{"id":226,"date":"2018-03-06T07:06:09","date_gmt":"2018-03-06T07:06:09","guid":{"rendered":"https:\/\/www.thetexting.com\/blog\/?p=226"},"modified":"2019-04-23T16:50:35","modified_gmt":"2019-04-23T16:50:35","slug":"two-factor-authentication-2fa","status":"publish","type":"post","link":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/","title":{"rendered":"TWO FACTOR AUTHENTICATION &#8211; Why &#038; How to use it"},"content":{"rendered":"<p><span style=\"color: #333300;\"><strong>TWO FACTOR AUTHENTICATION:<\/strong><\/span><\/p>\n<hr>\n<p>In the struggle for better security \u2013 millions of dollars are spent by companies worldwide. Standard usernames and passwords are insufficient to protect sensitive information. Phishing scams, data breaches, brute force attacks and other malware attacks have been common nowadays, which clearly suggest that usernames and static passwords can easily be leaked, cracked or captured. Many of us are in jeopardy of getting our accounts hacked due to unsafe mobile wifi network usage, we also use the same password for multiple online platforms that make it easier for hackers to get into our accounts. Only two-factor authentication can ensure that the only person that is logging into your account is you \u2013 an excellent way to thwart brute force attacks and hacks when your password is compromised.<\/p>\n<p>For creating an account on Gmail, Facebook, Twitter, Linkedin, Snapchat, you need to confirm your identity by entering a code that has been sent via SMS. Two Factor authentication requires two ways of proving your identity for your online account <span style=\"color: #3366ff;\"><strong><a style=\"color: #3366ff;\" href=\"https:\/\/www.thetexting.com\/blog\/mobile-phone-verification\/\">verification<\/a><\/strong>.<\/span> However, two-factor authentication does not claim to offer a foolproof security, yet it adds an extra line of defense to your overall account security.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 180px;\"><img loading=\"lazy\" class=\"aligncenter size-large wp-image-284\" src=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/leadinga-healthy-lifestyle-1-504x1024.png\" alt=\"Thetexting Two Factor Authentication\" width=\"504\" height=\"1024\" srcset=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/leadinga-healthy-lifestyle-1-504x1024.png 504w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/leadinga-healthy-lifestyle-1-148x300.png 148w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/leadinga-healthy-lifestyle-1-768x1562.png 768w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/leadinga-healthy-lifestyle-1.png 800w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>We regularly go through the process of two-factor authentication without realizing about it. For instance, when you swipe your debit or credit, you are required to enter a PIN number.<\/p>\n<p>Multiple factor authentication or two-factor authentication 2FA is a next level security tool. Right now, the most common practice of two factor authentication is during log in, when you are required to enter your username and password and then receive an authentication code which will verify that the person who is trying to get an access is a verified user (the genuine account holder) or an unknown nefarious individual.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Two Factor Authentication via SMS<\/strong><\/h2>\n<p>Although there are third&nbsp;party two-factor authenticators present like Google Authenticator and Authy.<br \/>\nStill, companies or application owners count on SMS API providers or network carriers for sending 2FA codes.<br \/>\nTo combat the threatening misuse of user identity or sensitive information, leading companies are implementing two-factor authentication through text messages. Clearly, anyone with a mobile phone can use two-factor authentication. There are few app-based two-factor authentication tools, some are internet reliant and some not.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How Does Two Factor Authentication work?<\/strong><\/h2>\n<p>Two-factor authentication operates on three kinds of frameworks<\/p>\n<p><span style=\"color: #333333;\"><strong>1: <u>Something you know<\/u><\/strong><\/span><br \/>\n<span style=\"color: #333333;\"> <strong> 2: <u>Something you have<\/u><\/strong><\/span><br \/>\n<span style=\"color: #333333;\"> <strong> 3: <u>Something you are<\/u><\/strong><\/span><\/p>\n<p>Precisely, two-factor authentication requires <u>two<\/u> of the \u2018SOMETHINGS\u2019 mentioned above.<\/p>\n<p><span style=\"color: #3366ff;\">\u25a0<\/span> You know your username and password or PIN number (something you know)<\/p>\n<p><span style=\"color: #3366ff;\">\u25a0<\/span> You have your mobile phone, smartwatch, or any other device that is flagged as safe (something you have)<\/p>\n<p><span style=\"color: #3366ff;\">\u25a0<\/span>&nbsp;Your biometrics like fingerprints, facial gestures or voice recognition tool (something you are)<\/p>\n<p>Most commonly, the first two are used in 2FA protection, since the biometric feature is quite expensive and very complicated to roll out. Also, end-user experience can be really troublesome using biometric tools.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How 2FA is used:<\/strong><\/h2>\n<p>A user in the first step will enter username and password. Secondly, a numerical code will be sent to the user that will last for a few seconds only. Multiple or two factor authentication codes are constantly generated, unlike the PIN number of the debit card that is fixed. This means, whenever you will log in, you will receive a new security code on your mobile phone or any other device.<\/p>\n<p style=\"padding-left: 90px;\"><img loading=\"lazy\" class=\"aligncenter size-large wp-image-228\" src=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/two-factor-1024x683.jpg\" alt=\"two factor\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/two-factor-1024x683.jpg 1024w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/two-factor-300x200.jpg 300w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/two-factor-768x512.jpg 768w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/two-factor-600x400.jpg 600w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/two-factor.jpg 1254w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h2><strong>The Next-Level Shield<\/strong><\/h2>\n<p>In terms of added value, two factor authentication has been a real nightmare for scammers and hackers.<br \/>\nNow, using brute force attacks or intercepting both username and password is not a big deal anymore. However, when a verification code is sent to a mobile phone that marks the moment where a hacker is merely, a spectator.<\/p>\n<p>Two factor authentication is a user friendly security mechanism for all end users. It hardly demands any effort from the account users, making it extremely effortless and convenient to get maximum leverage. No security product can ever be 100% foolproof. Nonetheless, two factor authentication can at least enhance security level from any unknown threats.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Does authentication matter?<\/strong><\/h2>\n<p>Safe and secure communication over the internet is the modern day need as never before.<\/p>\n<p>With scammers and hackers getting more and more sophisticated and technologically equipped, it is important to take additional security measures for secured communication. Renowned web giants Microsoft, Google, Amazon, Alibaba are all using SMS for two factor authentication. Even tech innovators like all-in-one chat app \u2018WeChat\u2019 is counting on SMS verification for cost effective and reliable communication to its end users.<\/p>\n<p>Two factor authentication makes it difficult for hackers to target your accounts. Intensively secured accounts mean additional effort to be made by a hacker and making your accounts less attractive target. Random static passwords take minutes to break, and similarly, to hijack an account that is protected through 2FA requires not only your password but also an access to your mobile phone.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 150px;\"><img loading=\"lazy\" class=\"aligncenter wp-image-230 size-large\" src=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/tt-e1520323530518-539x1024.jpg\" alt=\"two factor\" width=\"539\" height=\"1024\" srcset=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/tt-e1520323530518-539x1024.jpg 539w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/tt-e1520323530518-158x300.jpg 158w, https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/tt-e1520323530518.jpg 639w\" sizes=\"(max-width: 539px) 100vw, 539px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Final Thoughts<\/strong><\/h2>\n<p>According to our philosophy, all businesses or even independent firms should use two factor authentication for reliable and risk free communication. We would recommend you to roll out 2FA text messages, especially for account verification. Make no further delay to deploy additional security layer on your user accounts.<\/p>\n<p>Integrate your applications, CRM modules, software, and devices with TheTexting\u2019s RESTful API.<br \/>\nThrough easy integration you can improve your overall security for web logins, application usage, transactions, online payments, and lots more. Only implementing two factor authentication 2FA via SMS is the most pocket-friendly and secured way to send verification codes.<\/p>\n<hr>\n<h2><\/h2>\n<h2><span style=\"color: #0000ff;\"><strong>QUICK INTEGRATION<\/strong><\/span><\/h2>\n<p><span style=\"color: #3366ff;\"><strong>\u2022 <\/strong><\/span>For developer tools : <a href=\"https:\/\/www.thetexting.com\/developers\/\"><strong>https:\/\/www.thetexting.com\/developers\/<\/strong><\/a><strong><br \/>\n<span style=\"color: #3366ff;\">\u2022<\/span>&nbsp;<\/strong>Visit our website :&nbsp;&nbsp;&nbsp; <strong>&nbsp;<\/strong><a href=\"https:\/\/www.thetexting.com\/\"><strong>https:\/\/www.thetexting.com\/<\/strong><\/a><strong><br \/>\n<span style=\"color: #3366ff;\">\u2022<\/span>&nbsp;<\/strong>Contact :&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong>&nbsp; &nbsp;<\/strong><strong><u>9142059159<\/u><\/strong><\/p>\n<p>&nbsp;<\/p>\n<hr>\n<h3><span style=\"color: #000000;\"><strong>RELATED POSTS<br \/>\n<\/strong><\/span><\/h3>\n<h3><strong> <span style=\"color: #3366ff;\">\u2022<\/span>&nbsp;&nbsp;<a href=\"https:\/\/www.thetexting.com\/blog\/one-time-password\/\">One Time Passwords<\/a><br \/>\n<\/strong><\/h3>\n<h3><strong><span style=\"color: #3366ff;\">\u2022<\/span>&nbsp;&nbsp;<a href=\"https:\/\/www.thetexting.com\/blog\/sms-vs-email\/\">SMS VS EMAIL<\/a><\/strong><\/h3>\n<h3><strong><span style=\"color: #3366ff;\">\u2022<\/span>&nbsp;&nbsp;<a href=\"https:\/\/www.thetexting.com\/blog\/mobile-phone-verification\/\">Mobile Phone Verification API<\/a><\/strong><\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-230\" src=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/tt.jpg\" alt=\"two factor\" width=\"774\" height=\"1585\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-230\" src=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/tt.jpg\" alt=\"two factor\" width=\"774\" height=\"1585\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TWO FACTOR AUTHENTICATION: In the struggle for better security \u2013 millions of dollars are spent by companies worldwide. Standard usernames and passwords are insufficient to protect sensitive information. Phishing scams, data breaches, brute force attacks and other malware attacks have been common nowadays, which clearly suggest that usernames and static passwords can easily be leaked, cracked or captured. Many of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":250,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[65],"tags":[60,63,62,61,25,64,59],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.5.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Two Factor Authentication, WHY &amp; HOW TO USE IT | Mobile Security<\/title>\r\n<meta name=\"description\" content=\"TheTexting&#039;s article on using 2FA Two Factor Authentication for Cyber Security. Two Factor Authentication provides added protection to your accounts &amp; makes data sharing safe. All businesses should use Two Factor Authentication for their communication platforms.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Two Factor Authentication, WHY &amp; HOW TO USE IT | Mobile Security\" \/>\r\n<meta property=\"og:description\" content=\"TheTexting&#039;s article on using 2FA Two Factor Authentication for Cyber Security. Two Factor Authentication provides added protection to your accounts &amp; makes data sharing safe. All businesses should use Two Factor Authentication for their communication platforms.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Blog | TheTexting\" \/>\r\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/thetexting\" \/>\r\n<meta property=\"article:published_time\" content=\"2018-03-06T07:06:09+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2019-04-23T16:50:35+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/2FA-1080x486-1.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1168\" \/>\r\n\t<meta property=\"og:image:height\" content=\"531\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Texting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.thetexting.com\/blog\/#website\",\"url\":\"https:\/\/www.thetexting.com\/blog\/\",\"name\":\"Blog | TheTexting\",\"description\":\"EXEMPLARY SMS API PROVIDER\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.thetexting.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/2FA-1080x486-1.jpg\",\"contentUrl\":\"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/2FA-1080x486-1.jpg\",\"width\":1168,\"height\":531,\"caption\":\"Two Factor Authentication\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#webpage\",\"url\":\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/\",\"name\":\"Two Factor Authentication, WHY & HOW TO USE IT | Mobile Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.thetexting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#primaryimage\"},\"datePublished\":\"2018-03-06T07:06:09+00:00\",\"dateModified\":\"2019-04-23T16:50:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.thetexting.com\/blog\/#\/schema\/person\/5a933ad3a0591eded2fc899ef0b68450\"},\"description\":\"TheTexting's article on using 2FA Two Factor Authentication for Cyber Security. Two Factor Authentication provides added protection to your accounts & makes data sharing safe. All businesses should use Two Factor Authentication for their communication platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.thetexting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TWO FACTOR AUTHENTICATION &#8211; Why &#038; How to use it\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.thetexting.com\/blog\/#\/schema\/person\/5a933ad3a0591eded2fc899ef0b68450\",\"name\":\"The Texting\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.thetexting.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c652b0708f7d5203e429331a87bcb7a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5c652b0708f7d5203e429331a87bcb7a?s=96&d=mm&r=g\",\"caption\":\"The Texting\"},\"sameAs\":[\"https:\/\/www.thetexting.com\/\",\"https:\/\/www.facebook.com\/thetexting\"],\"url\":\"https:\/\/www.thetexting.com\/blog\/author\/ttbloguser\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two Factor Authentication, WHY & HOW TO USE IT | Mobile Security","description":"TheTexting's article on using 2FA Two Factor Authentication for Cyber Security. Two Factor Authentication provides added protection to your accounts & makes data sharing safe. All businesses should use Two Factor Authentication for their communication platforms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/","og_locale":"en_US","og_type":"article","og_title":"Two Factor Authentication, WHY & HOW TO USE IT | Mobile Security","og_description":"TheTexting's article on using 2FA Two Factor Authentication for Cyber Security. Two Factor Authentication provides added protection to your accounts & makes data sharing safe. All businesses should use Two Factor Authentication for their communication platforms.","og_url":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/","og_site_name":"Blog | TheTexting","article_author":"https:\/\/www.facebook.com\/thetexting","article_published_time":"2018-03-06T07:06:09+00:00","article_modified_time":"2019-04-23T16:50:35+00:00","og_image":[{"width":1168,"height":531,"url":"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/2FA-1080x486-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Texting","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.thetexting.com\/blog\/#website","url":"https:\/\/www.thetexting.com\/blog\/","name":"Blog | TheTexting","description":"EXEMPLARY SMS API PROVIDER","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thetexting.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/2FA-1080x486-1.jpg","contentUrl":"https:\/\/www.thetexting.com\/blog\/wp-content\/uploads\/2018\/03\/2FA-1080x486-1.jpg","width":1168,"height":531,"caption":"Two Factor Authentication"},{"@type":"WebPage","@id":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#webpage","url":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/","name":"Two Factor Authentication, WHY & HOW TO USE IT | Mobile Security","isPartOf":{"@id":"https:\/\/www.thetexting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#primaryimage"},"datePublished":"2018-03-06T07:06:09+00:00","dateModified":"2019-04-23T16:50:35+00:00","author":{"@id":"https:\/\/www.thetexting.com\/blog\/#\/schema\/person\/5a933ad3a0591eded2fc899ef0b68450"},"description":"TheTexting's article on using 2FA Two Factor Authentication for Cyber Security. Two Factor Authentication provides added protection to your accounts & makes data sharing safe. All businesses should use Two Factor Authentication for their communication platforms.","breadcrumb":{"@id":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.thetexting.com\/blog\/two-factor-authentication-2fa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thetexting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TWO FACTOR AUTHENTICATION &#8211; Why &#038; How to use it"}]},{"@type":"Person","@id":"https:\/\/www.thetexting.com\/blog\/#\/schema\/person\/5a933ad3a0591eded2fc899ef0b68450","name":"The Texting","image":{"@type":"ImageObject","@id":"https:\/\/www.thetexting.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5c652b0708f7d5203e429331a87bcb7a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c652b0708f7d5203e429331a87bcb7a?s=96&d=mm&r=g","caption":"The Texting"},"sameAs":["https:\/\/www.thetexting.com\/","https:\/\/www.facebook.com\/thetexting"],"url":"https:\/\/www.thetexting.com\/blog\/author\/ttbloguser\/"}]}},"_links":{"self":[{"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/posts\/226"}],"collection":[{"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":17,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"predecessor-version":[{"id":552,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/posts\/226\/revisions\/552"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/media\/250"}],"wp:attachment":[{"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thetexting.com\/blog\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}