{"id":2549,"date":"2023-11-02T13:00:00","date_gmt":"2023-11-02T17:00:00","guid":{"rendered":"https:\/\/inversetech.com\/?p=2549"},"modified":"2023-11-03T14:00:08","modified_gmt":"2023-11-03T18:00:08","slug":"you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors","status":"publish","type":"post","link":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/","title":{"rendered":"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;10px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<p class=\"s6\"><span class=\"s5\">This is the last in our three-part series on businesses being under attack. The first two on <\/span><span class=\"s5\">cybersecurity<\/span><span class=\"s5\"> and facility security, respectively, were obvious examples of how your business might be vulnerable. This third, related to your competition, takes a slightly different perspective. It&#8217;s more about how you might be helping your competitors attack your business, which is not what you want to do.<\/p>\n<p><\/span><span class=\"s5\">In addition to highlighting some ways you might be giving business away, we&#8217;re including ideas on how to stop the attrition using technology as just one of many tools.<\/p>\n<p><\/span><strong><span class=\"s7\">You&#8217;re delivering mediocre service<\/span><\/strong><span class=\"s5\"><strong>.<\/strong><br \/><\/span><span class=\"s5\">It is a fact that customers will accept lackluster service up to a point. That point often depends on the industry, available options, and industry norms. If the level of service you deliver to your customers too often falls into the &#8220;lackluster&#8221; level, don&#8217;t assume your customer will tolerate it indefinitely. Remember, your competitors are likely routinely soliciting your customers for their business. Why help them? Technology can help whether it is a more efficient way for customers to communicate with you via phone, text, email, or even chat. Setting up a system for customers to self-select urgent requests can go a long way in making customers feel you are trying to deliver good service.<\/p>\n<p><\/span><span class=\"s7\"><strong>You&#8217;ve not kept up with the times.<\/strong><br \/><\/span><span class=\"s5\">Customers who want to place an order but can&#8217;t do so online because you still need to establish an e-commerce process may easily be wooed by your competition that does. Instead of requiring customers to email or call in an order, how much more efficient would it be for you and them to go online and place the order? Our IT services can help ensure your business has <\/span><span class=\"s5\">all the<\/span><span class=\"s5\"> proper infrastructure to support your e-commerce needs, including routers and switches, firewalls, and servers.<\/p>\n<p><\/span><strong><span class=\"s7\">You&#8217;re delivering reactive rather than proactive service<\/span><\/strong><span class=\"s5\"><strong>.<\/strong><br \/><\/span><span class=\"s5\">Hoping you have satisfied customers is not enough. Instead of responding to negative feedback and complaints as they come in, smart business owners proactively manage the customer experience, pre-empting problems before they become lost customers. Setting up<\/span><span class=\"s7\">\u00a0<\/span><span class=\"s5\">automated customer feedback processes helps to identify problems quickly so you can address any issues before they become customer service disasters. It has been said that the best way to improve customer loyalty is to proactively deal with problems head-on. Customers know there are <\/span><span class=\"s5\">service failures everywhere; it&#8217;s how you handle the failures that can make the difference. But it is too late if your customer has already switched to your competitor.<\/p>\n<p><\/span><strong><span class=\"s7\">You&#8217;re not maintaining a high and positive online presence.<br \/><\/span><\/strong><span class=\"s5\">Establishing and maintaining a favorable profile online not only helps to attract new customers but reassures existing customers that they&#8217;ve made a good choice in working with you. Google My Business reviews are an excellent way to elevate your business online, letting your competition know you&#8217;re delivering high-quality service to your customers.<\/p>\n<p><\/span><strong><span class=\"s7\">You aren&#8217;t responsive<\/span><\/strong><span class=\"s5\"><strong>.<br \/><\/strong><\/span><span class=\"s5\">Don&#8217;t make customers spend time trying to track you down. VoIP (voice over internet protocol) systems allow customers to connect with you whenever, wherever. Simply put, it is a single communication solution, linking a laptop, a desk phone, and a mobile phone to one number. Unified Communications can enhance productivity, streamline communication, and deliver a seamless experience for internal and external communication.<\/p>\n<p><\/span><span class=\"s7\"><strong>Your systems are down \u2026 a lot.<\/strong><br \/><\/span><span class=\"s5\">Nowadays, when a company&#8217;s systems are down or the website crashes, all business comes to a screeching halt. Maybe you have a few folks internally tasked to manage your IT needs, but <\/span><span class=\"s5\">is<\/span><span class=\"s5\"> it time to rethink that? If you are losing orders, business, or customers because of downtime, a possible solution is &#8220;managed services.&#8221; Our managed services can provide the support your organization needs to maintain productivity and peak efficiency while freeing up your internal resources to focus on core business functions. We offer a full range of services, including help desk, break-fix, ongoing monitoring, and systems management. Let us handle your IT management, freeing your internal staff to focus on your core business.<\/p>\n<p><\/span><span class=\"s5\">If your business is guilty of any of the above, you are asking your customers to go to your competitors. Let&#8217;s discuss how our IT services can help you retain and grow your customer base.<\/span><span class=\"s7\">\u00a0<\/span><span class=\"s5\">Call 800-854-2444 today to schedule a free consultation to talk about the many ways technology can help you keep your customers satisfied, or go online to learn more at\u00a0<\/span><a href=\"https:\/\/inversetech.com\/it-services\/\"><span class=\"s8\">https:\/\/inversetech.com\/it-services\/<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>This is the last in our three-part series on businesses being under attack. The first two on cybersecurity and facility security, respectively, were obvious examples of how your business might be vulnerable. This third, related to your competition, takes a slightly different perspective. It&#8217;s more about how you might be helping your competitors attack your [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2545,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[14,17],"tags":[],"class_list":["post-2549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors - Inverse<\/title>\n<meta name=\"description\" content=\"Enhance your business with improved service quality, advanced technology, and proactive customer care. Discover the importance of online presence, responsiveness, and managed services to stay ahead in today&#039;s competitive market\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors - Inverse\" \/>\n<meta property=\"og:description\" content=\"Enhance your business with improved service quality, advanced technology, and proactive customer care. Discover the importance of online presence, responsiveness, and managed services to stay ahead in today&#039;s competitive market\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\" \/>\n<meta property=\"og:site_name\" content=\"Inverse\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-02T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-03T18:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ray Richeson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ray Richeson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\"},\"author\":{\"name\":\"Ray Richeson\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143\"},\"headline\":\"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors\",\"datePublished\":\"2023-11-02T17:00:00+00:00\",\"dateModified\":\"2023-11-03T18:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\"},\"wordCount\":873,\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png\",\"articleSection\":[\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\",\"url\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\",\"name\":\"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors - Inverse\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png\",\"datePublished\":\"2023-11-02T17:00:00+00:00\",\"dateModified\":\"2023-11-03T18:00:08+00:00\",\"description\":\"Enhance your business with improved service quality, advanced technology, and proactive customer care. Discover the importance of online presence, responsiveness, and managed services to stay ahead in today's competitive market\",\"breadcrumb\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png\",\"width\":787,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/inversetech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/inversetech.com\/#website\",\"url\":\"https:\/\/inversetech.com\/\",\"name\":\"Inverse\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/inversetech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/inversetech.com\/#organization\",\"name\":\"Inverse\",\"url\":\"https:\/\/inversetech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"width\":202,\"height\":130,\"caption\":\"Inverse\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143\",\"name\":\"Ray Richeson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g\",\"caption\":\"Ray Richeson\"},\"sameAs\":[\"http:\/\/Inversetech.com\"],\"url\":\"https:\/\/inversetech.com\/author\/inverse\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors - Inverse","description":"Enhance your business with improved service quality, advanced technology, and proactive customer care. Discover the importance of online presence, responsiveness, and managed services to stay ahead in today's competitive market","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/","og_locale":"en_US","og_type":"article","og_title":"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors - Inverse","og_description":"Enhance your business with improved service quality, advanced technology, and proactive customer care. Discover the importance of online presence, responsiveness, and managed services to stay ahead in today's competitive market","og_url":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/","og_site_name":"Inverse","article_published_time":"2023-11-02T17:00:00+00:00","article_modified_time":"2023-11-03T18:00:08+00:00","og_image":[{"width":787,"height":443,"url":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png","type":"image\/png"}],"author":"Ray Richeson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ray Richeson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#article","isPartOf":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/"},"author":{"name":"Ray Richeson","@id":"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143"},"headline":"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors","datePublished":"2023-11-02T17:00:00+00:00","dateModified":"2023-11-03T18:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/"},"wordCount":873,"publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"image":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage"},"thumbnailUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png","articleSection":["Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/","url":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/","name":"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors - Inverse","isPartOf":{"@id":"https:\/\/inversetech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage"},"image":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage"},"thumbnailUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png","datePublished":"2023-11-02T17:00:00+00:00","dateModified":"2023-11-03T18:00:08+00:00","description":"Enhance your business with improved service quality, advanced technology, and proactive customer care. Discover the importance of online presence, responsiveness, and managed services to stay ahead in today's competitive market","breadcrumb":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#primaryimage","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-Part-Three-Competition-min.png","width":787,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-three-you-are-sending-your-customers-to-your-competitors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/inversetech.com\/"},{"@type":"ListItem","position":2,"name":"You Know Your Business is Under Attack \u2013 Right? Part Three:\u00a0You Are Sending Your Customers to Your Competitors"}]},{"@type":"WebSite","@id":"https:\/\/inversetech.com\/#website","url":"https:\/\/inversetech.com\/","name":"Inverse","description":"","publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inversetech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/inversetech.com\/#organization","name":"Inverse","url":"https:\/\/inversetech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","width":202,"height":130,"caption":"Inverse"},"image":{"@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143","name":"Ray Richeson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g","caption":"Ray Richeson"},"sameAs":["http:\/\/Inversetech.com"],"url":"https:\/\/inversetech.com\/author\/inverse\/"}]}},"_links":{"self":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/comments?post=2549"}],"version-history":[{"count":3,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2549\/revisions"}],"predecessor-version":[{"id":2588,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2549\/revisions\/2588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media\/2545"}],"wp:attachment":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media?parent=2549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/categories?post=2549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/tags?post=2549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}