{"id":60420,"date":"2025-10-27T11:47:27","date_gmt":"2025-10-27T06:17:27","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=60420"},"modified":"2025-12-17T13:39:53","modified_gmt":"2025-12-17T08:09:53","slug":"what-is-a-whaling-attack","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack","title":{"rendered":"What Is a Whaling Attack? How Cybercriminals Target CEOs?"},"content":{"rendered":"\n<p>Do you know, an Australian hedge fund lost $8 million to a cyber scam. The attackers didn\u2019t use complex malware. They simply tricked the executives with a fake email. That\u2019s the power of a whaling attack.<\/p>\n\n\n\n<p>Whaling attacks are not your usual <a class=\"wpil_keyword_link\" href=\"https:\/\/www.techjockey.com\/blog\/what-is-phishing\"   title=\"phishing\" data-wpil-keyword-link=\"linked\"  data-wpil-monitor-id=\"2072\">phishing<\/a> scams. These are highly targeted attacks where the cybercriminals attack the biggest players in a company CEOs, CFOs, and other top executives. When cybercriminals go after these big fish, the damage can be huge both financially and reputationally.<\/p>\n\n\n\n<p>In this blog we will talk about what a whaling attack is, how it works and how you can protect yourself from it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-whaling-attack\"><span class=\"ez-toc-section\" id=\"what_is_a_whaling_attack\"><\/span>What is a Whaling Attack?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A whaling attack is a specific type of phishing scam where cybercriminals zero in on high-profile individuals, such as CEOs, CFOs, or other C-suite executives. Unlike generic phishing attempts that cast a wide net via mass emails, whaling is more targeted and personalized.<\/p>\n\n\n\n<p>These scams use highly personalized messages that often look like they come from trusted contacts. The goal is to trick the victim into taking an action like transferring money, sharing confidential data, or clicking a harmful link.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Attack Type<\/th><th>Who It Targets<\/th><th>Level of Personalization<\/th><th>Common Tactics Used<\/th><th>Main Goal<\/th><\/tr><\/thead><tbody><tr><td><strong>Phishing<\/strong><\/td><td>General public or random users<\/td><td>Very low<\/td><td>Generic mass emails with fake links or attachments<\/td><td>Steal credentials or infect devices<\/td><\/tr><tr><td><strong>Spear Phishing<\/strong><\/td><td>Specific individuals or teams<\/td><td>Moderate<\/td><td>Personalized emails based on limited research<\/td><td>Gain access to systems or sensitive info<\/td><\/tr><tr><td><strong>Whaling<\/strong><\/td><td>Top executives (CEO, CFO, etc.)<\/td><td>Very high<\/td><td>Highly customized emails, urgent tone, formal language<\/td><td>Trick executives into sending money or data<\/td><\/tr><tr><td><strong>CEO Fraud \/ BEC<\/strong><\/td><td>Employees within the organization<\/td><td>Very high<\/td><td>Impersonates the CEO to manipulate staff<\/td><td>Initiate fake wire transfers or data leaks<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_8848\"><h3><span class=\"ez-toc-section\" id=\"sentinelone\"><\/span>SentinelOne<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"8848\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-are-ceos-and-executives-prime-targets-for-whaling-attacks\"><span class=\"ez-toc-section\" id=\"why_are_ceos_and_executives_prime_targets_for_whaling_attacks\"><\/span>Why Are CEOs and Executives Prime Targets for Whaling Attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cybercriminals don\u2019t just pick random victims for whaling attacks. They go after CEOs and top executives for a reason. Here&#8217;s why:<\/p>\n\n\n\n<p><strong>1. They Have High Authority and Access<\/strong><\/p>\n\n\n\n<ul>\n<li>Can approve large financial transactions instantly<\/li>\n\n\n\n<li>Have access to sensitive company information (like employee data, legal contracts, or business deals)<\/li>\n\n\n\n<li>Their decisions carry weight so staff are more likely to follow orders without question<\/li>\n<\/ul>\n\n\n\n<p><strong>2. They\u2019re Extremely Busy<\/strong><\/p>\n\n\n\n<ul>\n<li>Often check and respond to emails quickly, especially when traveling or in back-to-back meetings<\/li>\n\n\n\n<li>May use personal devices or unsecured networks, especially outside the office<\/li>\n\n\n\n<li>Attackers take advantage of this fast pace to create urgent, believable scams<\/li>\n<\/ul>\n\n\n\n<p><strong>3. A Lot of Their Information is Public<\/strong><\/p>\n\n\n\n<p>Hackers use Open-Source Intelligence (OSINT) to study their targets. They gather information from:<\/p>\n\n\n\n<ul>\n<li>LinkedIn (job role, team structure, past jobs)<\/li>\n\n\n\n<li>Company websites (executive bios, press releases)<\/li>\n\n\n\n<li>News articles (ongoing deals or company news)<\/li>\n\n\n\n<li>Social media (travel updates, hobbies, personal milestones)<\/li>\n<\/ul>\n\n\n\n<p>This helps attackers to copy the executive\u2019s writing style, mention real company events and then make fake emails feel authentic and personalized.<\/p>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_25023\"><h3><span class=\"ez-toc-section\" id=\"avast_essential_business_security\"><\/span>Avast Essential Business Security<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"25023\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-cybercriminals-execute-a-whaling-attack-common-tactics\"><span class=\"ez-toc-section\" id=\"how_cybercriminals_execute_a_whaling_attack_common_tactics\"><\/span>How Cybercriminals Execute a Whaling Attack: Common Tactics?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Whaling attacks are not random. Cybercriminals follow a planned and careful process to trick executives. Here&#8217;s how they usually do it:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-they-start-with-deep-research\"><span class=\"ez-toc-section\" id=\"strong1_they_start_with_deep_researchstrong\"><\/span><strong>1. They Start with Deep Research<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Attackers first gather all the information they can. They look into:<\/p>\n\n\n\n<ul>\n<li>The target\u2019s job role and responsibilities<\/li>\n\n\n\n<li>Who reports to whom in the company<\/li>\n\n\n\n<li>Current business deals or projects<\/li>\n\n\n\n<li>How the executive writes and communicates<\/li>\n<\/ul>\n\n\n\n<p>This research helps them craft a fake message that looks real, urgent, and trustworthy.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-they-use-smart-impersonation-tricks\"><span class=\"ez-toc-section\" id=\"2_strongthey_use_smart_impersonation_tricksstrong\"><\/span>2. <strong>They Use Smart Impersonation Tricks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Once they know the target well, they start pretending to be someone trusted. They use techniques like:<\/p>\n\n\n\n<ul>\n<li><strong>Email Spoofing<\/strong>: Making an email look like it\u2019s coming from the CEO or a known contact (e.g., using ceo.name@company.co instead of company.com)<\/li>\n\n\n\n<li><strong>Domain Spoofing or Typosquatting<\/strong>: Buying similar domain names to trick people (e.g., companny.com instead of company.com)<\/li>\n\n\n\n<li><strong>Hacked Accounts<\/strong>: Sometimes, they get into the real CEO\u2019s email account and send fake messages directly<\/li>\n\n\n\n<li><strong>Deepfakes (New Threat):<\/strong> Some attackers now use AI to create fake audio or video messages that sound and look like the executive<\/li>\n\n\n\n<li><strong>Tip:<\/strong> Using <a href=\"https:\/\/www.techjockey.com\/category\/security-software\">cybersecurity software<\/a> like email threat protection, AI-driven phishing detection, and domain monitoring tools can detect these impersonation attempts before they reach executives.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_15560\"><h3><span class=\"ez-toc-section\" id=\"threatcop\"><\/span>ThreatCop<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"15560\"\/><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-they-send-highly-convincing-baits\"><span class=\"ez-toc-section\" id=\"strong3_they_send_highly_convincing_baitsstrong\"><\/span><strong>3. They Send Highly Convincing Baits<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The final step is sending a fake message that seems urgent and important. Common scenarios include:<\/p>\n\n\n\n<ul>\n<li><strong>Urgent Payment Requests:<\/strong> Please transfer $200,000 to this account for a confidential deal.<\/li>\n\n\n\n<li><strong>Sensitive Data Requests:<\/strong> Send me the latest payroll records or employee tax forms.<\/li>\n\n\n\n<li><strong>Fake Legal Issues:<\/strong> We have a pending court order. I need this resolved before the end of the day.<\/li>\n\n\n\n<li><strong>Deals or Business Announcements:<\/strong> Keep this quiet, but I need you to review this contract for the acquisition.<\/li>\n\n\n\n<li><strong>Credential Theft:<\/strong> Reset your password using this link for security.<\/li>\n\n\n\n<li><strong>Fake Meeting Invites:<\/strong> Join this urgent Zoom call with a malicious link or attachment<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_1854\"><h3><span class=\"ez-toc-section\" id=\"sophos_secure_web_appliance\"><\/span>Sophos Secure Web Appliance<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"1854\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-protect-your-organization-from-whaling-attacks\"><span class=\"ez-toc-section\" id=\"how_to_protect_your_organization_from_whaling_attacks\"><\/span>How to Protect Your Organization from Whaling Attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You can\u2019t stop hackers from trying, but you can make it much harder for them to succeed. Here are the most effective ways to protect your executives and your business:<\/p>\n\n\n\n<ul>\n<li><strong>Train Everyone<\/strong>: Every employee, including top executives, should know how to spot a fake email. Teach them to look for signs like unusual email addresses, urgent tone, or unexpected requests. Always verify such messages through a phone call or direct confirmation. Regular training and phishing simulations help build awareness and make people think twice before clicking.<\/li>\n\n\n\n<li><strong>Use Strong Technical Defenses<\/strong>: Technical tools can block many threats before they reach people. Set up email security protocols like SPF, DKIM, and DMARC to stop fake emails. Use filters that warn when messages come from outside the company. Also, enforce multi-factor authentication (MFA) and strong password policies to keep executive accounts safe from hackers.<\/li>\n\n\n\n<li><strong>Set Clear Policies and Procedures:<\/strong> Have strict rules for handling financial requests or sensitive data. For example, large money transfers should always require a second approval and direct confirmation. Limit who can access important information, and make sure everyone knows the steps to follow if a whaling attempt happens. A strong plan helps teams act fast and reduce damage.<\/li>\n\n\n\n<li><strong>Improve Social Media Hygiene:<\/strong> Hackers often use public info to plan attacks. Encourage executives to be careful about what they post online. Avoid sharing travel plans, business updates, or personal details on LinkedIn or social media. Review and update privacy settings regularly. Even a simple post can give attackers the clues they need to write a convincing scam email.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-tj-custom-product-block-custom-product-card custom-product-card-plugin-style\" id=\"tagged_prod_container_2506\"><h3><span class=\"ez-toc-section\" id=\"trendmicro_maximum_security\"><\/span>TrendMicro Maximum Security<span class=\"ez-toc-section-end\"><\/span><\/h3><input type=\"hidden\" name=\"tagged_product[]\" value=\"2506\"\/><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-to-do-if-you-suspect-or-fall-victim-to-a-whaling-attack\"><span class=\"ez-toc-section\" id=\"what_to_do_if_you_suspect_or_fall_victim_to_a_whaling_attack\"><\/span>What to Do If You Suspect or Fall Victim to a Whaling Attack?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you ever fall victim to the whaling attack, worry not! Follow these steps to minimize the damage:<\/p>\n\n\n\n<ul>\n<li><strong>Act Immediately<\/strong>: If you suspect a whaling email, don\u2019t reply or click on any links. Report it to your IT or security team right away. If money has already been transferred or sensitive data shared, contact your bank and local cybercrime authorities immediately. Quick action can reduce damage and improve your chances of recovery.<\/li>\n\n\n\n<li><strong>Contain the Threat and Investigate:<\/strong> Once reported, your IT team should isolate any affected systems or accounts to stop further harm. Then, begin a full investigation to find out how the attack happened. Look at email headers, login logs, and access records. This helps identify weaknesses in your system and prevents similar attacks in the future.<\/li>\n\n\n\n<li><strong>Control the Damage and Communicate: <\/strong>Inform all necessary stakeholders, including top management, legal teams, and if needed your customers. Transparency builds trust. Update your security protocols based on what went wrong and consider bringing in cybersecurity experts for a full review. The goal is to close gaps, rebuild trust, and avoid future attacks.<\/li>\n<\/ul>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Whaling attacks are one of the most dangerous cyber threats facing businesses today. Cybercriminals use smart tricks to target the people with the most power your executives. But with the right mix of awareness, strong security tools, and clear company policies, you can stay one step ahead. Stay alert, train your team, and protect your top leadership.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know, an Australian hedge fund lost $8 million to a cyber scam. The attackers didn\u2019t use complex malware. They simply tricked the executives with a fake email. That\u2019s the power of a whaling attack. Whaling attacks are not your usual phishing scams. These are highly targeted attacks where the cybercriminals attack the biggest [&hellip;]<\/p>\n","protected":false},"author":184,"featured_media":60432,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9173],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a Whaling Attack? How Cybercriminals Target CEOs?<\/title>\n<meta name=\"description\" content=\"Learn how whaling attacks target CEOs and protect your executives with cybersecurity tools and smart strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Whaling Attack? How Cybercriminals Target CEOs?\" \/>\n<meta property=\"og:description\" content=\"Learn how whaling attacks target CEOs and protect your executives with cybersecurity tools and smart strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-27T06:17:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T08:09:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/10\/27113610\/Whaling-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shubham Roy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shubham Roy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is a Whaling Attack? How Cybercriminals Target CEOs?","description":"Learn how whaling attacks target CEOs and protect your executives with cybersecurity tools and smart strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420","og_locale":"en_US","og_type":"article","og_title":"What Is a Whaling Attack? How Cybercriminals Target CEOs?","og_description":"Learn how whaling attacks target CEOs and protect your executives with cybersecurity tools and smart strategies.","og_url":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420","og_site_name":"Techjockey.com Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2025-10-27T06:17:27+00:00","article_modified_time":"2025-12-17T08:09:53+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/10\/27113610\/Whaling-attack.png","type":"image\/png"}],"author":"Shubham Roy","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Shubham Roy","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack"},"author":{"name":"Shubham Roy","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/5d8cbe24e78d4ad94110452dcf9c4fcf"},"headline":"What Is a Whaling Attack? How Cybercriminals Target CEOs?","datePublished":"2025-10-27T06:17:27+00:00","dateModified":"2025-12-17T08:09:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack"},"wordCount":1337,"publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/10\/27113610\/Whaling-attack.png","articleSection":["Cyber Security Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack","url":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack","name":"What Is a Whaling Attack? How Cybercriminals Target CEOs?","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/10\/27113610\/Whaling-attack.png","datePublished":"2025-10-27T06:17:27+00:00","dateModified":"2025-12-17T08:09:53+00:00","description":"Learn how whaling attacks target CEOs and protect your executives with cybersecurity tools and smart strategies.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#primaryimage","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/10\/27113610\/Whaling-attack.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/10\/27113610\/Whaling-attack.png","width":1200,"height":628,"caption":"what is Whaling attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/blog\/what-is-a-whaling-attack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Software","item":"https:\/\/www.techjockey.com\/blog\/category\/security-software"},{"@type":"ListItem","position":3,"name":"What Is a Whaling Attack? How Cybercriminals Target CEOs?"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/blog\/#website","url":"https:\/\/www.techjockey.com\/blog\/","name":"Techjockey.com Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","width":72,"height":72,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/twitter.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/5d8cbe24e78d4ad94110452dcf9c4fcf","name":"Shubham Roy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4606bf931eeee0e818bf91797db92f5a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4606bf931eeee0e818bf91797db92f5a?s=96&d=mm&r=g","caption":"Shubham Roy"},"description":"Shubham Roy is an experienced writer with a strong Technical and Business background. With over three years of experience as a content writer, he has honed his skills in various domains, including technical writing, business, software, Travel, Food and finance. His passion for creating engaging and informative content has earned him recognition in the industry. When he's not busy crafting articles, Shubham enjoys reading, exploring new technologies, and staying updated with the latest trends in the world of business and finance.","sameAs":["https:\/\/www.linkedin.com\/in\/omgshubham\/"],"url":"https:\/\/www.techjockey.com\/blog\/author\/shubham-roy"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420"}],"collection":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/comments?post=60420"}],"version-history":[{"count":5,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420\/revisions"}],"predecessor-version":[{"id":61416,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/60420\/revisions\/61416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media\/60432"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media?parent=60420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/categories?post=60420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/tags?post=60420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}