{"id":4217,"date":"2016-04-21T14:28:27","date_gmt":"2016-04-21T20:28:27","guid":{"rendered":"https:\/\/www.webii.net\/blog\/?p=4217"},"modified":"2022-02-18T12:09:09","modified_gmt":"2022-02-18T18:09:09","slug":"how-to-fix-a-hacked-joomla-site","status":"publish","type":"post","link":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/","title":{"rendered":"How to Fix a Hacked Joomla Site"},"content":{"rendered":"<p>Joomla offers you many advantages when you are creating and managing your website, not the least of which is the fact that it is open source. However, a Joomla site, like every other website, can be hacked. By taking advantage of weaknesses in your servers, software, extensions, and security, hackers can create multiple issues on your site.<\/p>\n<p>These issues can cause serious damage to your website, and to your professional reputation. As a result, you need to take steps to prevent hacking in the first place. For instance, you should always maintain your software through upgrades, security patches, and the assistance of a reliable <a href=\"https:\/\/www.webii.net\/website-services\/web-development\/\">web development company<\/a>.<\/p>\n<p>When hacking does occur, you also need to be ready to act quickly to repair the damage and prevent hackers from getting back into your site. By understanding how hacking occurs, the damage it can cause, and the best way to handle a hacking incident, you can be better prepared to both prevent and fix a hacked Joomla site.<\/p>\n<h2>How does a Joomla site get hacked?<\/h2>\n<p>Fixing your hacked Joomla site means first understanding how hackers can get into it. Once you know where potential doorways are into your website, you will be better equipped to track down exactly how hackers accessed your site. Plus, knowing how a Joomla site gets hacked can help you know what to do to prevent hacking in the first place. Following are a few of the most common ways hackers get into websites, either manually or through the use of automated programs:<\/p>\n<h3>Through a web hosting server issue<\/h3>\n<p>A weakness in your <a href=\"https:\/\/www.webii.net\/website-services\/web-hosting\/\">web hosting<\/a> company&#8217;s servers can easily be exploited by hackers to get into your website.<\/p>\n<h3>Through someone\u2019s computer<\/h3>\n<p>A weakness in your website manager&#8217;s computer or network can also provide a doorway to your website. This is especially true if that person&#8217;s computer is already infected with a virus or malware.<\/p>\n<h3>Through website software<\/h3>\n<p>Website software is frequently updated by its creators. If you are using old software, you are more likely to have holes in your website through which hackers can gain access. Many hacked websites are compromised through weaknesses in old or neglected software.<\/p>\n<blockquote><p><strong>SEE ALSO:<\/strong> <a href=\"https:\/\/www.webii.net\/blog\/2016\/04\/how-to-fix-a-hacked-wordpress-site\/\">How to Fix a Hacked WordPress Site<\/a><\/p><\/blockquote>\n<p>Unfortunately, Joomla is a common target for abusive hackers. Joomla can be challenging to upgrade, and in many cases has to be rebuilt completely if the new version is dramatically different than the site\u2019s current version. This means there are still many Joomla websites that are not regularly maintained with upgrades. And the longer a site is left using old versions of software, the more opportunities hackers have to find vulnerabilities.<\/p>\n<p>Hacking can happen to anyone. Large websites, small websites, <a href=\"https:\/\/www.webii.net\/e-commerce\/\">e-commerce websites<\/a>, and personal blogs can all be hacked. It is also difficult to completely prevent hacking because hackers can exploit even small weaknesses and they are always hunting for new vulnerabilities. As a result, you need to be prepared to handle a hacking incident even if you feel as if your website could not possibly be of interest to hackers.<\/p>\n<h2>What kind of damage can hacking cause?<\/h2>\n<p>There are many ways for a hacker to damage your site. The exact strategy the hacker uses will determine how you repair the site. Following are a few samples of ways a site might be hacked, and how the problem might best be addressed.<\/p>\n<h3>Exploitation of a faulty extension<\/h3>\n<p>Joomla extensions allow you to add functionality to your Joomla website. \u00a0 However, an old or unsupported extension might be used by a hacker to upload malware to your website. In these cases, your web development company will need to remove the malware, as well as either remove or upgrade the extension in order to prevent future hacking incidents.<\/p>\n<h3>Added code or URLs<\/h3>\n<p>Joomla websites that fail to set the correct permissions may be vulnerable to hackers who simply add to or rewrite their code. The result is a malfunctioning website. These hacking incidents are best resolved by having your web developer troubleshoot your code, identify and remove the additions, and perhaps even install a backup version of your website in order to completely eliminate the infection.<\/p>\n<h3>Deleted or redirected site<\/h3>\n<p>Sometimes, a hacker will simply delete your website and replace it with their own content. They may also redirect your site to their own material. This content usually consists of messaging or promotions that have nothing to do with your site. The best way to deal with these issues is to restore your website using a recent backup.<\/p>\n<h2><img decoding=\"async\" class=\"alignnone size-full wp-image-4222 lazyload\" data-src=\"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/joomla-conference-photo.jpg\" alt=\"photo from a Joomla conference\" width=\"650\" height=\"404\" data-srcset=\"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/joomla-conference-photo.jpg 650w, https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/joomla-conference-photo-121x75.jpg 121w, https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/joomla-conference-photo-300x186.jpg 300w\" data-sizes=\"(max-width: 650px) 100vw, 650px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 650px; --smush-placeholder-aspect-ratio: 650\/404;\" \/><\/h2>\n<h2>What are the best ways to prevent a hacked Joomla site?<\/h2>\n<p>In every instance where you experience a hacked Joomla site, you will need to take measures to prevent hacking in the future. Plus, because hacking can be difficult to fix, it is wise to take measures to prevent it in the first place. Following are a few recommendations for preventing a hacked Joomla site.<\/p>\n<h3>Upgrade software whenever possible<\/h3>\n<p>As mentioned above, weaknesses in your software can make it easier for hackers to get into your site. As a result, make sure to upgrade your software often in order to shore up weaknesses and keep your security strong. This does pose a challenge to many business owners since Joomla can be difficult to upgrade, especially when there is a large gap between the old and new versions.<\/p>\n<h3>Make frequent backups of the website files and databases<\/h3>\n<p>Because backups are often necessary in order to fix a hacked site, you should make frequent backups of your website files and databases. These backups ensure that you always have a recent version of your website to use if needed.<\/p>\n<h3>Host the site with a professional web hosting company<\/h3>\n<p>A web hosting company has security measures they can put in place that will exceed what you could accomplish yourself.<\/p>\n<h3>Use a maintenance plan<\/h3>\n<p>Web development companies often provide maintenance plans. These plans offer you site maintenance and regular updates. Check with your web developer to see if they offer this option.<\/p>\n<h3>Install only reliable extensions<\/h3>\n<p>Since faulty or old extensions can lead to hacking, install only reliable extensions to your Joomla website. This means choosing extensions that are supported and regularly updated.<\/p>\n<p>Preventing a hacked Joomla site is the best strategy. That is why it is important to know how a hacker can get into your site and what they might do once they are there. However, even if you take preventative measures, your site might still be hacked. In these cases, consulting your web development company or a web security company and being prepared with backups can go a long way toward helping you deal quickly with the problem and establish measures to keep the hacking from happening again.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Joomla offers you many advantages when you are creating and managing your website, not the least of which is the fact that it is open source. However, a Joomla site, like every other website, can be hacked. By taking advantage of weaknesses in your servers, software, extensions, and security, hackers can create multiple issues on [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":4218,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[47,7,300],"tags":[],"class_list":["post-4217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-web-site-maintenance","category-www-learning-center"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Fix a Hacked Joomla Site - WEBii<\/title>\n<meta name=\"description\" content=\"Don&#039;t let your Joomla site fall victim to cyber criminals. Here is what you need to do to in the case of an attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Fix a Hacked Joomla Site\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t let your Joomla site fall victim to cyber criminals. Here is what you need to do to in the case of an attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/\" \/>\n<meta property=\"og:site_name\" content=\"Web Marketing &amp; Web Development Company Blog - WEBii\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/webiinet\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-21T20:28:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-18T18:09:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/security-breached-website.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ruth Hawk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruth Hawk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/\"},\"author\":{\"name\":\"Ruth Hawk\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/person\\\/5db70e01e8420d2c82f04a221c5151d0\"},\"headline\":\"How to Fix a Hacked Joomla Site\",\"datePublished\":\"2016-04-21T20:28:27+00:00\",\"dateModified\":\"2022-02-18T18:09:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/\"},\"wordCount\":1133,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/security-breached-website.jpg\",\"articleSection\":[\"How To\",\"Web Site Maintenance\",\"WWW Learning Center\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/\",\"name\":\"How to Fix a Hacked Joomla Site - WEBii\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/security-breached-website.jpg\",\"datePublished\":\"2016-04-21T20:28:27+00:00\",\"dateModified\":\"2022-02-18T18:09:09+00:00\",\"description\":\"Don't let your Joomla site fall victim to cyber criminals. Here is what you need to do to in the case of an attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/security-breached-website.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/security-breached-website.jpg\",\"width\":650,\"height\":536,\"caption\":\"Security Breach Hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/how-to-fix-a-hacked-joomla-site\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To\",\"item\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/category\\\/how-to\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Fix a Hacked Joomla Site\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/\",\"name\":\"Web Marketing &amp; Web Development Company Blog - WEBii\",\"description\":\"web design . web development . seo . marketing . web hosting . + more\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#organization\",\"name\":\"WEBii\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/fb-banner-webii-seo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/fb-banner-webii-seo.jpg\",\"width\":1200,\"height\":598,\"caption\":\"WEBii\"},\"image\":{\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/#\\\/schema\\\/person\\\/5db70e01e8420d2c82f04a221c5151d0\",\"name\":\"Ruth Hawk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/7a6\\\/7a6b61c58ec3fba8e13b58b88bf41a94x96.jpg\",\"url\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/7a6\\\/7a6b61c58ec3fba8e13b58b88bf41a94x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.webii.net\\\/blog\\\/wp-content\\\/wphb-cache\\\/gravatar\\\/7a6\\\/7a6b61c58ec3fba8e13b58b88bf41a94x96.jpg\",\"caption\":\"Ruth Hawk\"},\"description\":\"Content Specialist\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/webiinet\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Fix a Hacked Joomla Site - WEBii","description":"Don't let your Joomla site fall victim to cyber criminals. Here is what you need to do to in the case of an attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/","og_locale":"en_US","og_type":"article","og_title":"How to Fix a Hacked Joomla Site","og_description":"Don't let your Joomla site fall victim to cyber criminals. Here is what you need to do to in the case of an attack.","og_url":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/","og_site_name":"Web Marketing &amp; Web Development Company Blog - WEBii","article_author":"https:\/\/www.facebook.com\/webiinet","article_published_time":"2016-04-21T20:28:27+00:00","article_modified_time":"2022-02-18T18:09:09+00:00","og_image":[{"width":650,"height":536,"url":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/security-breached-website.jpg","type":"image\/jpeg"}],"author":"Ruth Hawk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruth Hawk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#article","isPartOf":{"@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/"},"author":{"name":"Ruth Hawk","@id":"https:\/\/www.webii.net\/blog\/#\/schema\/person\/5db70e01e8420d2c82f04a221c5151d0"},"headline":"How to Fix a Hacked Joomla Site","datePublished":"2016-04-21T20:28:27+00:00","dateModified":"2022-02-18T18:09:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/"},"wordCount":1133,"commentCount":0,"publisher":{"@id":"https:\/\/www.webii.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#primaryimage"},"thumbnailUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/security-breached-website.jpg","articleSection":["How To","Web Site Maintenance","WWW Learning Center"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/","url":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/","name":"How to Fix a Hacked Joomla Site - WEBii","isPartOf":{"@id":"https:\/\/www.webii.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#primaryimage"},"image":{"@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#primaryimage"},"thumbnailUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/security-breached-website.jpg","datePublished":"2016-04-21T20:28:27+00:00","dateModified":"2022-02-18T18:09:09+00:00","description":"Don't let your Joomla site fall victim to cyber criminals. Here is what you need to do to in the case of an attack.","breadcrumb":{"@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#primaryimage","url":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/security-breached-website.jpg","contentUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2016\/04\/security-breached-website.jpg","width":650,"height":536,"caption":"Security Breach Hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/www.webii.net\/blog\/how-to-fix-a-hacked-joomla-site\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.webii.net\/blog\/"},{"@type":"ListItem","position":2,"name":"How To","item":"https:\/\/www.webii.net\/blog\/category\/how-to\/"},{"@type":"ListItem","position":3,"name":"How to Fix a Hacked Joomla Site"}]},{"@type":"WebSite","@id":"https:\/\/www.webii.net\/blog\/#website","url":"https:\/\/www.webii.net\/blog\/","name":"Web Marketing &amp; Web Development Company Blog - WEBii","description":"web design . web development . seo . marketing . web hosting . + more","publisher":{"@id":"https:\/\/www.webii.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.webii.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.webii.net\/blog\/#organization","name":"WEBii","url":"https:\/\/www.webii.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webii.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2015\/12\/fb-banner-webii-seo.jpg","contentUrl":"https:\/\/www.webii.net\/blog\/wp-content\/uploads\/2015\/12\/fb-banner-webii-seo.jpg","width":1200,"height":598,"caption":"WEBii"},"image":{"@id":"https:\/\/www.webii.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.webii.net\/blog\/#\/schema\/person\/5db70e01e8420d2c82f04a221c5151d0","name":"Ruth Hawk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.webii.net\/blog\/wp-content\/wphb-cache\/gravatar\/7a6\/7a6b61c58ec3fba8e13b58b88bf41a94x96.jpg","url":"https:\/\/www.webii.net\/blog\/wp-content\/wphb-cache\/gravatar\/7a6\/7a6b61c58ec3fba8e13b58b88bf41a94x96.jpg","contentUrl":"https:\/\/www.webii.net\/blog\/wp-content\/wphb-cache\/gravatar\/7a6\/7a6b61c58ec3fba8e13b58b88bf41a94x96.jpg","caption":"Ruth Hawk"},"description":"Content Specialist","sameAs":["https:\/\/www.facebook.com\/webiinet"]}]}},"_links":{"self":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/posts\/4217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/comments?post=4217"}],"version-history":[{"count":0,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/posts\/4217\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/media\/4218"}],"wp:attachment":[{"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/media?parent=4217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/categories?post=4217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webii.net\/blog\/wp-json\/wp\/v2\/tags?post=4217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}