{"id":1537,"date":"2018-02-27T14:14:12","date_gmt":"2018-02-27T13:14:12","guid":{"rendered":"https:\/\/www.thenextquarterly.com\/?p=1537"},"modified":"2020-04-10T13:21:57","modified_gmt":"2020-04-10T12:21:57","slug":"how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world","status":"publish","type":"post","link":"https:\/\/thenextorganization.com\/en\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/","title":{"rendered":"How to protect your (and your company's) data in an increasingly connected world"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;]<p><strong>Data and account security are among the most overlooked potential risks in personal and company environments. While security in these fields is a necessary no-brainer, most people tend to follow a \u2018do as I say, not as I do\u2019 way of thinking. This is due to the thought that it won\u2019t happen to them. The scary thing is, accounts have probably already been hacked.<\/strong><\/p>\n<p>Let\u2019s take the example of <strong><a href=\"http:\/\/haveibeenpwned.com\">http:\/\/haveibeenpwned.com<\/a><\/strong>. The website checks whether any e-mail address has been included in a hack of a website in the past few years. One of the prime benefits of the internet is that it does not forget, makes data instantly accessible and has a global presence. At the same time, those characteristics also make it a prime spot for crooks. Having a password stolen is probably going to be pretty inconsequential, with possibly no repercussions at all. But once the data is out there, it is very hard to get rid of it, much less erase it.<\/p>\n<p>An average company gathers loads of data as a result of daily operations. Obviously, this also causes a risk, because every data-point is also one that can be stolen. One of the most dangerous situations arises when a company is collecting unneeded or unwanted data. \u2018Because the capabilities are there\u2019 isn\u2019t a good reason to be storing it. Moreover, because the data is not especially valuable to this company, the protection will also probably not have the highest priority. Meaning that there\u2019s now potentially data freely accessible that\u2019s not so valuable to the company, but all the more to the data owners. This is also what the upcoming EU General Data Protection Regulation (GDPR) tries to prevent, by forcing companies to enable customers to access personal data; companies will at least be thinking of the data they have at present<\/p>\n<strong>Attack vectors<\/strong>\n<p>There are many ways in which malicious people will try to steal, or even trick users into giving them, data. The ways they try this are called \u2018attack vectors\u2019. By now, probably everyone knows the shady African prince asking for money; including deliberate spelling errors for weeding out attentive readers. That attack vector is probably not as effective, as it was before. Below are a few potential threats:<\/p>\n<p><strong>Phishing<\/strong><br \/>Phishing is the activity in which \u2018hackers\u2019 are trying to cheat the user into giving them their login info. For example, the user gets an email saying their Netflix account will be retired unless they login immediately and provide their credit card info. The link in the email will not send the user to Netflix, but to another domain entirely. <em>This is also why proper security and encryption is so important. A legit, but unsecure, website can also be tricked into asking for this information.<\/em> Once the user enters the credit card info and his password, the data is compromised. The tricky part is, that this technique does not need a lot of effort to be set up and can be put to use pretty quickly. By sending the email to tens of thousands of people, only a few need to respond to plausibly making it a lucrative venture. Also, these attacks are getting more and more sophisticated by making the login-pages near-identical copies as well as also using \u2018real\u2019 links to the website in their e-mail to give it the veneer of legitimacy.<\/p>\n<p>High-profile people (celebrities, politicians, etc) might also be targeted for so-called \u2018spear-fishing\u2019, which is a directed attack at a specific person because they can access valuable data. An example of this is the hack into the Democratic Party in the U.S. in 2016.<\/p>\n<p><strong>Social engineering<\/strong><br \/>Everyone knows the standard security questions that used to be (in some cases, still) asked to verify an account. \u2018What was your mother\u2019s maiden name?\u2019, \u2018What\u2019s the name of your city of birth?\u2019, and so on. These questions were asked in a simpler time, when people did not foresee handing most of their private information over to social media. The unfortunate thing is that while people might forget, computers hardly ever do so. So every post, every scrap of information often is relatively easy to find. Making these \u2018hard-to-know\u2019 questions, not so hard to guess. Once the password is reset on e.g. your e-mail address, the \u2018hacker\u2019 can now proceed to modify most passwords of accounts associated with that specific email address.<\/p>\n<p>Social engineering is probably the most used technique in situations where someone wants to target you specifically. For example because you have an<strong><a href=\"https:\/\/medium.com\/@N\/how-i-lost-my-50-000-twitter-username-24eb09e026dd\"> interesting twitter handle<\/a><\/strong>.<\/p>\n<p>The main issue is that people will always try to help someone with a good story, which makes the security protocol as strong as the weakest link. In other words, a human factor will always weaken security systems. This is not in itself a \u2018bad thing\u2019, but it should be accounted for.<\/p>\n<p>The risk with some of these attack vectors is that they\u2019re easy to direct at thousands of people at the same time. This makes it a low-risk investment in time and effort coupled with a potentially high reward, even when only a tiny percentage of people fall for it.<\/p>\n<p><strong>Stolen data<\/strong><br \/>Even when someone has all of the necessary preventions and security in place, this does not mean that your data is safe with other companies. Hacks, inadvertent releases of data and breaches have been widely reported over the past few years. One of the biggest ones yet was the credit company <strong><a href=\"https:\/\/techcrunch.com\/2017\/09\/10\/unsecurity\/\">\u2018Equifax\u2019 last year<\/a><\/strong>\u00a0, with over 250 million records being published. Another one was that Uber paid a hefty sum to cover up a breach of 50 million records of drivers and passengers. The scope and size of these data-sets are very big.<\/p>\n<p>The scary bit is that in the case of Equifax a critical part of their infrastructure was left unpatched when a weakness was discovered. Meaning that the \u2018hackers\u2019 did not have to perform any elaborate hacks, they just exploited a known weakness and ended up with a quarter of a billion records of financial information. Showing that performing regular updates is every bit as important as is usually stated.<\/p>\n<p><strong>Tips to prevent this from happening<\/strong><br \/>Knowing all this, what can anyone do to minimize the damage?<\/p>\n<ul>\n<li>Stay alert \u2013 Be on the lookout for potential issues, be aware of data being stored elsewhere and know where to turn if things go south. Check from time to time whether your account information is still safe: <strong><a href=\"https:\/\/haveibeenpowned.com\">https:\/\/haveibeenpowned.com<\/a><\/strong><\/li>\n<li>Use a password manager \u2013 One of the biggest risks is to use a similar password for multiple services. Using a password manager helps by:\n<ul>\n<li>Generating secure passwords<\/li>\n<li>Remembering every password for every separate website<\/li>\n<li>Reminding you that a password has not been changed in a while<\/li>\n<\/ul>\n<\/li>\n<li>Enable 2-factor authentication \u2013 Most services offer the ability to enable 2-factor authentication. Do so immediately, it enables a second barrier that most malicious entities do not know how to best. Whether it\u2019s a code by text or a token generated from one specific device (this is the best option).<\/li>\n<\/ul>\n<p>In conclusion, these three (relatively) simple options will protect most people from harm. Of course, there are some caveats. Hacks will still keep happening; these steps will not protect in all cases. However, they will prevent a very significant percentage of attacks. This is better than not having any additional protection at all. Also, creating a habit will take time now, but save time in the long run. Keep that in mind, as well as the added security.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Data and account security are among the most overlooked potential risks in personal and company environments. While security in these fields is a necessary no-brainer, most people tend to follow a \u2018do as I say, not as I do\u2019 way of thinking. This is due to the thought that it won\u2019t happen to them. The [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":1540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[169,191],"tags":[],"class_list":["post-1537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect your (and your company\u2019s) data in an increasingly connected world - The Next Organization<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thenextorganization.com\/en\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your (and your company\u2019s) data in an increasingly connected world - The Next Organization\" \/>\n<meta property=\"og:description\" content=\"Data and account security are among the most overlooked potential risks in personal and company environments. While security in these fields is a necessary no-brainer, most people tend to follow a \u2018do as I say, not as I do\u2019 way of thinking. This is due to the thought that it won\u2019t happen to them. The [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thenextorganization.com\/en\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/\" \/>\n<meta property=\"og:site_name\" content=\"The Next Organization\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheNextOrganization\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-27T13:14:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-10T12:21:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/02\/keys-shelf-keychain-lock-615350.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Charles Klijnman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TNXTOTweets\" \/>\n<meta name=\"twitter:site\" content=\"@TNXTOTweets\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charles Klijnman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/\"},\"author\":{\"name\":\"Charles Klijnman\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#\\\/schema\\\/person\\\/d7e269df9d4193eb1045a69f7b459dbc\"},\"headline\":\"How to protect your (and your company\u2019s) data in an increasingly connected world\",\"datePublished\":\"2018-02-27T13:14:12+00:00\",\"dateModified\":\"2020-04-10T12:21:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/\"},\"wordCount\":1314,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thenextorganization.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/keys-shelf-keychain-lock-615350.jpeg\",\"articleSection\":[\"Artikelen\",\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/\",\"url\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/\",\"name\":\"How to protect your (and your company\u2019s) data in an increasingly connected world - The Next Organization\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thenextorganization.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/keys-shelf-keychain-lock-615350.jpeg\",\"datePublished\":\"2018-02-27T13:14:12+00:00\",\"dateModified\":\"2020-04-10T12:21:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thenextorganization.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/keys-shelf-keychain-lock-615350.jpeg\",\"contentUrl\":\"https:\\\/\\\/thenextorganization.com\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/keys-shelf-keychain-lock-615350.jpeg\",\"width\":2048,\"height\":1356},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/thenextorganization.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your (and your company\u2019s) data in an increasingly connected world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#website\",\"url\":\"https:\\\/\\\/thenextorganization.com\\\/\",\"name\":\"The Next Organization\",\"description\":\"Sustainable growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/thenextorganization.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#organization\",\"name\":\"The Next Organization\",\"url\":\"https:\\\/\\\/thenextorganization.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thenextorganization.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/tnxto-wit.png\",\"contentUrl\":\"https:\\\/\\\/thenextorganization.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/tnxto-wit.png\",\"width\":316,\"height\":79,\"caption\":\"The Next Organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/TheNextOrganization\",\"https:\\\/\\\/x.com\\\/TNXTOTweets\",\"https:\\\/\\\/www.instagram.com\\\/thenextorganization\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/2286332\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCE7xYCfwSniZmPygO-qoKYg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/thenextorganization.com\\\/#\\\/schema\\\/person\\\/d7e269df9d4193eb1045a69f7b459dbc\",\"name\":\"Charles Klijnman\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your (and your company's) data in an increasingly connected world - The Next Organization","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thenextorganization.com\/en\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/","og_locale":"en_GB","og_type":"article","og_title":"How to protect your (and your company\u2019s) data in an increasingly connected world - The Next Organization","og_description":"Data and account security are among the most overlooked potential risks in personal and company environments. While security in these fields is a necessary no-brainer, most people tend to follow a \u2018do as I say, not as I do\u2019 way of thinking. This is due to the thought that it won\u2019t happen to them. The [&hellip;]","og_url":"https:\/\/thenextorganization.com\/en\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/","og_site_name":"The Next Organization","article_publisher":"https:\/\/www.facebook.com\/TheNextOrganization","article_published_time":"2018-02-27T13:14:12+00:00","article_modified_time":"2020-04-10T12:21:57+00:00","og_image":[{"width":2048,"height":1356,"url":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/02\/keys-shelf-keychain-lock-615350.jpeg","type":"image\/jpeg"}],"author":"Charles Klijnman","twitter_card":"summary_large_image","twitter_creator":"@TNXTOTweets","twitter_site":"@TNXTOTweets","twitter_misc":{"Written by":"Charles Klijnman","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#article","isPartOf":{"@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/"},"author":{"name":"Charles Klijnman","@id":"https:\/\/thenextorganization.com\/#\/schema\/person\/d7e269df9d4193eb1045a69f7b459dbc"},"headline":"How to protect your (and your company\u2019s) data in an increasingly connected world","datePublished":"2018-02-27T13:14:12+00:00","dateModified":"2020-04-10T12:21:57+00:00","mainEntityOfPage":{"@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/"},"wordCount":1314,"commentCount":0,"publisher":{"@id":"https:\/\/thenextorganization.com\/#organization"},"image":{"@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/02\/keys-shelf-keychain-lock-615350.jpeg","articleSection":["Artikelen","Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/","url":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/","name":"How to protect your (and your company's) data in an increasingly connected world - The Next Organization","isPartOf":{"@id":"https:\/\/thenextorganization.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#primaryimage"},"image":{"@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#primaryimage"},"thumbnailUrl":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/02\/keys-shelf-keychain-lock-615350.jpeg","datePublished":"2018-02-27T13:14:12+00:00","dateModified":"2020-04-10T12:21:57+00:00","breadcrumb":{"@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#primaryimage","url":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/02\/keys-shelf-keychain-lock-615350.jpeg","contentUrl":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/02\/keys-shelf-keychain-lock-615350.jpeg","width":2048,"height":1356},{"@type":"BreadcrumbList","@id":"https:\/\/thenextorganization.com\/how-to-protect-your-and-your-companys-data-in-an-increasingly-connected-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thenextorganization.com\/"},{"@type":"ListItem","position":2,"name":"How to protect your (and your company\u2019s) data in an increasingly connected world"}]},{"@type":"WebSite","@id":"https:\/\/thenextorganization.com\/#website","url":"https:\/\/thenextorganization.com\/","name":"The Next Organization","description":"Sustainable growth","publisher":{"@id":"https:\/\/thenextorganization.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thenextorganization.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/thenextorganization.com\/#organization","name":"The Next Organization","url":"https:\/\/thenextorganization.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/thenextorganization.com\/#\/schema\/logo\/image\/","url":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/11\/tnxto-wit.png","contentUrl":"https:\/\/thenextorganization.com\/wp-content\/uploads\/2018\/11\/tnxto-wit.png","width":316,"height":79,"caption":"The Next Organization"},"image":{"@id":"https:\/\/thenextorganization.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheNextOrganization","https:\/\/x.com\/TNXTOTweets","https:\/\/www.instagram.com\/thenextorganization\/","https:\/\/www.linkedin.com\/company\/2286332","https:\/\/www.youtube.com\/channel\/UCE7xYCfwSniZmPygO-qoKYg"]},{"@type":"Person","@id":"https:\/\/thenextorganization.com\/#\/schema\/person\/d7e269df9d4193eb1045a69f7b459dbc","name":"Charles Klijnman"}]}},"_links":{"self":[{"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/posts\/1537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/comments?post=1537"}],"version-history":[{"count":4,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/posts\/1537\/revisions"}],"predecessor-version":[{"id":11507,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/posts\/1537\/revisions\/11507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/media\/1540"}],"wp:attachment":[{"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/media?parent=1537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/categories?post=1537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thenextorganization.com\/en\/wp-json\/wp\/v2\/tags?post=1537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}