<\/path><\/svg><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"As a business traveler, you\u2019re constantly on the move, attending meetings, and closing deals. But have you considered the cybersecurity risks you face while traveling? In a world where cyber threats are becoming increasingly sophisticated, it\u2019s essential to take precautions to safeguard your sensitive data and devices. In this article, we\u2019ll explore various aspects of […]<\/p>\n","protected":false},"author":2,"featured_media":4325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[125],"uagb_featured_image_src":{"full":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers.jpg",1200,600,false],"thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-150x150.jpg",150,150,true],"medium":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-300x150.jpg",300,150,true],"medium_large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-768x384.jpg",768,384,true],"large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-1024x512.jpg",1024,512,true],"1536x1536":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers.jpg",1200,600,false],"2048x2048":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers.jpg",1200,600,false],"woocommerce_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-300x300.jpg",300,300,true],"woocommerce_single":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-600x300.jpg",600,300,true],"woocommerce_gallery_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2023\/12\/Cybersecurity-for-Business-Travelers-100x100.jpg",100,100,true]},"uagb_author_info":{"display_name":"John Iannarelli","author_link":"https:\/\/fbijohn.com\/author\/john-i\/"},"uagb_comment_info":0,"uagb_excerpt":"As a business traveler, you\u2019re constantly on the move, attending meetings, and closing deals. But have you considered the cybersecurity risks you face while traveling? In a world where cyber threats are becoming increasingly sophisticated, it\u2019s essential to take precautions to safeguard your sensitive data and devices. In this article, we\u2019ll explore various aspects of…","_links":{"self":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/4314"}],"collection":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/comments?post=4314"}],"version-history":[{"count":8,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/4314\/revisions"}],"predecessor-version":[{"id":4557,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/4314\/revisions\/4557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media\/4325"}],"wp:attachment":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media?parent=4314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/categories?post=4314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/tags?post=4314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}