{"id":22294,"date":"2019-04-08T14:05:30","date_gmt":"2019-04-08T12:05:30","guid":{"rendered":"https:\/\/mailcommsgroup.com\/blog\/authentication-multifactor\/"},"modified":"2023-09-08T09:39:23","modified_gmt":"2023-09-08T07:39:23","slug":"authentication-multifactor","status":"publish","type":"post","link":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/","title":{"rendered":"Multifactor authentication"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1547557263471{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; el_class=&#8221;El nuevo reglamento europeo obliga a recabar el consentimiento expl\u00edcito para el tratamiento de los datos de car\u00e1cter personal&#8221; font_color=&#8221;#81d742&#8243;][vc_single_image image=&#8221;5712&#8243; img_size=&#8221;full&#8221;][vc_column_text dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1615366203010{margin-bottom: 0px !important;padding-bottom: 0px !important;}&#8221;]<\/p>\n<h2>What is multifactor authentication?<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;grid&#8221; css=&#8221;.vc_custom_1547557240174{margin-top: 0px !important;padding-top: 0px !important;}&#8221;][vc_column dp_animation=&#8221;&#8221; css=&#8221;.vc_custom_1547557427896{padding-top: 0px !important;}&#8221;][vc_column_text dp_animation=&#8221;&#8221;]Multifactor authentication provides a layered security building block by requiring users to prove their identities using two or more verification methods before they can authenticate. In this way, if one factor is compromised or compromised, the attacker still has at least one more barrier to break through before reaching the target.<\/p>\n<h3>Why do I need multifactor authentication?<\/h3>\n<p>Authentication methods that rely on more than one factor are more difficult to compromise than single factor methods. Consequently, properly designed and implemented multi-factor authentication methods are more reliable and a stronger deterrent than outdated single-factor username\/password authentication.<\/p>\n<p>Multifactor authentication requires users to prove their identities using two or more verification methods before they can authenticate. This way, if a factor is compromised, the attacker still has at least one more barrier to break through before entering the target.<\/p>\n<h3>How does multifactor authentication work?<\/h3>\n<p>Multifactor authentication is the process by which multiple technologies are used to prove user authenticity. In contrast, single-factor authentication (or simply &#8220;authentication&#8221;) uses a single technology to prove user authenticity. With multi-factor authentication, users must combine verification technologies from at least three different groups. These groups are:<\/p>\n<ul>\n<li style=\"line-height: 2em !important;\"><strong>Something you know.<\/strong>  This is usually a password, PIN, passphrase or questions and corresponding answers. To satisfy this technology, the user must enter information that the backend can compare with that previously configured or stored.<\/li>\n<li style=\"line-height: 2em !important;\"><strong>Something you have.<\/strong>  Before the advent of smartphones, users carried tokens or smart cards. These devices generated a single-use code that could then be written or entered into the backend system. Today, most users leverage their smartphone as the device that generates these codes or allows them to respond to a server with a single-use code behind the screens.<\/li>\n<li style=\"line-height: 2em !important;\"><strong>Something you are.<\/strong>  This can be used to identify a unique user with fingerprints, retina scans, facial recognition, voice recognition or their behavior (such as how hard or fast a finger is used to type or swipe on a screen).<\/li>\n<\/ul>\n<p>To achieve multi-factor authentication, at least two different technologies from at least two different technology groups must be used. As a result, the use of a PIN in conjunction with a password would not be considered multifactor authentication, whereas the use of a PIN with facial recognition would be. It is also acceptable to use more than two forms of authentication. However, most users increasingly want frictionless authentication (the ability to be verified without the need to perform verification).<\/p>\n<h3>Where can I use MFA (Multi-Factor Authentication)?<\/h3>\n<p>Multifactor authentication should be used when accessing sensitive data, such as:<\/p>\n<ul>\n<li style=\"line-height: 2em !important;\">When you access your bank account at an ATM, you use multi-factor authentication by having something you know (the PIN) and something you have (the ATM card).<\/li>\n<li style=\"line-height: 2em !important;\">When you visit your Facebook account from a new location or device, you use multi-factor authentication by having something you know (the password) and something you have (your cell phone, which receives the notification it must approve before allowing you to log in).<\/li>\n<li style=\"line-height: 2em !important;\">When you use your cell phone, you use multi-factor authentication by something you have (the phone) and something you are (your fingerprint or facial scan) or other biometric technology available on the device.<\/li>\n<\/ul>\n<p>Good multi-factor authentication allows you to be secure and have the ability to do so seamlessly when accessing a service provider&#8217;s features and functions.<\/p>\n<h3>What are the types of multifactor technologies?<\/h3>\n<ul>\n<li style=\"line-height: 2em !important;\"><strong>Hardware tokens:<\/strong> small, easy-to-use hardware devices that an owner carries with them to authorize access to a network service. Supporting strong authentication with one-time passwords (OTP), these hardware tokens provide the possession factor for multi-factor authentication, while offering enhanced security for banks and application providers that need to protect multiple applications with a single device.<\/li>\n<li style=\"line-height: 2em !important;\"><strong>Soft tokens:<\/strong> software or &#8220;application-based tokens&#8221; generate a single-use login PIN. Often, these tokens are used for multi-factor authentication where the device, in this case a smartphone, provides the possession factor.<\/li>\n<li style=\"line-height: 2em !important;\"><strong>Mobile authentication:<\/strong> Mobile authentication is the process of verifying a user through their phone or verifying the device itself, allowing users to log in to secure locations and resources from anywhere with enhanced security.<\/li>\n<li style=\"line-height: 2em !important;\"><strong>Biometric authentication:<\/strong>  this includes leveraging fingerprint scanning or facial recognition to authenticate users accurately and securely, even on mobile devices; as well as behavioral authentication that provides an invisible layer of security that continuously authenticates end users by the unique ways they interact with their computer or mobile device, via keystroke, swipe pattern, mouse movement and more.<\/li>\n<\/ul>\n<h3>How do I get started with multifactor authentication?<\/h3>\n<p>The multi-factor authentication solutions of  <strong>OneSpan Sign have been designed from the ground up to safeguard accounts and transactions by offering two- or three-factor security, while meeting user demand for a simple registration process.<\/strong>  OneSpan has invested considerable time and resources to create easy-to-use, scalable and reliable solutions that offer strong authentication through a range of easy verification options, such as color QR codes and Bluetooth.<\/p>\n<p>Content extracted from <strong><br \/>\n  <a href=\"https:\/\/www.onespan.com\/solutions\/multi-factor-authentication\/?ad=blog-asset-banner\" target=\"_blank\" rel=\"noopener\">OneSpan<\/a><br \/>\n<\/strong>.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Authentication methods that rely on more than one factor are more difficult to compromise than single factor methods. Consequently, properly designed and implemented multi-factor authentication methods are more reliable and more effective fraud deterrents than the now obsolete single-factor username and password authentication.<\/p>\n","protected":false},"author":13,"featured_media":5713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[480,481],"class_list":["post-22294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-solutions-with-legal-value","category-omnichannel-communication-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Multifactor authentication - Mailcomms Group<\/title>\n<meta name=\"description\" content=\"Authentication methods that rely on more than one factor - multi-factor authentication - are more secure than single-factor methods.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multifactor authentication - Mailcomms Group\" \/>\n<meta property=\"og:description\" content=\"Authentication methods that rely on more than one factor - multi-factor authentication - are more secure than single-factor methods.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailcomms Group\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-08T12:05:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T07:39:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"892\" \/>\n\t<meta property=\"og:image:height\" content=\"623\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alberto Fidalgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:site\" content=\"@CommsCustomer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alberto Fidalgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\"},\"author\":{\"name\":\"Alberto Fidalgo\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214\"},\"headline\":\"Multifactor authentication\",\"datePublished\":\"2019-04-08T12:05:30+00:00\",\"dateModified\":\"2023-09-08T07:39:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\"},\"wordCount\":922,\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg\",\"articleSection\":[\"Communication solutions with legal value\",\"Omnichannel communication solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\",\"name\":\"Multifactor authentication - Mailcomms Group\",\"isPartOf\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg\",\"datePublished\":\"2019-04-08T12:05:30+00:00\",\"dateModified\":\"2023-09-08T07:39:23+00:00\",\"description\":\"Authentication methods that rely on more than one factor - multi-factor authentication - are more secure than single-factor methods.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg\",\"width\":892,\"height\":623,\"caption\":\"Autenticaci\u00f3n multifactor\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mailcomms Group\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/mailcommsgroup.com\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Multifactor authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#website\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"name\":\"MailComms Group\",\"description\":\"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.\",\"publisher\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\"},\"alternateName\":\"MailComms Group\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#organization\",\"name\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\",\"alternateName\":\"MailComms Group\",\"url\":\"https:\/\/mailcommsgroup.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"contentUrl\":\"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png\",\"width\":512,\"height\":512,\"caption\":\"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.\"},\"image\":{\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CommsCustomer\",\"https:\/\/www.linkedin.com\/company\/customercomms\/\",\"https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214\",\"name\":\"Alberto Fidalgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g\",\"caption\":\"Alberto Fidalgo\"},\"url\":\"https:\/\/mailcommsgroup.com\/en\/blog\/author\/alberto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multifactor authentication - Mailcomms Group","description":"Authentication methods that rely on more than one factor - multi-factor authentication - are more secure than single-factor methods.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/","og_locale":"en_US","og_type":"article","og_title":"Multifactor authentication - Mailcomms Group","og_description":"Authentication methods that rely on more than one factor - multi-factor authentication - are more secure than single-factor methods.","og_url":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/","og_site_name":"Mailcomms Group","article_published_time":"2019-04-08T12:05:30+00:00","article_modified_time":"2023-09-08T07:39:23+00:00","og_image":[{"width":892,"height":623,"url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg","type":"image\/jpeg"}],"author":"Alberto Fidalgo","twitter_card":"summary_large_image","twitter_creator":"@CommsCustomer","twitter_site":"@CommsCustomer","twitter_misc":{"Written by":"Alberto Fidalgo","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#article","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/"},"author":{"name":"Alberto Fidalgo","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214"},"headline":"Multifactor authentication","datePublished":"2019-04-08T12:05:30+00:00","dateModified":"2023-09-08T07:39:23+00:00","mainEntityOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/"},"wordCount":922,"publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg","articleSection":["Communication solutions with legal value","Omnichannel communication solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/","url":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/","name":"Multifactor authentication - Mailcomms Group","isPartOf":{"@id":"https:\/\/mailcommsgroup.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage"},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage"},"thumbnailUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg","datePublished":"2019-04-08T12:05:30+00:00","dateModified":"2023-09-08T07:39:23+00:00","description":"Authentication methods that rely on more than one factor - multi-factor authentication - are more secure than single-factor methods.","breadcrumb":{"@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#primaryimage","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2019\/04\/autenticacion-multifactor.jpg","width":892,"height":623,"caption":"Autenticaci\u00f3n multifactor"},{"@type":"BreadcrumbList","@id":"https:\/\/mailcommsgroup.com\/en\/blog\/authentication-multifactor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mailcomms Group","item":"https:\/\/mailcommsgroup.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/mailcommsgroup.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Multifactor authentication"}]},{"@type":"WebSite","@id":"https:\/\/mailcommsgroup.com\/en\/#website","url":"https:\/\/mailcommsgroup.com\/en\/","name":"MailComms Group","description":"La transformaci\u00f3n digital a trav\u00e9s de la comunicaci\u00f3n omnicanal, con plena validez legal.","publisher":{"@id":"https:\/\/mailcommsgroup.com\/en\/#organization"},"alternateName":"MailComms Group","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailcommsgroup.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailcommsgroup.com\/en\/#organization","name":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal.","alternateName":"MailComms Group","url":"https:\/\/mailcommsgroup.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","contentUrl":"https:\/\/mailcommsgroup.com\/wp-content\/uploads\/2023\/05\/icon_mini_mailcommsgroup.png","width":512,"height":512,"caption":"MailComms Group - Soluciones de comunicaci\u00f3n omnicanal con validez legal."},"image":{"@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CommsCustomer","https:\/\/www.linkedin.com\/company\/customercomms\/","https:\/\/www.youtube.com\/channel\/UCtvYLee1QHy89JS2-gMgnTQ"]},{"@type":"Person","@id":"https:\/\/mailcommsgroup.com\/en\/#\/schema\/person\/6799e99cdeee9ce953ed50904934b214","name":"Alberto Fidalgo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07374327d8d60a1440477fa10cc0814f17489e1966c53b410a3c737bd8c4ceec?s=96&d=mm&r=g","caption":"Alberto Fidalgo"},"url":"https:\/\/mailcommsgroup.com\/en\/blog\/author\/alberto\/"}]}},"_links":{"self":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/22294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/comments?post=22294"}],"version-history":[{"count":1,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/22294\/revisions"}],"predecessor-version":[{"id":22302,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/posts\/22294\/revisions\/22302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media\/5713"}],"wp:attachment":[{"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/media?parent=22294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailcommsgroup.com\/en\/wp-json\/wp\/v2\/categories?post=22294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}