{"id":4241,"date":"2015-12-30T03:17:33","date_gmt":"2015-12-30T07:17:33","guid":{"rendered":"http:\/\/www.mccordweb.com\/weblogs\/?p=4241"},"modified":"2015-12-27T20:19:46","modified_gmt":"2015-12-28T00:19:46","slug":"hacking-explained-why-you-are-targeted-2","status":"publish","type":"post","link":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/","title":{"rendered":"Hacking Explained \u2013 Why You Are Targeted"},"content":{"rendered":"<figure id=\"attachment_4044\" aria-describedby=\"caption-attachment-4044\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs.jpg\" rel=\"attachment wp-att-4044\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4044\" src=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg\" alt=\"You can recover from a hack.\" width=\"300\" height=\"219\" srcset=\"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg 300w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-200x146.jpg 200w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs.jpg 406w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-4044\" class=\"wp-caption-text\">You can recover from a hack.<\/figcaption><\/figure>\n<p>It\u2019s the worst case scenario, you get a note from Google saying it looks like you\u2019ve been hacked. Your website now has a tag on Google that says \u201cthis site has been hacked\u201d, your traffic has plummeted and sales are way off. Why you!<\/p>\n<p>Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack.<\/p>\n<p>The hackers know that you are doing something right and have Google\u2019s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google.<\/p>\n<p>Try to just delete the folder and you\u2019re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have.<\/p>\n<p>The only way to solve this type of problem is by brute force. You\u2019ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back.<\/p>\n<p>When you do, make sure you are hardening your security, updating passwords and deleting files you don\u2019t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s the worst case scenario, you get a note from Google saying it looks like you\u2019ve been hacked. Your website now has a tag on Google that says \u201cthis site has been hacked\u201d, your traffic has plummeted and sales are way off. Why you! Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google\u2019s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google. Try to just delete the folder and you\u2019re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have. The only way to solve this type of problem is by brute force. You\u2019ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back. When you do, make sure you are hardening your security, updating passwords and deleting files you don\u2019t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[428,17],"tags":[475,198],"class_list":["post-4241","post","type-post","status-publish","format-standard","hentry","category-reputation-management","category-search-engine-optimization","tag-hacking","tag-seo"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking Explained \u2013 Why You Are Targeted | The Web Authority<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Explained \u2013 Why You Are Targeted | The Web Authority\" \/>\n<meta property=\"og:description\" content=\"It\u2019s the worst case scenario, you get a note from Google saying it looks like you\u2019ve been hacked. Your website now has a tag on Google that says \u201cthis site has been hacked\u201d, your traffic has plummeted and sales are way off. Why you! Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google\u2019s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google. Try to just delete the folder and you\u2019re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have. The only way to solve this type of problem is by brute force. You\u2019ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back. When you do, make sure you are hardening your security, updating passwords and deleting files you don\u2019t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/\" \/>\n<meta property=\"og:site_name\" content=\"The Web Authority\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mccordweb\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-30T07:17:33+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg\" \/>\n<meta name=\"author\" content=\"Nancy McCord\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:site\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy McCord\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/\"},\"author\":{\"name\":\"Nancy McCord\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\"},\"headline\":\"Hacking Explained \u2013 Why You Are Targeted\",\"datePublished\":\"2015-12-30T07:17:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/\"},\"wordCount\":355,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Depositphotos_33463811_xs-300x219.jpg\",\"keywords\":[\"Hacking\",\"SEO\"],\"articleSection\":[\"Reputation Management\",\"Search Engine Optimization\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/\",\"name\":\"Hacking Explained \u2013 Why You Are Targeted | The Web Authority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Depositphotos_33463811_xs-300x219.jpg\",\"datePublished\":\"2015-12-30T07:17:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Depositphotos_33463811_xs-300x219.jpg\",\"contentUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2015\\\/05\\\/Depositphotos_33463811_xs-300x219.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2015\\\/12\\\/30\\\/hacking-explained-why-you-are-targeted-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking Explained \u2013 Why You Are Targeted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"name\":\"The Web Authority | McCord Web Services News\\\/Blog\",\"description\":\"Smart Digital Marketing, Real Business Results - McCord Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\",\"name\":\"McCord Web Services LLC\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"width\":450,\"height\":203,\"caption\":\"McCord Web Services LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mccordweb\",\"https:\\\/\\\/x.com\\\/mccordweb\",\"https:\\\/\\\/www.instagram.com\\\/nancy_mccord\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nancymccord\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/mccordweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\",\"name\":\"Nancy McCord\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"caption\":\"Nancy McCord\"},\"sameAs\":[\"http:\\\/\\\/www.mccordweb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking Explained \u2013 Why You Are Targeted | The Web Authority","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Explained \u2013 Why You Are Targeted | The Web Authority","og_description":"It\u2019s the worst case scenario, you get a note from Google saying it looks like you\u2019ve been hacked. Your website now has a tag on Google that says \u201cthis site has been hacked\u201d, your traffic has plummeted and sales are way off. Why you! Not all hacking is about stealing credit card information. Sometimes a hack is about stealing your traffic and your SEO juice. Only sites that are well-placed and popular are targeted for this type of hack. The hackers know that you are doing something right and have Google\u2019s attention and they want a piece of that action for their own benefit. What hackers will typically do in this case is to sneak in via WordPress and then move directly into your website, installing snippets of code that create folders on your server and a brand new XML site map full of spammy links pointing to websites that they are wanting to improve the placement on with Google. Try to just delete the folder and you\u2019re fine, think again. These scripts are propagating. Delete a folder and it will be back tomorrow in a new location with a new name. Plus the hackers will be logging in to add more junk and update their benefiting site list. It is all done to bleed off your traffic and steal the SEO juice you have. The only way to solve this type of problem is by brute force. You\u2019ll need to take everything down, wipe it clean and then reload only clean files plus a full new fresh update of all WordPress files. You may even have to clean your WordPress database and manually review each and every website page you put back. When you do, make sure you are hardening your security, updating passwords and deleting files you don\u2019t need where code may be hiding. These are smart, tricky, and unscrupulous people. They are not targeting you but for any other reason that your website is well-placed and popular.","og_url":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/","og_site_name":"The Web Authority","article_publisher":"https:\/\/www.facebook.com\/mccordweb","article_published_time":"2015-12-30T07:17:33+00:00","og_image":[{"url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg","type":"","width":"","height":""}],"author":"Nancy McCord","twitter_card":"summary_large_image","twitter_creator":"@mccordweb","twitter_site":"@mccordweb","twitter_misc":{"Written by":"Nancy McCord","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#article","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/"},"author":{"name":"Nancy McCord","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba"},"headline":"Hacking Explained \u2013 Why You Are Targeted","datePublished":"2015-12-30T07:17:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/"},"wordCount":355,"commentCount":0,"publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg","keywords":["Hacking","SEO"],"articleSection":["Reputation Management","Search Engine Optimization"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/","url":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/","name":"Hacking Explained \u2013 Why You Are Targeted | The Web Authority","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#primaryimage"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg","datePublished":"2015-12-30T07:17:33+00:00","breadcrumb":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#primaryimage","url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg","contentUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2015\/05\/Depositphotos_33463811_xs-300x219.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mccordweb.com\/weblogs\/2015\/12\/30\/hacking-explained-why-you-are-targeted-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mccordweb.com\/weblogs\/"},{"@type":"ListItem","position":2,"name":"Hacking Explained \u2013 Why You Are Targeted"}]},{"@type":"WebSite","@id":"https:\/\/www.mccordweb.com\/weblogs\/#website","url":"https:\/\/www.mccordweb.com\/weblogs\/","name":"The Web Authority | McCord Web Services News\/Blog","description":"Smart Digital Marketing, Real Business Results - McCord Web Services","publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mccordweb.com\/weblogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization","name":"McCord Web Services LLC","url":"https:\/\/www.mccordweb.com\/weblogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","contentUrl":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","width":450,"height":203,"caption":"McCord Web Services LLC"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mccordweb","https:\/\/x.com\/mccordweb","https:\/\/www.instagram.com\/nancy_mccord\/","https:\/\/www.linkedin.com\/in\/nancymccord","https:\/\/www.youtube.com\/user\/mccordweb"]},{"@type":"Person","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba","name":"Nancy McCord","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","caption":"Nancy McCord"},"sameAs":["http:\/\/www.mccordweb.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/comments?post=4241"}],"version-history":[{"count":1,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4241\/revisions"}],"predecessor-version":[{"id":4242,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4241\/revisions\/4242"}],"wp:attachment":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/media?parent=4241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/categories?post=4241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/tags?post=4241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}