{"id":4721,"date":"2017-07-24T02:33:10","date_gmt":"2017-07-24T06:33:10","guid":{"rendered":"http:\/\/www.mccordweb.com\/weblogs\/?p=4721"},"modified":"2017-07-21T14:46:52","modified_gmt":"2017-07-21T18:46:52","slug":"hackers-how-do-they-get-in","status":"publish","type":"post","link":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/","title":{"rendered":"Hackers: How Do They Get In?"},"content":{"rendered":"<figure id=\"attachment_4722\" aria-describedby=\"caption-attachment-4722\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4722\" src=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg\" alt=\"Hackers How Do They Get In?\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg 300w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-200x133.jpg 200w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs.jpg 425w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-4722\" class=\"wp-caption-text\">Hackers How Do They Get In?<\/figcaption><\/figure>\n<p>Hackers, how do they get in to \u00a0your website and hosting account? In today&#8217;s wild web, it just seems like sometimes you can&#8217;t keep hackers out!<\/p>\n<p>Here&#8217;s what happened recently to me. I set up a new hosting account at a quality hosting service (not GoDaddy). The same day I loaded the site files, the site was hacked. Files were loaded and links to malware installed in newly created pages that mirrored my own site pages but with a .shtml instead of .html.<\/p>\n<p>The host told me that all was secure and although the site was in a shared hosting environment that their network was not where the hack came in.<\/p>\n<p>The only thing that I can possibly think of that caused the problem for this non-WordPress site is I emailed the passwords to the client. What the client did with the logins, I do not know. I am not sure if he even tried to login, but doubt it.<\/p>\n<p>The host said that possibly a hacker got into the site via a field in the contact form, but there is a Captcha and tests for validity of information and on top of that no database connection for the form. I am mystified!<\/p>\n<p>What I do know is that sometimes you just do not know how hackers get in, could they tunnel in from the host? Could they intercept logins by email? Could they be trawling the web for new hosting set ups and attack them? Your guess is as good as mine.<\/p>\n<p>One thing I do know is that there is a new hack for WordPress websites that targets new hosting accounts where WordPress installation has not been completed. There are bots that are scanning the web for these new sites and coming in via WordPress setup files and taking control of hosting. Could this type of attack possibly be what I experienced? It is possible.<\/p>\n<p>What I do know if that prompt action to clean up, wipe the server, and change all passwords for hosting and FTP and also no longer emailing logins is our newest protocol.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers, how do they get in to \u00a0your website and hosting account? In today&#8217;s wild web, it just seems like sometimes you can&#8217;t keep hackers out! Here&#8217;s what happened recently to me. I set up a new hosting account at a quality hosting service (not GoDaddy). The same day I loaded the site files, the site was hacked. Files were loaded and links to malware installed in newly created pages that mirrored my own site pages but with a .shtml instead of .html. The host told me that all was secure and although the site was in a shared hosting environment that their network was not where the hack came in. The only thing that I can possibly think of that caused the problem for this non-WordPress site is I emailed the passwords to the client. What the client did with the logins, I do not know. I am not sure if he even tried to login, but doubt it. The host said that possibly a hacker got into the site via a field in the contact form, but there is a Captcha and tests for validity of information and on top of that no database connection for the form. I am mystified! What I do know is that sometimes you just do not know how hackers get in, could they tunnel in from the host? Could they intercept logins by email? Could they be trawling the web for new hosting set ups and attack them? Your guess is as good as mine. One thing I do know is that there is a new hack for WordPress websites that targets new hosting accounts where WordPress installation has not been completed. There are bots that are scanning the web for these new sites and coming in via WordPress setup files and taking control of hosting. Could this type of attack possibly be what I experienced? It is possible. What I do know if that prompt action to clean up, wipe the server, and change all passwords for hosting and FTP and also no longer emailing logins is our newest protocol. &nbsp;<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,530,499],"tags":[542,181,273,187],"class_list":["post-4721","post","type-post","status-publish","format-standard","hentry","category-web-design","category-web-hosting","category-wordpress-websites","tag-hacking-attacks","tag-tips","tag-websites","tag-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers: How Do They Get In? | The Web Authority<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers: How Do They Get In? | The Web Authority\" \/>\n<meta property=\"og:description\" content=\"Hackers, how do they get in to \u00a0your website and hosting account? In today&#8217;s wild web, it just seems like sometimes you can&#8217;t keep hackers out! Here&#8217;s what happened recently to me. I set up a new hosting account at a quality hosting service (not GoDaddy). The same day I loaded the site files, the site was hacked. Files were loaded and links to malware installed in newly created pages that mirrored my own site pages but with a .shtml instead of .html. The host told me that all was secure and although the site was in a shared hosting environment that their network was not where the hack came in. The only thing that I can possibly think of that caused the problem for this non-WordPress site is I emailed the passwords to the client. What the client did with the logins, I do not know. I am not sure if he even tried to login, but doubt it. The host said that possibly a hacker got into the site via a field in the contact form, but there is a Captcha and tests for validity of information and on top of that no database connection for the form. I am mystified! What I do know is that sometimes you just do not know how hackers get in, could they tunnel in from the host? Could they intercept logins by email? Could they be trawling the web for new hosting set ups and attack them? Your guess is as good as mine. One thing I do know is that there is a new hack for WordPress websites that targets new hosting accounts where WordPress installation has not been completed. There are bots that are scanning the web for these new sites and coming in via WordPress setup files and taking control of hosting. Could this type of attack possibly be what I experienced? It is possible. What I do know if that prompt action to clean up, wipe the server, and change all passwords for hosting and FTP and also no longer emailing logins is our newest protocol. &nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/\" \/>\n<meta property=\"og:site_name\" content=\"The Web Authority\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mccordweb\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-24T06:33:10+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg\" \/>\n<meta name=\"author\" content=\"Nancy McCord\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:site\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy McCord\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/\"},\"author\":{\"name\":\"Nancy McCord\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\"},\"headline\":\"Hackers: How Do They Get In?\",\"datePublished\":\"2017-07-24T06:33:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/\"},\"wordCount\":369,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/Depositphotos_2366759_xs-300x200.jpg\",\"keywords\":[\"Hacking Attacks\",\"Tips\",\"Websites\",\"WordPress\"],\"articleSection\":[\"Web Design\",\"Web Hosting\",\"WordPress Websites\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/\",\"name\":\"Hackers: How Do They Get In? | The Web Authority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/Depositphotos_2366759_xs-300x200.jpg\",\"datePublished\":\"2017-07-24T06:33:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/Depositphotos_2366759_xs-300x200.jpg\",\"contentUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/Depositphotos_2366759_xs-300x200.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2017\\\/07\\\/24\\\/hackers-how-do-they-get-in\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers: How Do They Get In?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"name\":\"The Web Authority | McCord Web Services News\\\/Blog\",\"description\":\"Smart Digital Marketing, Real Business Results - McCord Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\",\"name\":\"McCord Web Services LLC\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"width\":450,\"height\":203,\"caption\":\"McCord Web Services LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mccordweb\",\"https:\\\/\\\/x.com\\\/mccordweb\",\"https:\\\/\\\/www.instagram.com\\\/nancy_mccord\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nancymccord\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/mccordweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\",\"name\":\"Nancy McCord\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"caption\":\"Nancy McCord\"},\"sameAs\":[\"http:\\\/\\\/www.mccordweb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers: How Do They Get In? | The Web Authority","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/","og_locale":"en_US","og_type":"article","og_title":"Hackers: How Do They Get In? | The Web Authority","og_description":"Hackers, how do they get in to \u00a0your website and hosting account? In today&#8217;s wild web, it just seems like sometimes you can&#8217;t keep hackers out! Here&#8217;s what happened recently to me. I set up a new hosting account at a quality hosting service (not GoDaddy). The same day I loaded the site files, the site was hacked. Files were loaded and links to malware installed in newly created pages that mirrored my own site pages but with a .shtml instead of .html. The host told me that all was secure and although the site was in a shared hosting environment that their network was not where the hack came in. The only thing that I can possibly think of that caused the problem for this non-WordPress site is I emailed the passwords to the client. What the client did with the logins, I do not know. I am not sure if he even tried to login, but doubt it. The host said that possibly a hacker got into the site via a field in the contact form, but there is a Captcha and tests for validity of information and on top of that no database connection for the form. I am mystified! What I do know is that sometimes you just do not know how hackers get in, could they tunnel in from the host? Could they intercept logins by email? Could they be trawling the web for new hosting set ups and attack them? Your guess is as good as mine. One thing I do know is that there is a new hack for WordPress websites that targets new hosting accounts where WordPress installation has not been completed. There are bots that are scanning the web for these new sites and coming in via WordPress setup files and taking control of hosting. Could this type of attack possibly be what I experienced? It is possible. What I do know if that prompt action to clean up, wipe the server, and change all passwords for hosting and FTP and also no longer emailing logins is our newest protocol. &nbsp;","og_url":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/","og_site_name":"The Web Authority","article_publisher":"https:\/\/www.facebook.com\/mccordweb","article_published_time":"2017-07-24T06:33:10+00:00","og_image":[{"url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg","type":"","width":"","height":""}],"author":"Nancy McCord","twitter_card":"summary_large_image","twitter_creator":"@mccordweb","twitter_site":"@mccordweb","twitter_misc":{"Written by":"Nancy McCord","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#article","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/"},"author":{"name":"Nancy McCord","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba"},"headline":"Hackers: How Do They Get In?","datePublished":"2017-07-24T06:33:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/"},"wordCount":369,"commentCount":0,"publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg","keywords":["Hacking Attacks","Tips","Websites","WordPress"],"articleSection":["Web Design","Web Hosting","WordPress Websites"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/","url":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/","name":"Hackers: How Do They Get In? | The Web Authority","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#primaryimage"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg","datePublished":"2017-07-24T06:33:10+00:00","breadcrumb":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#primaryimage","url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg","contentUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2017\/07\/Depositphotos_2366759_xs-300x200.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mccordweb.com\/weblogs\/2017\/07\/24\/hackers-how-do-they-get-in\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mccordweb.com\/weblogs\/"},{"@type":"ListItem","position":2,"name":"Hackers: How Do They Get In?"}]},{"@type":"WebSite","@id":"https:\/\/www.mccordweb.com\/weblogs\/#website","url":"https:\/\/www.mccordweb.com\/weblogs\/","name":"The Web Authority | McCord Web Services News\/Blog","description":"Smart Digital Marketing, Real Business Results - McCord Web Services","publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mccordweb.com\/weblogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization","name":"McCord Web Services LLC","url":"https:\/\/www.mccordweb.com\/weblogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","contentUrl":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","width":450,"height":203,"caption":"McCord Web Services LLC"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mccordweb","https:\/\/x.com\/mccordweb","https:\/\/www.instagram.com\/nancy_mccord\/","https:\/\/www.linkedin.com\/in\/nancymccord","https:\/\/www.youtube.com\/user\/mccordweb"]},{"@type":"Person","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba","name":"Nancy McCord","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","caption":"Nancy McCord"},"sameAs":["http:\/\/www.mccordweb.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/comments?post=4721"}],"version-history":[{"count":1,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4721\/revisions"}],"predecessor-version":[{"id":4723,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4721\/revisions\/4723"}],"wp:attachment":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/media?parent=4721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/categories?post=4721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/tags?post=4721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}