{"id":7676,"date":"2020-02-13T19:00:17","date_gmt":"2020-02-13T17:00:17","guid":{"rendered":"https:\/\/www.efrontlearning.com\/blog\/?p=7676"},"modified":"2020-02-13T09:01:31","modified_gmt":"2020-02-13T07:01:31","slug":"data-security-training-tips","status":"publish","type":"post","link":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html","title":{"rendered":"Data security training: what is it and how do you implement it in the company?"},"content":{"rendered":"<div class=\"wp-block-classic-wrap\">Whether it\u2019s employees\u2019 login credentials or sensitive personal and financial information, businesses possess and manage a significant amount of data.<!--more--><\/p>\n<p>Unfortunately, none of it is safe. Data breaches have become commonplace, and the consequences are never mild. Data compromise of any kind can disrupt your operations, harm your reputation, initiate legal action against you, and result in hefty fines. According to a recent <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">Cost of a Data Breach Report<\/a> by the Ponemon Institute and IBM security, the average cost of a data breach amounts to 3.92 million dollars!<\/p>\n<p>Most companies have experienced a data breach, usually as a <a href=\"https:\/\/www.cnbc.com\/2018\/06\/21\/the-biggest-cybersecurity-risk-to-us-businesses-is-employee-negligence-study-says.html\" target=\"_blank\" rel=\"noopener noreferrer\">result of human error<\/a>. Accusing employees of irresponsible behavior and negligence is pointless and unfair. Instead, deploy data security training for your staff to minimize the possibility of similar incidents in the future. Or to prevent them in the first place.<\/p>\n<p>Before we dive into best practices and tips, let\u2019s take it from the beginning:<\/p>\n<h2>What is data security training?<\/h2>\n<p>Data security training educates employees on best practices that protect data from destruction, loss, modification, theft, or disclosure. Since data security can be compromised either by mistake or intentionally, information security training should focus both on accidental data mishandling and protection from malicious attempts.<\/p>\n<p>There\u2019s often a confusion between cybersecurity and data security. While there are many similarities, there\u2019s one key difference. Cybersecurity refers to protecting data and systems, so that data and information that circulates in cyberspace isn\u2019t stolen or compromised. Data security, however, isn\u2019t exclusively about data stored in cyberspace. A lost printed document with an employee\u2019s social security number, for instance, is also data loss.<\/p>\n<p>So, while <a href=\"https:\/\/www.efrontlearning.com\/blog\/2019\/03\/cyber-security-training-for-employees-101.html\">cybersecurity training for employees<\/a> discusses attempts against systems and data in cyberspace, data security training covers offline information and threats as well.<\/p>\n<h2>How do I train my employees on data security?<\/h2>\n<p>First things first: data security training for employees has to be deployed company-wide. Data compromise or theft can happen in the blink of an eye, and anyone can cause it.<\/p>\n<p>Which is why all employees should realize that it\u2019s not only the IT department\u2019s job to protect company data. It\u2019s their responsibility, too. Sure enough, the level of training might vary. Still, from IT staff to the front desk, everyone must have a basic knowledge of common threats and defenses.<\/p>\n<h3>1. Deploy data security training from day one<\/h3>\n<p>Even if you don\u2019t go into much detail, offer data security awareness training early on. This should happen for two reasons. One, to minimize the risk of a data breach due to ignorance of best practices. Two, so that new hires realize that protection against data compromise is part of your company culture and not some random training you conduct just for the sake of it.<\/p>\n<p>New employees receive a lot of new information during onboarding. At this point, they\u2019re unlikely to retain much. So, communicate basic data protection rules to follow. For example, using antivirus software, creating secure passwords, and respecting the clean-desk policy.<\/p>\n<h3>2. Follow a formal training approach<\/h3>\n<p>Hanging an infographic in the break room or sending a video with data security tips is a great, casual way to keep the information fresh in your employees\u2019 minds. \u201cCasual\u201d is the keyword here. Because these practices don\u2019t qualify as proper data security and protection training. Some employees won\u2019t watch the video, and others won\u2019t even notice the infographic &#8212; you\u2019ll never know.<\/p>\n<p>Data security training in the workplace should be formal, and it should have a clear structure. Ideally, you also want to be able to update it frequently and with little effort. The solution? Organize your security awareness training material into an easily manageable course using a <a href=\"https:\/\/www.efrontlearning.com\/features\" target=\"_blank\" rel=\"noopener noreferrer\">powerful enterprise LMS<\/a>, like eFront.<\/p>\n<p>Data security covers diverse and, for some, challenging topics. An effective way to ease knowledge retention is to break down the training content into small, digestible pieces. Mobile apps give employees the choice to go through the microlearning content on the move or at home. Simulations and branching scenarios provide further practice opportunities, as well as advanced assessment tools and certification management. All in all, it\u2019s the ideal training system for data security awareness.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7683 aligncenter\" src=\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training.png\" alt=\"Data security training for employees\" width=\"1201\" height=\"314\" srcset=\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training.png 1201w, https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-300x78.png 300w, https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-768x201.png 768w, https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-1024x268.png 1024w, https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-810x212.png 810w, https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-1140x298.png 1140w\" sizes=\"auto, (max-width: 1201px) 100vw, 1201px\" \/><\/p>\n<h3>3. Discuss physical security<\/h3>\n<p>Since a data breach can (and often does) occur offline, data privacy training should discuss physical security as well. Implementing a clean desk policy will ensure that employees don\u2019t leave documents with sensitive data sitting on their desks.<\/p>\n<p>You can also ask employees to shred documents they no longer need instead of throwing them in the dustbin. Other dangerous practices to address are unlocked or unattended devices, as well as granting access to the company premises without verifying the visitor\u2019s identity.<\/p>\n<h3>4. Repeat regularly<\/h3>\n<p>The threat is real, so make sure employees don\u2019t forget about it. OK, that sounded a bit sinister. But the point is, employees will forget most of what they\u2019ve learned after a few months. Also, as time passes by, some might begin to bypass data hygiene rules or lower their alertness.<\/p>\n<p>To make sure this doesn\u2019t happen, data security training for employees should be a consistent effort. There are many ways you can keep data security top of mind. Some companies choose to conduct refresher seminars every quarter or send relevant videos and articles with recent news.<\/p>\n<p>If you deploy privacy &amp; data security training online, things are even simpler. The system automatically sends notifications when a data security certification expires or when there\u2019s a course update. Your task is to stay up to date with data security news and update your training accordingly.<\/p>\n<h3>5. Explore common data security threats<\/h3>\n<p>Ideally, each company should run a data security and protection training needs analysis to identify weak spots and common threats. In any case, the following topics are a good place to start with:<\/p>\n<ul>\n<li>Password security: employees should create strong, unique passwords for each account and never share their credentials. Using a password manager app is also advisable.<\/li>\n<li>Physical security: discuss basic data hygiene rules that minimize breaches caused by unauthorized physical access to data.<\/li>\n<li>Phishing emails and social engineering scams: employees should be able to recognize attempts that take place via email, over the phone, or even in person. Advise them against disclosing sensitive information or authorizing money transfers.<\/li>\n<li>Malware: a basic overview of spyware, viruses, etc., that hide in links, files, and software programs. Explain how malware can shut your systems down and attack data.<\/li>\n<\/ul>\n<h3>6. Don\u2019t forget your remote and mobile employees<\/h3>\n<p>Data breaches are not always an \u201cinside job.\u201d Remote employees, as well as those who take regular business trips, can also cause a data breach. So, you should not only include remote and mobile employees in data privacy and security training. You should also focus on the intricacies of their working style and habits.<\/p>\n<p>For example, remote and mobile employees should be instructed to use all work-related devices responsibly. This starts with regularly updating their antivirus software and never losing sight of their devices. Prompt them to encrypt their devices so that all data remains safe in case of loss. Another issue to address is the safe usage of public Wi-Fi, as it\u2019s a common point of entry to data.<\/p>\n<h3>7. Nothing beats the real thing<\/h3>\n<p>\u201cIs it safe to share your password with a colleague if they pinky swear not to reveal it to anyone else?\u201d Duh, no! But, it\u2019s easy to answer questions when you\u2019re doing a quiz. So is making the right decision and managing situations that are under your control. The actual challenge is to handle an attack you don\u2019t know is coming.<\/p>\n<p>When it comes to data security, assessments can gauge your employees\u2019 theoretical knowledge. A simulated scam, preferably well after the training is complete, will test what matters most: their alertness. And if your IT department is too busy for that? Find a reliable IT security vendor who will also analyze your response capabilities after the fact.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Nothing is hidden under the sun, especially from prying eyes and cybercriminals. To ensure valuable company and customer data stays with you, make data security training for employees the cornerstone of your data protection plan.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Whether it\u2019s employees\u2019 login credentials or sensitive personal and financial information, businesses possess and manage a significant amount of data.<\/p>\n","protected":false},"author":33899,"featured_media":7682,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[2131],"class_list":["post-7676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","tag-employee-training-and-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>7 tips for implementing data security training for employees<\/title>\n<meta name=\"description\" content=\"Find out what data security training is and how to implement it successfully to save your company from costly legal and financial implications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data security training: what is it and how do you implement it in the company?\" \/>\n<meta property=\"og:description\" content=\"Find out what data security training is and how to implement it successfully to save your company from costly legal and financial implications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\" \/>\n<meta property=\"og:site_name\" content=\"eFront Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-13T17:00:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Eleni Zoe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eleni Zoe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\"},\"author\":{\"name\":\"Eleni Zoe\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/5f294649efb52c11a1a598251a529a37\"},\"headline\":\"Data security training: what is it and how do you implement it in the company?\",\"datePublished\":\"2020-02-13T17:00:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\"},\"wordCount\":1382,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png\",\"keywords\":[\"Employee Training and Development\"],\"articleSection\":[\"Best practices\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\",\"url\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\",\"name\":\"7 tips for implementing data security training for employees\",\"isPartOf\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png\",\"datePublished\":\"2020-02-13T17:00:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/5f294649efb52c11a1a598251a529a37\"},\"description\":\"Find out what data security training is and how to implement it successfully to save your company from costly legal and financial implications.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage\",\"url\":\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png\",\"contentUrl\":\"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png\",\"width\":1200,\"height\":628,\"caption\":\"Data security training for employees\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.efrontlearning.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best practices\",\"item\":\"https:\/\/www.efrontlearning.com\/blog\/category\/best-practices\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data security training: what is it and how do you implement it in the company?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/#website\",\"url\":\"https:\/\/www.efrontlearning.com\/blog\/\",\"name\":\"eFront Blog\",\"description\":\"eLearning tips, news and resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.efrontlearning.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/5f294649efb52c11a1a598251a529a37\",\"name\":\"Eleni Zoe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/77b9cb02f6c915be836dde105bb6e83fa2c3b4278e6a1c3d3d35db2b78d827c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/77b9cb02f6c915be836dde105bb6e83fa2c3b4278e6a1c3d3d35db2b78d827c5?s=96&d=mm&r=g\",\"caption\":\"Eleni Zoe\"},\"url\":\"https:\/\/www.efrontlearning.com\/blog\/author\/epapaioannou\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 tips for implementing data security training for employees","description":"Find out what data security training is and how to implement it successfully to save your company from costly legal and financial implications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html","og_locale":"en_US","og_type":"article","og_title":"Data security training: what is it and how do you implement it in the company?","og_description":"Find out what data security training is and how to implement it successfully to save your company from costly legal and financial implications.","og_url":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html","og_site_name":"eFront Blog","article_published_time":"2020-02-13T17:00:17+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png","type":"image\/png"}],"author":"Eleni Zoe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eleni Zoe","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#article","isPartOf":{"@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html"},"author":{"name":"Eleni Zoe","@id":"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/5f294649efb52c11a1a598251a529a37"},"headline":"Data security training: what is it and how do you implement it in the company?","datePublished":"2020-02-13T17:00:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html"},"wordCount":1382,"commentCount":0,"image":{"@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage"},"thumbnailUrl":"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png","keywords":["Employee Training and Development"],"articleSection":["Best practices"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html","url":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html","name":"7 tips for implementing data security training for employees","isPartOf":{"@id":"https:\/\/www.efrontlearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage"},"image":{"@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage"},"thumbnailUrl":"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png","datePublished":"2020-02-13T17:00:17+00:00","author":{"@id":"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/5f294649efb52c11a1a598251a529a37"},"description":"Find out what data security training is and how to implement it successfully to save your company from costly legal and financial implications.","breadcrumb":{"@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#primaryimage","url":"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png","contentUrl":"https:\/\/www.efrontlearning.com\/blog\/wp-content\/uploads\/2020\/02\/data-security-training-employees.png","width":1200,"height":628,"caption":"Data security training for employees"},{"@type":"BreadcrumbList","@id":"https:\/\/www.efrontlearning.com\/blog\/2020\/02\/data-security-training-tips.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.efrontlearning.com\/blog"},{"@type":"ListItem","position":2,"name":"Best practices","item":"https:\/\/www.efrontlearning.com\/blog\/category\/best-practices"},{"@type":"ListItem","position":3,"name":"Data security training: what is it and how do you implement it in the company?"}]},{"@type":"WebSite","@id":"https:\/\/www.efrontlearning.com\/blog\/#website","url":"https:\/\/www.efrontlearning.com\/blog\/","name":"eFront Blog","description":"eLearning tips, news and resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.efrontlearning.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/5f294649efb52c11a1a598251a529a37","name":"Eleni Zoe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.efrontlearning.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/77b9cb02f6c915be836dde105bb6e83fa2c3b4278e6a1c3d3d35db2b78d827c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/77b9cb02f6c915be836dde105bb6e83fa2c3b4278e6a1c3d3d35db2b78d827c5?s=96&d=mm&r=g","caption":"Eleni Zoe"},"url":"https:\/\/www.efrontlearning.com\/blog\/author\/epapaioannou"}]}},"_links":{"self":[{"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/posts\/7676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/users\/33899"}],"replies":[{"embeddable":true,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/comments?post=7676"}],"version-history":[{"count":7,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/posts\/7676\/revisions"}],"predecessor-version":[{"id":7678,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/posts\/7676\/revisions\/7678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/media\/7682"}],"wp:attachment":[{"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/media?parent=7676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/categories?post=7676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.efrontlearning.com\/blog\/wp-json\/wp\/v2\/tags?post=7676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}