reuse among others. Wondering what damage a &#8216;little&#8217; cyber attack could do to your business? Click<a href=\"https:\/\/blog.whogohost.com\/security-breach-exposes-sensitive-data-millions-south-africans\/\"> here<\/a> to find out.<\/p>\n<p>The infographic below will empower you with the knowledge you need to beat cyber criminals at their own game. This infographic contains some of the tactics cybercriminals use to take advantage of websites, key statistics from website security leader SiteLock, and actions you can take to protect your site and that of your customers&#8217; from malware attacks.<\/p>\n<h4 style=\"text-align: center;\">Key Statistics To Protect Your Website From Cyber Attacks<\/h4>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2205 size-full\" src=\"https:\/\/blog.whogohost.com\/wp-content\/uploads\/2018\/07\/whmcs-marketconnect-sitelock-infographic-1.png\" alt=\"\" width=\"800\" height=\"3340\" srcset=\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/whmcs-marketconnect-sitelock-infographic-1.png 800w, https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/whmcs-marketconnect-sitelock-infographic-1-72x300.png 72w, https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/whmcs-marketconnect-sitelock-infographic-1-768x3206.png 768w, https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/whmcs-marketconnect-sitelock-infographic-1-245x1024.png 245w, https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/whmcs-marketconnect-sitelock-infographic-1-640x2672.png 640w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Love what you read? Then you should learn\u00a0more about how to stay safe online as well as the importance of securing your website <a href=\"https:\/\/blog.whogohost.com\/how-to-stay-safe-in-an-interconnected-world\/\">here<\/a>.<\/p>\n<p>Culled from &#8211; blog.whmcs.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know that the average website is attacked 44 times per day? As the digital space evolves, malware and cyber attacks are becoming increasingly common and ever more complex. It&#8217;s now more vital than ever to protect your site and that of your customers (if you are a developer) from cybercriminals. Malware attacks not [&hellip;]<\/p>\n","protected":false},"author":157,"featured_media":2203,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[135,134,1,58],"tags":[251,253,252],"class_list":["post-2202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-tos","category-infographics","category-security","category-website","tag-cyber-attack","tag-website-protection-infographic","tag-website-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This Is How To Protect Your Website From Cyber Attacks Go54 Blog<\/title>\n<meta name=\"description\" content=\"This infographic contains some of the tactics cybercriminals use to take advantage of any website, key statistics from website security...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Is How To Protect Your Website From Cyber Attacks Go54 Blog\" \/>\n<meta property=\"og:description\" content=\"This infographic contains some of the tactics cybercriminals use to take advantage of any website, key statistics from website security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Go54 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-11T09:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T07:47:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"GO54\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GO54\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/\",\"url\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/\",\"name\":\"This Is How To Protect Your Website From Cyber Attacks Go54 Blog\",\"isPartOf\":{\"@id\":\"https:\/\/go54.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg\",\"datePublished\":\"2018-07-11T09:00:34+00:00\",\"dateModified\":\"2025-10-13T07:47:50+00:00\",\"author\":{\"@id\":\"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343\"},\"description\":\"This infographic contains some of the tactics cybercriminals use to take advantage of any website, key statistics from website security...\",\"breadcrumb\":{\"@id\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg\",\"contentUrl\":\"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg\",\"width\":960,\"height\":540,\"caption\":\"website security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/go54.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This Is How To Protect Your Website From Cyber Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/go54.com\/blog\/#website\",\"url\":\"https:\/\/go54.com\/blog\/\",\"name\":\"Go54 Blog\",\"description\":\"The Go54 Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/go54.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343\",\"name\":\"GO54\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/go54.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g\",\"caption\":\"GO54\"},\"url\":\"https:\/\/go54.com\/blog\/author\/ifeoluwao\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Is How To Protect Your Website From Cyber Attacks Go54 Blog","description":"This infographic contains some of the tactics cybercriminals use to take advantage of any website, key statistics from website security...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/","og_locale":"en_GB","og_type":"article","og_title":"This Is How To Protect Your Website From Cyber Attacks Go54 Blog","og_description":"This infographic contains some of the tactics cybercriminals use to take advantage of any website, key statistics from website security...","og_url":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/","og_site_name":"Go54 Blog","article_published_time":"2018-07-11T09:00:34+00:00","article_modified_time":"2025-10-13T07:47:50+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg","type":"image\/jpeg"}],"author":"GO54","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GO54","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/","url":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/","name":"This Is How To Protect Your Website From Cyber Attacks Go54 Blog","isPartOf":{"@id":"https:\/\/go54.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg","datePublished":"2018-07-11T09:00:34+00:00","dateModified":"2025-10-13T07:47:50+00:00","author":{"@id":"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343"},"description":"This infographic contains some of the tactics cybercriminals use to take advantage of any website, key statistics from website security...","breadcrumb":{"@id":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#primaryimage","url":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg","contentUrl":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg","width":960,"height":540,"caption":"website security"},{"@type":"BreadcrumbList","@id":"https:\/\/go54.com\/blog\/protect-your-website-from-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/go54.com\/blog\/"},{"@type":"ListItem","position":2,"name":"This Is How To Protect Your Website From Cyber Attacks"}]},{"@type":"WebSite","@id":"https:\/\/go54.com\/blog\/#website","url":"https:\/\/go54.com\/blog\/","name":"Go54 Blog","description":"The Go54 Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/go54.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/go54.com\/blog\/#\/schema\/person\/2d52a7680bd0e9cbd40a2f67d63db343","name":"GO54","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/go54.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20d4f7874acacffa669d6683063c71a758b375bf78de103c9595795b03b9f17a?s=96&d=mm&r=g","caption":"GO54"},"url":"https:\/\/go54.com\/blog\/author\/ifeoluwao\/"}]}},"jetpack_featured_media_url":"https:\/\/go54.com\/blog\/wp-content\/uploads\/2018\/07\/cyber-security-2296269_960_720.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9PSw1-zw","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3589,"url":"https:\/\/go54.com\/blog\/how-to-protect-your-business-from-coronavirus-malware-and-phishing-attacks\/","url_meta":{"origin":2202,"position":0},"title":"How to protect your business from coronavirus malware and phishing attacks","author":"GO54","date":"14 May 2020","format":false,"excerpt":"Misinformation is one of the most essential tools of a hacker, and capitalizing on mass fear or hysteria is a typical form of attack. This is because using current, headline-grabbing events can camouflage their attacks as more credible - which is why with the COVID-19 outbreak, these attacks are becoming\u2026","rel":"","context":"In &quot;How Tos&quot;","block_context":{"text":"How Tos","link":"https:\/\/go54.com\/blog\/section\/how-tos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/05\/cyber-security.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2075,"url":"https:\/\/go54.com\/blog\/staying-safe-in-an-interconnected-world-pt-2\/","url_meta":{"origin":2202,"position":1},"title":"How To Stay Safe in an Interconnected World &#8211; PT. 2","author":"GO54","date":"14 May 2018","format":false,"excerpt":"In my\u00a0previous article,\u00a0How To Stay Safe in an Interconnected World - PT. 1 I introduced some of the threats that exist in today\u2019s interconnected world. In this article, I will show the different ways you can get compromised and what inspires hackers to do what they do. You don\u2019t have\u2026","rel":"","context":"In &quot;How Tos&quot;","block_context":{"text":"How Tos","link":"https:\/\/go54.com\/blog\/section\/how-tos\/"},"img":{"alt_text":"staying-safe-in-an-interconnected-world","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/credit-card-.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2069,"url":"https:\/\/go54.com\/blog\/how-to-stay-safe-in-an-interconnected-world\/","url_meta":{"origin":2202,"position":2},"title":"How To Stay Safe in an Interconnected World &#8211; PT. 1","author":"GO54","date":"8 May 2018","format":false,"excerpt":"The Internet has made everything easier for most of us. You can now buy almost anything using your credit\/debit card and it is delivered to your doorstep. With the introduction of Internet of Things (IoT), your CWAY dispenser unit may soon purchase water just before it is exhausted without you\u2026","rel":"","context":"In &quot;How Tos&quot;","block_context":{"text":"How Tos","link":"https:\/\/go54.com\/blog\/section\/how-tos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2018\/05\/inter.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3538,"url":"https:\/\/go54.com\/blog\/how-to-protect-your-virtual-meetings-from-a-brute-force-login-attack\/","url_meta":{"origin":2202,"position":3},"title":"How to Protect Your Virtual Meetings from a Brute Force Login Attack","author":"GO54","date":"16 April 2020","format":false,"excerpt":"Businesses of all sizes are rushing to respond to the COVID-19 pandemic, making use of new tools and ways of working to limit the impact of global lockdowns, calls for remote working, and quarantined staff. Many have begun to use virtual meeting software to move their meetings online. Virtual meetings\u2026","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/go54.com\/blog\/section\/business\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2020\/04\/WhatsApp-Image-2020-04-16-at-14.24.36.jpeg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":11374,"url":"https:\/\/go54.com\/blog\/the-importance-of-website-maintenance\/","url_meta":{"origin":2202,"position":4},"title":"The Importance of Website Maintenance","author":"Ashwin","date":"17 September 2025","format":false,"excerpt":"Just like your car needs regular oil changes and tune-ups to keep running smoothly, your website requires routine maintenance to stay secure, fast, and reliable. Neglecting this essential care can lead to vulnerabilities, slow loading speeds, and a poor user experience, ultimately hurting your brand and conversions. In this post,\u2026","rel":"","context":"In &quot;Website&quot;","block_context":{"text":"Website","link":"https:\/\/go54.com\/blog\/section\/website\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1134,"url":"https:\/\/go54.com\/blog\/get-25-off-protect-website-information\/","url_meta":{"origin":2202,"position":5},"title":"Get 25% Off! Protect Your Website Information","author":"GO54","date":"6 October 2016","format":false,"excerpt":"A Website is no longer a place to just blog your thoughts,share your opinions on political issues or put basic information. A Website has become a source of revenue for people and businesses. With the increase in success of ecommerce in Nigeria, many businesses have learned that having their businesses\u2026","rel":"","context":"In &quot;Design&quot;","block_context":{"text":"Design","link":"https:\/\/go54.com\/blog\/section\/design\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/go54.com\/blog\/wp-content\/uploads\/2016\/09\/side.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts\/2202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/comments?post=2202"}],"version-history":[{"count":2,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts\/2202\/revisions"}],"predecessor-version":[{"id":2207,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/posts\/2202\/revisions\/2207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/media\/2203"}],"wp:attachment":[{"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/media?parent=2202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/categories?post=2202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/go54.com\/blog\/wp-json\/wp\/v2\/tags?post=2202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}