{"id":3160,"date":"2022-12-22T12:48:50","date_gmt":"2022-12-22T12:48:50","guid":{"rendered":"http:\/\/the-codest.localhost\/blog\/cyber-security-dilemmas-data-leaks\/"},"modified":"2026-03-09T13:03:06","modified_gmt":"2026-03-09T13:03:06","slug":"cyber-security-dilemmas-data-leaks","status":"publish","type":"post","link":"https:\/\/thecodest.co\/en\/blog\/cyber-security-dilemmas-data-leaks\/","title":{"rendered":"Cyber Security Dilemmas: Data Leaks"},"content":{"rendered":"<p>Christmas is not only the harvest in the retail industry, but also prime time for <strong>cybercriminals<\/strong>. It is at this time of year that<strong> hacking attacks<\/strong> aimed at stealing or phishing are on the rise. This poses a problem not only for consumers, but also for companies for whom <strong><a href=\"https:\/\/thecodest.co\/en\/blog\/app-data-collection-security-risks-value-and-types-explored\/\">data<\/a> leaks<\/strong> mean financial losses and damage to their reputation. Post-Christmas period is a perfect time to reflect on how can companies protect themselves against data leaks?<\/p>\n<ul>\n<li>Customer safety is part of building trust in the brand<\/li>\n<li>How to protect your data online while shopping<\/li>\n<li>Application and infrastructure monitoring as a way to protect against data leakage<\/li>\n<li>Leakage of customer data \u2013 to report or not to report?<\/li>\n<li>How do you communicate data leakage to your customers?<\/li>\n<\/ul>\n<h2>Safe shopping in the battle for customers<\/h2>\n<p>Recent years in <a href=\"https:\/\/thecodest.co\/en\/blog\/top-programming-languages-to-build-e-commerce\/\">e-commerce<\/a> have been a time of a technological \u201carms race\u201d for each customer. Today, we are not simply shopping online, but experiencing a personalised shopping experience. This is to make it easier for <a href=\"https:\/\/thecodest.co\/en\/blog\/why-us-companies-are-opting-for-polish-developers\/\">us<\/a> to complete our shopping basket and encourage us to return to the site in the future. <\/p>\n<p>An important part of the aforementioned positive shopping experience is building trust in a brand. Part of that trust is ensuring our customers have a safe <strong>online shopping<\/strong> experience. We can do this by educating users about hacking threats and by investing in tools and technologies that protect against <strong>cyber-attacks<\/strong>.<\/p>\n<h2>How can customers protect their data?<\/h2>\n<p>According to the study \u201cReliability of online shops\u201d commissioned by ChronPESEL.pl and Rzetelna Firma, one in four respondents has heard of a leak of customers&#8217; personal data from a shop they used. On the other hand, 6 percent of online shoppers declared that their data had actually been made available to unauthorised persons. Analysing <strong>e-commerce<\/strong> statistics on the number of online shoppers, more than 1.3 million people have had to deal with such a situation.<\/p>\n<p>What should be reminded to our customers to feel safe during the pre-Christmas shopping frenzy in online shops? <\/p>\n<p>Firstly, let\u2019s draw the attention of our website users to fake e-shops, especially those impersonating other sites. The warning light should go on when the offers on a particular<strong> e-store <\/strong>are unrealistically attractive or when the site itself looks suspicious. <\/p>\n<p>Secondly, let us educate our customers about <strong>phishing attacks<\/strong>. The pre-Christmas period is a rush of attempts to extract confidential data through emails, phone calls and text messages with information about supposedly unfinished shopping transactions or unpaid courier shipments. Caution customers against clicking on suspicious links sent by email or phone and against giving out personal or confidential information during phone calls. Encourage secure payments based on two-step authentication of transactions. <\/p>\n<h2>How do we protect our customers\u2019 data?<\/h2>\n<p>Educating customers is one thing but keeping them safe on our website is a separate issue. In this age of increased <strong>cybercriminal activity<\/strong>, we should be prepared for <strong>hacking attacks<\/strong> and their consequences. How? It is worth introducing an early threat detection policy in your company, monitoring the performance and security of your business applications and infrastructure. <\/p>\n<p>At <a href=\"https:\/\/thecodest.co\/en\/blog\/vibrant-upturn-charting-the-resolute-rise-of-swedish-firms\/\">The Codest<\/a>, we provide <strong>continuous monitoring services<\/strong> for the performance as well as the security of IT systems based on the client\u2019s own or cloud-based infrastructure (or both at the same time).<\/p>\n<p>This <strong>monitoring services<\/strong> focuses on the performance of the systems in operation in terms of throughput, as well as the quality of integration of connected IT systems. This includes such important aspects in<strong> e-commerce<\/strong> as <a href=\"https:\/\/thecodest.co\/en\/dictionary\/payment-gateways\/\">payment gateways<\/a>, shipping systems and connected CRM and ERP systems.<\/p>\n<p>A crucial element in protecting against data leakage is the need to test for<strong> cyberattack threats<\/strong> the production environment, i.e., that which is available to the end customer. Periodic testing is designed to catch potential vulnerabilities in systems and allow them to be fixed before an incident occurs. Every change and update in the IT area, before it is published, is tested to catch errors. <\/p>\n<p>The service in question is the <a href=\"https:\/\/thecodest.co\/services\/devops-engineers\/\">24\/7 service of the DevOps team<\/a>, i.e., the programming and operations sections, where both programming and administrative competencies take care of ensuring the performance and security of customers\u2019 business applications.<\/p>\n<p><a href=\"https:\/\/thecodest.co\/contact\"><img decoding=\"async\" src=\"\/app\/uploads\/2024\/05\/interested_in_continuous_monitoring_services_.png\" alt=\"navy text with pink button\" title=\"monitoring services banner \" \/><\/a><\/p>\n<h2>Leakage of customer data \u2013 what does the law say?<\/h2>\n<p>Prior to the GDPR era, the controller\u2019s obligation to inform about <strong>data leaks<\/strong> was optional, regardless of the scale of the threat. Nowadays, if the disclosure of data is likely to cause an elevated risk of infringement of the rights and freedoms of the affected persons, the controller is obliged to inform these persons about the data leak or theft. We must also report this to the <strong>Data Protection Authority<\/strong>. Here, however, several questions arise. <\/p>\n<p>Firstly, it is up to the controller to interpret whether a <strong>data leakage<\/strong> constitutes a minor incident (about which users do not need to be informed) or already a personal data breach. Secondly, there are several grounds listed in the GDPR under which we do not need to inform users that their data has been leaked. <\/p>\n<p>Many companies are therefore faced with the dilemma of what to do when their customer data has seen the light of day. From The Codest\u2019s perspective, in the vast majority of cases we should inform the customers of such an event. This is what building brand trust is all about. <\/p>\n<h2>How to communicate data leakage to your customers?<\/h2>\n<p>The milk has spilled. We have fallen victim to a data leak. What should we do next? First of all, we should have an action strategy in place. On the one hand, this must include operational measures, i.e., countermeasures to minimise the effects of the leak. On the other hand, you should maintain transparent, ongoing communication with customers about the leak. This will help you avoid or limit the escalation of a potential image crisis and loss of customer confidence. <\/p>\n<p>According to another survey commissioned by Chronpesel.pl together with the National Debt Register, people who have fallen victim to a leak expect to be informed as soon as possible that a breach of data protection has occurred and what is its extent (about 60 percent of answers). In addition, respondents want information on what the controller did to avoid similar situations in the future (close to 57 per cent), as well as to whom the leaked data could have gone (over 53 per cent).<br \/>\nThe last thing we want is for them to find out about <strong>data leaks<\/strong> from the media or their anti-virus software. We need to give them the chance to take care and \u201cprotect\u201d their personalities. <\/p>\n<p>What are the golden rules of communication when faced with a data leak? First of all, let\u2019s inform our customers about the incident. Let us show that the situation is under control, that we are consciously managing it. Outline what we are doing to minimise the negative effects of the leak. Finally, what measures we plan to implement to prevent a similar situation in the future.<\/p>\n<h2>Protect the data, protect the customer <\/h2>\n<p>According to the \u201cE-commerce in Poland&#8221; report compiled by Gemius, 77 percent of all Internet users already shop online. One in three respondents admit that they do so more often now than before the pandemic. A similar percentage notes that they purchase more products online after the pandemic. The <strong>e-commerce <a href=\"https:\/\/thecodest.co\/en\/dictionary\/what-is-the-size-of-your-potential-reachable-market\/\">market<\/a><\/strong> itself is also growing at an extremely fast pace. This translates into more cyber-attacks on the personal data of online users. It is worth thinking about this especially before Christmas, treating an investment in security to protect our user databases as the best practical Christmas present we can give our customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pre-Christmas rush is in full swing. In search of gifts for their loved ones, people are increasingly willing to \u201cstorm\u201d online shops<\/p>\n","protected":false},"author":2,"featured_media":3161,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[16,4,8],"tags":[12],"class_list":["post-3160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-commerce","category-enterprise-scaleups-solutions","category-software-development","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Dilemmas: Data Leaks - The Codest<\/title>\n<meta name=\"description\" content=\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecodest.co\/en\/blog\/cyber-security-dilemmas-data-leaks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Dilemmas: Data Leaks\" \/>\n<meta property=\"og:description\" content=\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecodest.co\/en\/blog\/cyber-security-dilemmas-data-leaks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Codest\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T12:48:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T13:03:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"thecodest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thecodest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"},\"author\":{\"name\":\"thecodest\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\"},\"headline\":\"Cyber Security Dilemmas: Data Leaks\",\"datePublished\":\"2022-12-22T12:48:50+00:00\",\"dateModified\":\"2026-03-09T13:03:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"},\"wordCount\":1267,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"keywords\":[\"IT\"],\"articleSection\":[\"E-commerce\",\"Enterprise &amp; Scaleups Solutions\",\"Software Development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\",\"name\":\"Cyber Security Dilemmas: Data Leaks - The Codest\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"datePublished\":\"2022-12-22T12:48:50+00:00\",\"dateModified\":\"2026-03-09T13:03:06+00:00\",\"description\":\"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/should-companies-tell-customers-about-data-leaks_-1-.png\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/cyber-security-dilemmas-data-leaks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/thecodest.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Dilemmas: Data Leaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"name\":\"The Codest\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/thecodest.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\",\"name\":\"The Codest\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"width\":144,\"height\":36,\"caption\":\"The Codest\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/pl.linkedin.com\\\/company\\\/codest\",\"https:\\\/\\\/clutch.co\\\/profile\\\/codest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\",\"name\":\"thecodest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"caption\":\"thecodest\"},\"url\":\"https:\\\/\\\/thecodest.co\\\/en\\\/author\\\/thecodest\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security Dilemmas: Data Leaks - The Codest","description":"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecodest.co\/en\/blog\/cyber-security-dilemmas-data-leaks\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Dilemmas: Data Leaks","og_description":"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.","og_url":"https:\/\/thecodest.co\/en\/blog\/cyber-security-dilemmas-data-leaks\/","og_site_name":"The Codest","article_published_time":"2022-12-22T12:48:50+00:00","article_modified_time":"2026-03-09T13:03:06+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","type":"image\/png"}],"author":"thecodest","twitter_card":"summary_large_image","twitter_misc":{"Written by":"thecodest","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#article","isPartOf":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"},"author":{"name":"thecodest","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76"},"headline":"Cyber Security Dilemmas: Data Leaks","datePublished":"2022-12-22T12:48:50+00:00","dateModified":"2026-03-09T13:03:06+00:00","mainEntityOfPage":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"},"wordCount":1267,"commentCount":0,"publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"image":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","keywords":["IT"],"articleSection":["E-commerce","Enterprise &amp; Scaleups Solutions","Software Development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/","url":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/","name":"Cyber Security Dilemmas: Data Leaks - The Codest","isPartOf":{"@id":"https:\/\/thecodest.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"image":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","datePublished":"2022-12-22T12:48:50+00:00","dateModified":"2026-03-09T13:03:06+00:00","description":"Learn how companies can prevent data leaks and cyber attacks, protect customer information, and build trust through stronger cybersecurity practices.","breadcrumb":{"@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#primaryimage","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/should-companies-tell-customers-about-data-leaks_-1-.png","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/thecodest.co\/blog\/cyber-security-dilemmas-data-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecodest.co\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Dilemmas: Data Leaks"}]},{"@type":"WebSite","@id":"https:\/\/thecodest.co\/#website","url":"https:\/\/thecodest.co\/","name":"The Codest","description":"","publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecodest.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/thecodest.co\/#organization","name":"The Codest","url":"https:\/\/thecodest.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","width":144,"height":36,"caption":"The Codest"},"image":{"@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/codest","https:\/\/clutch.co\/profile\/codest"]},{"@type":"Person","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76","name":"thecodest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","caption":"thecodest"},"url":"https:\/\/thecodest.co\/en\/author\/thecodest\/"}]}},"_links":{"self":[{"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/posts\/3160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/comments?post=3160"}],"version-history":[{"count":5,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/posts\/3160\/revisions"}],"predecessor-version":[{"id":7779,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/posts\/3160\/revisions\/7779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/media?parent=3160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/categories?post=3160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecodest.co\/en\/wp-json\/wp\/v2\/tags?post=3160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}