{"id":3944,"date":"2015-01-26T03:13:02","date_gmt":"2015-01-26T07:13:02","guid":{"rendered":"http:\/\/www.mccordweb.com\/weblogs\/?p=3944"},"modified":"2015-01-23T21:24:58","modified_gmt":"2015-01-24T01:24:58","slug":"hacking-explained-why-you-are-targeted","status":"publish","type":"post","link":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/","title":{"rendered":"Hacking Explained &#8211; Why You Are Targeted"},"content":{"rendered":"<figure id=\"attachment_3945\" aria-describedby=\"caption-attachment-3945\" style=\"width: 200px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3945\" src=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg\" alt=\"Hands with red frame reaches out from big heap of crumpled papers\" width=\"200\" height=\"298\" srcset=\"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg 200w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s.jpg 579w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><figcaption id=\"caption-attachment-3945\" class=\"wp-caption-text\">You may need help from professionals to remediate a hack attack.<\/figcaption><\/figure>\n<p>It&#8217;s the worst case scenario, you get a note from Google saying it looks like you&#8217;ve been hacked. Your website now has a tag on Google that says &#8220;this site has been hacked&#8221;, your traffic has plummeted and sales are way off. Why you!<\/p>\n<p>Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google&#8217;s attention and they want a piece of that action for their own benefit.<\/p>\n<p>What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google.<\/p>\n<p>Try to just delete the folder and you&#8217;re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have.<\/p>\n<p>The only way to solve this type of problem is by brute force. You&#8217;ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back.<\/p>\n<p>When you do, make sure you are hardening your security, updating passwords and deleting files you don&#8217;t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s the worst case scenario, you get a note from Google saying it looks like you&#8217;ve been hacked. Your website now has a tag on Google that says &#8220;this site has been hacked&#8221;, your traffic has plummeted and sales are way off. Why you! Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google&#8217;s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google. Try to just delete the folder and you&#8217;re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have. The only way to solve this type of problem is by brute force. You&#8217;ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back. When you do, make sure you are hardening your security, updating passwords and deleting files you don&#8217;t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[172,29],"tags":[177,181],"class_list":["post-3944","post","type-post","status-publish","format-standard","hentry","category-blogging","category-bright-idea-tips","tag-blogs","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking Explained - Why You Are Targeted | The Web Authority<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Explained - Why You Are Targeted | The Web Authority\" \/>\n<meta property=\"og:description\" content=\"It&#8217;s the worst case scenario, you get a note from Google saying it looks like you&#8217;ve been hacked. Your website now has a tag on Google that says &#8220;this site has been hacked&#8221;, your traffic has plummeted and sales are way off. Why you! Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google&#8217;s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google. Try to just delete the folder and you&#8217;re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have. The only way to solve this type of problem is by brute force. You&#8217;ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back. When you do, make sure you are hardening your security, updating passwords and deleting files you don&#8217;t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/\" \/>\n<meta property=\"og:site_name\" content=\"The Web Authority\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mccordweb\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-26T07:13:02+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg\" \/>\n<meta name=\"author\" content=\"Nancy McCord\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:site\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy McCord\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/\"},\"author\":{\"name\":\"Nancy McCord\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\"},\"headline\":\"Hacking Explained &#8211; Why You Are Targeted\",\"datePublished\":\"2015-01-26T07:13:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/\"},\"wordCount\":355,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/Depositphotos_6072560_s-200x298.jpg\",\"keywords\":[\"Blogs\",\"Tips\"],\"articleSection\":[\"Blogs\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/\",\"name\":\"Hacking Explained - Why You Are Targeted | The Web Authority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/Depositphotos_6072560_s-200x298.jpg\",\"datePublished\":\"2015-01-26T07:13:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/Depositphotos_6072560_s-200x298.jpg\",\"contentUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/01\\\/Depositphotos_6072560_s-200x298.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/01\\\/26\\\/hacking-explained-why-you-are-targeted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking Explained &#8211; Why You Are Targeted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"name\":\"The Web Authority | McCord Web Services News\\\/Blog\",\"description\":\"Smart Digital Marketing, Real Business Results - McCord Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\",\"name\":\"McCord Web Services LLC\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"width\":450,\"height\":203,\"caption\":\"McCord Web Services LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mccordweb\",\"https:\\\/\\\/x.com\\\/mccordweb\",\"https:\\\/\\\/www.instagram.com\\\/nancy_mccord\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nancymccord\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/mccordweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\",\"name\":\"Nancy McCord\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"caption\":\"Nancy McCord\"},\"sameAs\":[\"http:\\\/\\\/www.mccordweb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Explained - Why You Are Targeted | The Web Authority","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Explained - Why You Are Targeted | The Web Authority","og_description":"It&#8217;s the worst case scenario, you get a note from Google saying it looks like you&#8217;ve been hacked. Your website now has a tag on Google that says &#8220;this site has been hacked&#8221;, your traffic has plummeted and sales are way off. Why you! Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google&#8217;s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google. Try to just delete the folder and you&#8217;re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have. The only way to solve this type of problem is by brute force. You&#8217;ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back. When you do, make sure you are hardening your security, updating passwords and deleting files you don&#8217;t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.","og_url":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/","og_site_name":"The Web Authority","article_publisher":"https:\/\/www.facebook.com\/mccordweb","article_published_time":"2015-01-26T07:13:02+00:00","og_image":[{"url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg","type":"","width":"","height":""}],"author":"Nancy McCord","twitter_card":"summary_large_image","twitter_creator":"@mccordweb","twitter_site":"@mccordweb","twitter_misc":{"Written by":"Nancy McCord","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#article","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/"},"author":{"name":"Nancy McCord","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba"},"headline":"Hacking Explained &#8211; Why You Are Targeted","datePublished":"2015-01-26T07:13:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/"},"wordCount":355,"commentCount":0,"publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg","keywords":["Blogs","Tips"],"articleSection":["Blogs","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/","url":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/","name":"Hacking Explained - Why You Are Targeted | The Web Authority","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#primaryimage"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg","datePublished":"2015-01-26T07:13:02+00:00","breadcrumb":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#primaryimage","url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg","contentUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/01\/Depositphotos_6072560_s-200x298.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/01\/26\/hacking-explained-why-you-are-targeted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mccordweb.com\/weblogs\/"},{"@type":"ListItem","position":2,"name":"Hacking Explained &#8211; Why You Are Targeted"}]},{"@type":"WebSite","@id":"https:\/\/www.mccordweb.com\/weblogs\/#website","url":"https:\/\/www.mccordweb.com\/weblogs\/","name":"The Web Authority | McCord Web Services News\/Blog","description":"Smart Digital Marketing, Real Business Results - McCord Web Services","publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mccordweb.com\/weblogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization","name":"McCord Web Services LLC","url":"https:\/\/www.mccordweb.com\/weblogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","contentUrl":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","width":450,"height":203,"caption":"McCord Web Services LLC"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mccordweb","https:\/\/x.com\/mccordweb","https:\/\/www.instagram.com\/nancy_mccord\/","https:\/\/www.linkedin.com\/in\/nancymccord","https:\/\/www.youtube.com\/user\/mccordweb"]},{"@type":"Person","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba","name":"Nancy McCord","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","caption":"Nancy McCord"},"sameAs":["http:\/\/www.mccordweb.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/3944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/comments?post=3944"}],"version-history":[{"count":1,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/3944\/revisions"}],"predecessor-version":[{"id":3946,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/3944\/revisions\/3946"}],"wp:attachment":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/media?parent=3944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/categories?post=3944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/tags?post=3944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}