{"id":227,"date":"2025-11-17T18:11:27","date_gmt":"2025-11-17T18:11:27","guid":{"rendered":"https:\/\/www.edcus.com\/blog\/?p=227"},"modified":"2025-12-19T15:18:03","modified_gmt":"2025-12-19T15:18:03","slug":"be-afraid-be-very-afraid","status":"publish","type":"post","link":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/","title":{"rendered":"BE AFRAID! BE VERY AFRAID!"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8c6c5680e10887fd5934891e6b556316\">I could dedicate, as many others have, thousands of pages on fortifying your network and data protection with a myriad of tools that will constantly evolve. These techniques, processes and systems are a must for large organizations with IT staff available 24\/7\/365. Doing so in small organizations is close to impossible or simply unaffordable. The complexities and nuances of data\/network security are a full-time job and could not be appropriately visited in a short article so I am going to focus on the process that will yield the most protection under varying attack scenarios.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f487a3e9c1c6a016aaba48ad40b2a912\">I\u2019m referring to training your teams on social engineering. The most common attacks involve a combination of techniques. Other than state-sponsored attacks which will use very sophisticated tools to exploit known and unknown vulnerabilities in systems software such as Windows, ChatGPT, Copilot, Google Gemini, Linux, Web Servers, E-Mail Servers, etc., most attacks rely on social engineering to trick users into loading malicious software without their knowledge.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d63906c8b1eb17a7d41f727f3f341422\">The most prevalent social-engineering attempts will come through e-mail, text messaging, and telephone calls. This method is called phishing and it refers to a cyber-criminal tricking the recipient into following a link which unless protected by other systems, will potentially compromise the recipient\u2019s computer or phone and potentially turning said system into a zombie. A zombie system is one where the attacker has created a back door to gain control of said system at any time and to be used for anything the attacker wishes.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c8a42fb9e4ced74db3afabcb8f926444\">To underscore the urgency of data protection, company and personal data should be viewed by everyone in the organization as cash. When cash is missing, it is bound to be noticed, but not so with data, depending on the purpose of the cyber-attack. An attacker can simply copy and not remove or damage data. Without systems in place to detect potential intruders, you may never know your data is compromised.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3807420105f47e49a54affb8c6187de1\">The key is, unfortunately, not trusting anyone. E-mails can be made to look official and from the purported sender. For example, you may get an e-mail from Microsoft, Google, Social Security Administration, IRS, local business, or even from coworkers, customers, or business partners. A few years back it was relatively easy to spot fake e-mails based on grammar, punctuation and words used. This is not so simple anymore. Just like everyone is using AI for day-to-day work, so are the cyber-criminals or scammers. They are using AI to make perfect text and e-mails that could fool all but the most paranoid.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f6a904cffd085472a764c1b56731c1b9\">What to do? Training. Bring the organization together and explain the importance of cyber security and everyone\u2019s role in protecting it. Perform random tests where you play the role of cyber-criminal. Call a couple of times pretending to be someone else and extract information from employees. This applies not only to those working with the public. Those not working with the public are at a higher danger of falling for phishing than those working with the public.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-70f5ed38ed62496ab1d4dfae28356e3b\">Following are a few examples of phishing and how it is used.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>You, a company employee, get a telephone call claiming to be from \u201cJoe\u201d in IT. The caller proceeds to say that they\u2019ve uncovered \u201cunusual activity\u201d on the network and need to verify your password or it will need to be shut off (leaving you unable to work). You look at the caller ID on the phone which shows the company\u2019s main number or an extension in the IT department (information can be obtained from on-line directories). You may be satisfied that the call is coming from \u201cinside\u201d and is likely real. Once the login and password are surrendered to the cyber-criminal, the conversation will end very politely, and they\u2019ll thank you for the help in combating cyber-crime with a promise to follow up if there are any more issues. Let\u2019s be clear about this: Caller ID\u2019s can be faked. Not only can they be faked, it is extremely easy to do. You could get a call with a caller ID of \u201cNY Police\u201d or \u201cIT Department\u201d or \u201cRichard Corona\u201d while originating from anywhere. A few years back I would have said that unless you can recognize the voice of the caller be weary. Today, the voice can be fake as well. Offer to call back when in doubt. If there is resistance to a call back, do not offer any information.<\/li>\n\n\n\n<li>Similar to the above, you receive an e-mail that looks and sounds real, claiming there is an overdue amount on something. However, there is no reason for you to be receiving that type of e-mail since you work in dispatch, not in accounting. Do not even open the e-mail. Forward a screenshot to IT for analysis and then delete it. If you click on any links to \u201cView the Invoice,\u201d you may become a victim of a Trojan Horse, which means that while you are busy looking at a strange invoice or looking at a funny animation or playing an online game, etc., the host system is infecting your computer in the background. You may never know that your machine has become a zombie.<\/li>\n\n\n\n<li>In the same light, text messages can be extremely dangerous. Even though telephones are a little bit harder to compromise, they are not perfect. A zombie phone can compromise all your calls, texts, pictures, 2-factor authentication being used by banks, etc.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9145bd06870d6fdd71889e26bfcdf1ae\">The scary part is all it takes is one person to make a mistake that impacts your entire organization. They may not even realize it was a phishing effort.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-c2454b551c75fd57c687abf56f53292c\">The bottom line is the following:<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-915c43297b5a9b27db39133f38f12642\">Yes, cyber attacks will\/can happen to anyone. There is no minimum company size, specific industry, product or services types, etc. EVERY computer that is compromised will become useful to cyber-criminals to work their scams. A zombie computer can be a point of access to your entire network or even a jumping point to attack others, such as clients and customers (and the attack on other organizations can be tracked to you and not the scammer). Everyone must be on alert 100% of the time.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a38190befd2cea6c8d38bb3157ff3d8b\">The above is just a peek at how vulnerable organizations are to common phishing attacks (that is why they are so prevalent).<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-35d493aa4ea72625df3438c62f0fe134\">The question then becomes, what can be done to protect from phishing (other than training and vigilance), and worse yet, how do you control the network intrusion once someone is tricked? This is a rather lengthy topic given the myriad purposes and access gained. Do they want to encrypt all your data to demand a ransom payment for the decryption key? Do they just want to read and maintain access to your data (customers, financial, employee, etc. which can be used later in further phishing attacks)? Do they want to use your system to send e-mails out to other unsuspecting users\/organizations, particularly if they are partners, clients or employees which will recognize your e-mail source (valid) and fall victim, therefore expanding the cyber-criminal\u2019s reach and capabilities?<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-aa71de50956d9a15747aa4945acdc972\">Though this is beyond the scope of this short article, it is a topic well worth exploring with a reliable technology partner.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-e67b3ef8e078c341844acce869b18c3e\">BE AFRAID! BE VERY AFRAID!<\/p>\n\n\n\n<p><strong>Richard Corona<br><\/strong>Chief Technology Officer (CTO) at Enterprise Database Corporation (EDC\u00ae)<br>EDC\u00ae\u00a0Co-Founder<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I could dedicate, as many others have, thousands of pages on fortifying your network and data protection with a myriad of tools that will constantly evolve. These techniques, processes and systems are a must for large organizations with IT staff available 24\/7\/365. Doing so in small organizations is close to impossible or simply unaffordable. The [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":243,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"format":"standard"},"jnews_primary_category":[],"jnews_social_meta":[],"jnews_override_counter":[],"footnotes":""},"categories":[24,5],"tags":[],"class_list":["post-227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-jnews_demo_technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>BE AFRAID! BE VERY AFRAID! - EDC&#039;s Blog<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"BE AFRAID! BE VERY AFRAID! - EDC&#039;s Blog\" \/>\r\n<meta property=\"og:description\" content=\"I could dedicate, as many others have, thousands of pages on fortifying your network and data protection with a myriad of tools that will constantly evolve. These techniques, processes and systems are a must for large organizations with IT staff available 24\/7\/365. Doing so in small organizations is close to impossible or simply unaffordable. The [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/\" \/>\r\n<meta property=\"og:site_name\" content=\"EDC&#039;s Blog\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edcglobaltech\" \/>\r\n<meta property=\"article:published_time\" content=\"2025-11-17T18:11:27+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-12-19T15:18:03+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/blog_richard.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1141\" \/>\r\n\t<meta property=\"og:image:height\" content=\"760\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Richard Corona\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@edcglobaltech\" \/>\r\n<meta name=\"twitter:site\" content=\"@edcglobaltech\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Richard Corona\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/\"},\"author\":{\"name\":\"Richard Corona\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#\\\/schema\\\/person\\\/7e62be8304c9d75416e1e9c38df4504b\"},\"headline\":\"BE AFRAID! BE VERY AFRAID!\",\"datePublished\":\"2025-11-17T18:11:27+00:00\",\"dateModified\":\"2025-12-19T15:18:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/\"},\"wordCount\":1213,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_richard.jpg\",\"articleSection\":[\"AI\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/\",\"url\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/\",\"name\":\"BE AFRAID! BE VERY AFRAID! - EDC&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_richard.jpg\",\"datePublished\":\"2025-11-17T18:11:27+00:00\",\"dateModified\":\"2025-12-19T15:18:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_richard.jpg\",\"contentUrl\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_richard.jpg\",\"width\":1141,\"height\":760},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/2025\\\/11\\\/17\\\/be-afraid-be-very-afraid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BE AFRAID! BE VERY AFRAID!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/\",\"name\":\"EDC's Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#organization\",\"name\":\"Enterprise Database Corporation\",\"url\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/EDC-Logo-c.svg\",\"contentUrl\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/EDC-Logo-c.svg\",\"width\":1240,\"height\":352,\"caption\":\"Enterprise Database Corporation\"},\"image\":{\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/edcglobaltech\",\"https:\\\/\\\/x.com\\\/edcglobaltech\",\"https:\\\/\\\/www.instagram.com\\\/edcglobaltech\",\"https:\\\/\\\/linkedin.com\\\/company\\\/enterprise-database-corporation-edc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/#\\\/schema\\\/person\\\/7e62be8304c9d75416e1e9c38df4504b\",\"name\":\"Richard Corona\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52cf308027867dc1f15f95ee63ea216bb852ffff4211425586de1358a0f26a39?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52cf308027867dc1f15f95ee63ea216bb852ffff4211425586de1358a0f26a39?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52cf308027867dc1f15f95ee63ea216bb852ffff4211425586de1358a0f26a39?s=96&d=mm&r=g\",\"caption\":\"Richard Corona\"},\"url\":\"https:\\\/\\\/www.edcus.com\\\/blog\\\/author\\\/rcorona\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BE AFRAID! BE VERY AFRAID! - EDC&#039;s Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/","og_locale":"en_US","og_type":"article","og_title":"BE AFRAID! BE VERY AFRAID! - EDC&#039;s Blog","og_description":"I could dedicate, as many others have, thousands of pages on fortifying your network and data protection with a myriad of tools that will constantly evolve. These techniques, processes and systems are a must for large organizations with IT staff available 24\/7\/365. Doing so in small organizations is close to impossible or simply unaffordable. The [&hellip;]","og_url":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/","og_site_name":"EDC&#039;s Blog","article_publisher":"https:\/\/www.facebook.com\/edcglobaltech","article_published_time":"2025-11-17T18:11:27+00:00","article_modified_time":"2025-12-19T15:18:03+00:00","og_image":[{"width":1141,"height":760,"url":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/blog_richard.jpg","type":"image\/jpeg"}],"author":"Richard Corona","twitter_card":"summary_large_image","twitter_creator":"@edcglobaltech","twitter_site":"@edcglobaltech","twitter_misc":{"Written by":"Richard Corona","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#article","isPartOf":{"@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/"},"author":{"name":"Richard Corona","@id":"https:\/\/www.edcus.com\/blog\/#\/schema\/person\/7e62be8304c9d75416e1e9c38df4504b"},"headline":"BE AFRAID! BE VERY AFRAID!","datePublished":"2025-11-17T18:11:27+00:00","dateModified":"2025-12-19T15:18:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/"},"wordCount":1213,"commentCount":0,"publisher":{"@id":"https:\/\/www.edcus.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/blog_richard.jpg","articleSection":["AI","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/","url":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/","name":"BE AFRAID! BE VERY AFRAID! - EDC&#039;s Blog","isPartOf":{"@id":"https:\/\/www.edcus.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#primaryimage"},"image":{"@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/blog_richard.jpg","datePublished":"2025-11-17T18:11:27+00:00","dateModified":"2025-12-19T15:18:03+00:00","breadcrumb":{"@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#primaryimage","url":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/blog_richard.jpg","contentUrl":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/blog_richard.jpg","width":1141,"height":760},{"@type":"BreadcrumbList","@id":"https:\/\/www.edcus.com\/blog\/2025\/11\/17\/be-afraid-be-very-afraid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edcus.com\/blog\/"},{"@type":"ListItem","position":2,"name":"BE AFRAID! BE VERY AFRAID!"}]},{"@type":"WebSite","@id":"https:\/\/www.edcus.com\/blog\/#website","url":"https:\/\/www.edcus.com\/blog\/","name":"EDC's Blog","description":"","publisher":{"@id":"https:\/\/www.edcus.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edcus.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.edcus.com\/blog\/#organization","name":"Enterprise Database Corporation","url":"https:\/\/www.edcus.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.edcus.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/EDC-Logo-c.svg","contentUrl":"https:\/\/www.edcus.com\/blog\/wp-content\/uploads\/2025\/11\/EDC-Logo-c.svg","width":1240,"height":352,"caption":"Enterprise Database Corporation"},"image":{"@id":"https:\/\/www.edcus.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edcglobaltech","https:\/\/x.com\/edcglobaltech","https:\/\/www.instagram.com\/edcglobaltech","https:\/\/linkedin.com\/company\/enterprise-database-corporation-edc"]},{"@type":"Person","@id":"https:\/\/www.edcus.com\/blog\/#\/schema\/person\/7e62be8304c9d75416e1e9c38df4504b","name":"Richard Corona","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/52cf308027867dc1f15f95ee63ea216bb852ffff4211425586de1358a0f26a39?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52cf308027867dc1f15f95ee63ea216bb852ffff4211425586de1358a0f26a39?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52cf308027867dc1f15f95ee63ea216bb852ffff4211425586de1358a0f26a39?s=96&d=mm&r=g","caption":"Richard Corona"},"url":"https:\/\/www.edcus.com\/blog\/author\/rcorona\/"}]}},"_links":{"self":[{"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/posts\/227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/comments?post=227"}],"version-history":[{"count":4,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/posts\/227\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/posts\/227\/revisions\/242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/media\/243"}],"wp:attachment":[{"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/media?parent=227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/categories?post=227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edcus.com\/blog\/wp-json\/wp\/v2\/tags?post=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}