{"id":3246,"date":"2022-03-18T17:02:03","date_gmt":"2022-03-18T14:02:03","guid":{"rendered":"https:\/\/kaluari.com\/blog\/?p=3246"},"modified":"2022-03-23T09:00:28","modified_gmt":"2022-03-23T06:00:28","slug":"7-cybersecurity-threats-in-the-hotel-industry","status":"publish","type":"post","link":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/","title":{"rendered":"7 Cybersecurity Threats in the Hotel Industry"},"content":{"rendered":"\n<h2 class=\"has-vivid-red-color has-text-color\" style=\"font-size:32px\">1. <strong>Introduction<\/strong><\/h2>\n\n\n\n<p>In general, all of the guest data that hotels have is stored on a long-term basis, meaning guests are potentially at risk before, during and well after their actual hotel stay. Therefore, as a business in the hospitality industry, you should be very proactive in understanding hotel cybersecurity and the risks you face.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color\" style=\"font-size:32px\">2. <strong>What the Hospitality Industry Has That Hackers Want<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img src=\"https:\/\/kaluari.com\/blog\/wp-content\/uploads\/2022\/03\/hotel-booking-reservation-travel-reception-concept_53876-124416.jpg\" alt=\"Hotel booking reservation travel reception concept Free Photo\"\/><\/figure><\/div>\n\n\n\n<p>Hotels are data treasure troves, storing millions of travelers\u2019 personal information. Consequently, they are overflowing with data that hackers desperately want, making hotel cybersecurity one of the biggest concerns of the hospitality industry.&nbsp;<\/p>\n\n\n\n<p>Some of the sensitive and confidential data held in the hospitality industry include:<\/p>\n\n\n\n<ol type=\"1\"><li>First, credit card information of guests. <\/li><\/ol>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img src=\"https:\/\/kaluari.com\/blog\/wp-content\/uploads\/2022\/03\/credit-card-payment-buy-sell-products-service_1150-16368.jpg\" alt=\"Credit card payment, buy and sell products &amp; service Free Photo\"\/><\/figure><\/div>\n\n\n\n<p>In fact, the reliance of the industry on credit cards as a key form of payment makes it a rife target for cybercrime. Credit cards are used for online bookings, payments for food or drinks at the restaurant, treatments at the spa, etc. A common attack method has been to attack point of sale systems with malware that collects credit card information.<\/p>\n\n\n\n<p>2. Secondly, the names and addresses of guests or potential customers.<\/p>\n\n\n\n<p>3. Thirdly, phone contacts of guests.<\/p>\n\n\n\n<p>4. And also email addresses.<\/p>\n\n\n\n<p>It is, therefore, no surprise that the hospitality industry is seemingly under attack from all angles. In the past few years, some of the industry\u2019s most well-known brands have been victims of cybercrime, therefore, as a hotelier, you must take hotel cybersecurity seriously.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color\" style=\"font-size:32px\">3. <strong>Hotel cybersecurity threats <\/strong><\/h2>\n\n\n\n<p>In the past, we have seen many hotels become victims of cyber attackers. Such incidents have led to serious data breaches (e.g., credit card data, identity card numbers, social security numbers, loss of data, customer names, dates of birth, address) and hurt the reputation of the hotel.<\/p>\n\n\n\n<p>Here are some cybersecurity threats that target businesses in the hospitality industry:<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color\">i. <strong>Customer data\/identity theft<\/strong><\/h4>\n\n\n\n<p>First and foremost, a hacker wants to steal the data you collect about your potential clients and\/or hotel guests. For instance, name, address, date of birth and payment information such as credit card details. To do this, they will attempt to use <a href=\"https:\/\/www.mailsafi.com\/glossary\/malware\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a>, computer <a href=\"https:\/\/www.mailsafi.com\/glossary\/virus\" target=\"_blank\" rel=\"noreferrer noopener\">viruses<\/a> and\/or <a href=\"https:\/\/www.mailsafi.com\/glossary\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img src=\"https:\/\/kaluari.com\/blog\/wp-content\/uploads\/2022\/03\/hooded-computer-hacker-stealing-information-with-laptop_155003-10560.jpg\" alt=\"Hooded computer hacker stealing information with laptop Free Photo\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color\">ii. <strong>Phishing attacks<\/strong><\/h3>\n\n\n\n<p>A second threat is <a href=\"https:\/\/www.mailsafi.com\/glossary\/phishing\" target=\"_blank\" rel=\"noreferrer noopener\">phishing <\/a>attacks. Phishing is one of the most widespread and malicious attacks today. It refers to trying to gather personal information using deceptive emails and malicious websites. <a href=\"http:\/\/What is phishing? Phishing (pronounced fishing) is trying to gather personal information using deceptive emails and websites.  Phishing is one of the oldest types of cyberattacks dating back to the 1990s. It is also still one of the most widespread and malicious att\" target=\"_blank\" rel=\"noreferrer noopener\">Read more about phishing attacks and the types of phishing here<\/a>.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color\">iii. <strong>Dark Hotel Hacking <\/strong><\/h4>\n\n\n\n<p>Dark Hotel hacking refers to using hotel WiFi to target guests. Hackers target security vulnerabilities in hotel WiFi to steal users\u2019 (guests, staff) passwords and data. They can do this by tricking guests to download malicious software onto their devices or computers. An insecure WiFi could be used to gain unauthorized access to guests\u2019 mobile phones, tablets as well as laptops. Also, personal information could be leaked from hotel servers and databases if they\u2019re not adequately secured.<\/p>\n\n\n\n<h4><strong>Scenario<\/strong><\/h4>\n\n\n\n<ol type=\"1\"><li>First, as a hotel guest (or staff), you try to get online using the hotel\u2019s WiFi network.<\/li><li>Then, you see a pop-up to update software and you click on it without giving it much thought.<\/li><li>Unbeknownst to you, your computer is compromised because when you click to download the \u201csoftware update\u201d, malicious software is installed on your computer. This software may be designed to steal your information (payment card information) or damage your computer.<\/li><\/ol>\n\n\n\n<p>As a hotel, it is crucial that you secure your network to protect the online activity of your guests and staff and ensure your client\u2019s payment card information is safe.<\/p>\n\n\n\n<p><strong>Related article on the <a href=\"https:\/\/mailsafi.com\/blog\/risks-of-public-wifi-and-how-to-stay-safe\/\">risks of public WiFi<\/a><\/strong><\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color\">iv. <strong>Ransomware<\/strong><\/h4>\n\n\n\n<p>Another hotel cybersecurity risk is ransomware. Ransomware poses a real threat to many businesses and those in the hotel industry are no exemption. If you are hit, the attacker may demand a large sum of money to restore your data or computer system. Many businesses hit by ransomware have failed to recover their data. Hotels that have fallen victim to this cybercrime have in the past lost thousands of dollars in a bid to recover their systems or data.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color\">v. <strong>Distributed Denial of Service (DDoS) Attack<\/strong><\/h4>\n\n\n\n<p>Distributed Denial of Service (DDoS) attacks are a hack of choice for those looking to target the wide array of systems that hotels use. Every day-use IoT systems such as CCTVs, sprinkler systems, lighting are vulnerable to attack. A hacker gaining access to these systems can use them to cause havoc in your hotel.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color\">vi. <strong>Point of Sale (POS) attacks<\/strong><\/h4>\n\n\n\n<p>POS attacks are perhaps the most dangerous threats in the hospitality industry. A hacker will attack your hotel\u2019s point-of-sale system and either cause it to crash, access client confidential data (such as names, credit card information, addresses, etc.) or use it to defraud your clients or potential clients. This is automatically bad press for your hotel.<\/p>\n\n\n\n<h4 class=\"has-vivid-red-color has-text-color\">vii. <strong>The risk of USBs\/flash drives<\/strong><\/h4>\n\n\n\n<p>Equally high risk are USB\/flash drives. With only little social engineering, it doesn\u2019t take a serious hacker to install a computer virus or malware in a hotel.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img src=\"https:\/\/kaluari.com\/blog\/wp-content\/uploads\/2022\/03\/pendrive-isolated-white_1368-6389.jpg\" alt=\"Pendrive isolated on white Free Photo\"\/><\/figure><\/div>\n\n\n\n<p class=\"has-black-color has-text-color\"><strong>Scenario<\/strong>:<\/p>\n\n\n\n<ol type=\"1\"><li>Your valued<em> guest strolls over to your front desk reception with a flash drive in his pocket. He stops, smiles at your receptionist and slaps his USB device on the counter. He politely asks the guest services agent to print a document for him. Your agent attempts to redirect him to the business center. He claims that he tried it the previous night and couldn&#8217;t get it to work. <\/em><\/li><li>Then, e<em>ager to please, the front desk staff takes the flash drive to the back, pops it into a USB port, and joyfully opens the file. Unfortunately, the simple act of double-clicking on a file may have inadvertently also caused them to install malicious software onto this computer. You print the document without noticing anything is amiss and hand the drive back to your guest. Score, 10 points for customer service!<\/em><\/li><li>Unfortunately, this noble gesture also marks the beginning of infiltration of your hotel systems and network. The malicious software may be a keylogger or it may be designed to replicate and cross over to other systems on the network, including your point of sale system.  <em> <\/em><\/li><\/ol>\n\n\n\n<p>Now that you have an appreciation of hotel cybersecurity threats, please check out our <a href=\"https:\/\/kaluari.com\/blog\/13-steps-to-protect-your-hotel-from-cybersecurity-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog on steps you can take to protect your hotel<\/a> from becoming a victim of these threats.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/kaluari.com\/contact\" target=\"_blank\" rel=\"noreferrer noopener\">Get in touch with us<\/a> to schedule <a href=\"https:\/\/kaluari.com\/cyber-security-awareness\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity awareness training<\/a> for your staff, for gateway and endpoint security solutions (best-in-class firewall and antivirus solutions), <a href=\"https:\/\/kaluari.com\/cloud-email-hosting-email-security-and-email-archiving\" target=\"_blank\" rel=\"noreferrer noopener\">email hosting and email security<\/a> solutions, including <a href=\"https:\/\/www.microsoft.com\/en-ww\/microsoft-365\/business\/compare-all-microsoft-365-business-products\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365<\/a> at competitive rates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Introduction In general, all of the guest data that hotels have is stored on a long-term basis, meaning guests are potentially at risk before, during and well after their actual hotel stay. Therefore, as a business in the hospitality industry, you should be very proactive in understanding hotel cybersecurity and the risks you face. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3256,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[283,285,284,2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hotel Cybersecurity: Threats You Must Know | Kaluari<\/title>\n<meta name=\"description\" content=\"\u00a0Hotels are overflowing with information that hackers want, making hotel cybersecurity one of the biggest concerns of the industry.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hotel Cybersecurity: Threats You Must Know | Kaluari\" \/>\n<meta property=\"og:description\" content=\"\u00a0Hotels are overflowing with information that hackers want, making hotel cybersecurity one of the biggest concerns of the industry.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Kaluari Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-18T14:02:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-23T06:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kaluari.com\/blog\/wp-content\/uploads\/2022\/03\/hotel-cybersecurity-kaluari-2.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/kaluari.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"7 Cybersecurity Threats in the Hotel Industry\",\"datePublished\":\"2022-03-18T14:02:03+00:00\",\"dateModified\":\"2022-03-23T06:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\"},\"wordCount\":1099,\"publisher\":{\"@id\":\"https:\/\/kaluari.com\/blog\/#organization\"},\"articleSection\":[\"Cloud backup and Disaster recovery\",\"Cybersecurity awareness\",\"Email hosting, email security and archiving\",\"Endpoint Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\",\"url\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\",\"name\":\"Hotel Cybersecurity: Threats You Must Know | Kaluari\",\"isPartOf\":{\"@id\":\"https:\/\/kaluari.com\/blog\/#website\"},\"datePublished\":\"2022-03-18T14:02:03+00:00\",\"dateModified\":\"2022-03-23T06:00:28+00:00\",\"description\":\"\u00a0Hotels are overflowing with information that hackers want, making hotel cybersecurity one of the biggest concerns of the industry.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kaluari.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Cybersecurity Threats in the Hotel Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kaluari.com\/blog\/#website\",\"url\":\"https:\/\/kaluari.com\/blog\/\",\"name\":\"Kaluari Blog\",\"description\":\"Leading-edge Business Solutions\",\"publisher\":{\"@id\":\"https:\/\/kaluari.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kaluari.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kaluari.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/kaluari.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kaluari.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/kaluari.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/feed\/\",\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/twitter.com\/msgafricaltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kaluari.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kaluari.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hotel Cybersecurity: Threats You Must Know | Kaluari","description":"\u00a0Hotels are overflowing with information that hackers want, making hotel cybersecurity one of the biggest concerns of the industry.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/","og_locale":"en_US","og_type":"article","og_title":"Hotel Cybersecurity: Threats You Must Know | Kaluari","og_description":"\u00a0Hotels are overflowing with information that hackers want, making hotel cybersecurity one of the biggest concerns of the industry.\u00a0","og_url":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/","og_site_name":"Kaluari Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2022-03-18T14:02:03+00:00","article_modified_time":"2022-03-23T06:00:28+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/kaluari.com\/blog\/wp-content\/uploads\/2022\/03\/hotel-cybersecurity-kaluari-2.webp","type":"image\/webp"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/#article","isPartOf":{"@id":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/"},"author":{"name":"the_leaders","@id":"https:\/\/kaluari.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"7 Cybersecurity Threats in the Hotel Industry","datePublished":"2022-03-18T14:02:03+00:00","dateModified":"2022-03-23T06:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/"},"wordCount":1099,"publisher":{"@id":"https:\/\/kaluari.com\/blog\/#organization"},"articleSection":["Cloud backup and Disaster recovery","Cybersecurity awareness","Email hosting, email security and archiving","Endpoint Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/","url":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/","name":"Hotel Cybersecurity: Threats You Must Know | Kaluari","isPartOf":{"@id":"https:\/\/kaluari.com\/blog\/#website"},"datePublished":"2022-03-18T14:02:03+00:00","dateModified":"2022-03-23T06:00:28+00:00","description":"\u00a0Hotels are overflowing with information that hackers want, making hotel cybersecurity one of the biggest concerns of the industry.\u00a0","breadcrumb":{"@id":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kaluari.com\/blog\/7-cybersecurity-threats-in-the-hotel-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kaluari.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Cybersecurity Threats in the Hotel Industry"}]},{"@type":"WebSite","@id":"https:\/\/kaluari.com\/blog\/#website","url":"https:\/\/kaluari.com\/blog\/","name":"Kaluari Blog","description":"Leading-edge Business Solutions","publisher":{"@id":"https:\/\/kaluari.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kaluari.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kaluari.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/kaluari.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kaluari.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/kaluari.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/feed\/","https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/twitter.com\/msgafricaltd"]},{"@type":"Person","@id":"https:\/\/kaluari.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kaluari.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/posts\/3246"}],"collection":[{"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/comments?post=3246"}],"version-history":[{"count":17,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/posts\/3246\/revisions"}],"predecessor-version":[{"id":3296,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/posts\/3246\/revisions\/3296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/media\/3256"}],"wp:attachment":[{"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/media?parent=3246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/categories?post=3246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaluari.com\/blog\/wp-json\/wp\/v2\/tags?post=3246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}