{"id":38826,"date":"2024-07-17T09:07:02","date_gmt":"2024-07-17T14:07:02","guid":{"rendered":"https:\/\/iticollege.edu\/?p=38826"},"modified":"2024-07-17T09:07:02","modified_gmt":"2024-07-17T14:07:02","slug":"best-practices-for-secure-programming","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/","title":{"rendered":"Best Practices For Secure Programming In The Modern Era"},"content":{"rendered":"<p>Programming in all its applications must be secure to protect sensitive data, operating systems, and networks. Criminal practices are <em>on the rise<\/em>, and organizations without enough secure programming put themselves at the mercy of cybercriminals.<\/p>\n<p>Hackers research to find <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/data-security-mistakes-that-every-company-makes\/\" target=\"_blank\" rel=\"noopener\"><strong>organizations that have weak cybersecurity protection<\/strong><\/a> and prey on them. To successfully protect ourselves from hackers, we need to understand the basics of secure coding, the best secure practices, and how to train employees in their use. New security tools are available today that do a fantastic job of deterring cyber attackers. <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/contact-us\/\" target=\"_blank\" rel=\"noopener\"><strong>Contact ITI Technical College today for more information about our programs<\/strong><\/a>.<\/p>\n<h2><strong>What Is Secure Coding<\/strong><\/h2>\n<p>Secure programming involves writing code and developing software to limit the risk of data breaches, cyber-attacks, and other cyber-criminal activities. To accomplish this goal, <strong>companies must use best practices<\/strong>, coding standards, and adequate security measures. These methods will identify and fix program codes\u2019 vulnerabilities.<\/p>\n<p>The objective of secure coding is to protect information and provide a safe online environment for all users. It is important for:<\/p>\n<ul>\n<li>Embedded Devices<\/li>\n<li>Mobile Devices<\/li>\n<li>Personal Computers<\/li>\n<li>Servers<\/li>\n<li>Software<\/li>\n<\/ul>\n<p>When computers and other digital device applications are not secure, serious consequences can surface. Examples include compromised secrets, damage to systems, and loss of service. Secure coding practices can prevent common issues that hackers commonly exploit. The result is the preservation of data, saving money, and reducing frustration. As attackers become smarter, new coding procedures must be implemented to thwart their activities.<\/p>\n<h2><strong>Best Secure Programming Practices<\/strong><\/h2>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Security-Training-1-2.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-38931 alignright\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Security-Training-1-300x196.jpg\" alt=\"Secure Coding Practices\" width=\"300\" height=\"196\" \/><\/a>Programming practices must be effective in our interconnected digital world and have become a priority for software developers. <strong>Cyber attacks can be reduced<\/strong> or prevented by writing better and more secure source code. Source code is translated into working instructions, then read and carried out by a computer. Here are typical examples of best secure practices:<\/p>\n<ul>\n<li><strong>Code Minification And Obfuscation <\/strong>are great places to start. By making the code more difficult to access and harder to read, attackers can be stopped. This technique removes white space and line breaks from code. Obfuscation is more effective because it turns human-understood code into text that is difficult to understand.<\/li>\n<li><strong>Avoiding Shortcuts <\/strong>to release code into faster production must be practiced. With time, code bases tend to become larger, and there is a temptation to deliver working code too soon. The likelihood of security gaps goes up when this happens.<\/li>\n<li><strong>Automated Scanning &amp; Code Reviews <\/strong>are invaluable tools to scan your code to find vulnerabilities that hackers may exploit. Users and developers must avoid weaknesses in their code that fail to distinguish data from commands. As an example, SQL injection attacks try to steal or manipulate stored data.<\/li>\n<li><strong>Avoiding Components With Known Vulnerabilities <\/strong>is another critical way to save your data and computer system. Installing <em>packages<\/em> composed of components and libraries can save time and labor, but they create vulnerabilities. Entry points may be available for malicious cybercriminals to exploit your data. Refrain from components with known vulnerabilities and monitor for new ones to maintain the integrity of your code.<\/li>\n<li><strong>Auditing And Logging<\/strong> is another technique you must put into regular practice. An example is a production environment where you deploy new code. Use software that has sufficient logging and monitoring that allows you to detect potential attacks.<\/li>\n<\/ul>\n<p>Research the market for the most effective tools and practices that meet your organization\u2019s current and future needs.<\/p>\n<table style=\"width: 99.8255%; height: 47px;\" width=\"638\">\n<tbody>\n<tr style=\"height: 47px;\">\n<td style=\"height: 47px; width: 100%; text-align: center;\" width=\"638\"><span style=\"font-size: 10pt;\"><strong><em>\u201cCriminal practices are on the rise, and organizations without enough secure programming put themselves at the mercy of cybercriminals.\u201d<\/em><\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Organizations Need Secure Code Training Tools\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/h2>\n<p>Employees who write secure code need adequate training to protect their companies. Tools are available to educate developers on best practices and techniques to accomplish this goal. These tools provide a variety of education, including:<\/p>\n<ul>\n<li>Coding challenges<\/li>\n<li>Mitigation strategies<\/li>\n<li>Practical interactive lessons<\/li>\n<li>Preventing vulnerabilities in software<\/li>\n<li>Secure coding for comprehensive languages<\/li>\n<li>Security best practices<\/li>\n<\/ul>\n<p>Some of today\u2019s top-rated tools are <strong>Appsec Elearning, SecureFlag, Security Compass, Avatao, Immersive Labs, and Secure Code Warrior.<\/strong> Engaging in training and direct application of security principles prepares developers to address and mitigate security risks in their coding practices.<\/p>\n<h2><strong>Build An Organizational Culture Of Security<\/strong><\/h2>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Program-Training-1-2.jpg\"><img decoding=\"async\" class=\"alignleft size-full wp-image-38933\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Program-Training-1-2.jpg\" alt=\"Best Coding Practices\" width=\"301\" height=\"200\" \/><\/a>There are other steps organizations can take beyond training in the basics of programming security. A critical move is adopting a multi-layer security approach by building a culture of security with employees, managers, owners, and external stakeholders.<\/p>\n<p>Another crucial step is developing a secure software development life cycle to make sure your protection stays up to date. This means creating and maintaining applications from gathering requirements for new applications to adding features to deployment.<\/p>\n<p>The third step is using automated tools to save time and effort. Specialized tools can shorten scan times, increase accuracy, return fewer false positives, and lessen eroding developer trust. These tools make a developer\u2019s work more efficient and actionable.<\/p>\n<p>Learn more about our <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/our-programs\/information-technology\/\" target=\"_blank\" rel=\"noopener\"><strong>Information Technology (AOS) Associate In Occupational Studies Degree<\/strong><\/a> by contacting ITI Technical College in <a href=\"https:\/\/www.brla.gov\/\" target=\"_blank\" rel=\"noopener\"><strong>Baton Rouge<\/strong><\/a>. We have been successfully training technical students for better careers since 1973.<\/p>\n<p>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:<strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Programming in all its applications must be secure to protect sensitive data, operating systems, and networks. Criminal practices are on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":49891,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[67],"tags":[],"class_list":["post-38826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Programming Is Crucial To Protect Data | ITI College<\/title>\n<meta name=\"description\" content=\"Secure Programming Is Part Of A College Information Technology Training Program. Call Us Or Visit Our Website Today For More Information!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Programming Is Crucial To Protect Data | ITI College\" \/>\n<meta property=\"og:description\" content=\"Secure Programming Is Part Of A College Information Technology Training Program. Call Us Or Visit Our Website Today For More Information!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-17T14:07:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Best Practices For Secure Programming In The Modern Era\",\"datePublished\":\"2024-07-17T14:07:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\"},\"wordCount\":868,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg\",\"articleSection\":[\"Information Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\",\"name\":\"Secure Programming Is Crucial To Protect Data | ITI College\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg\",\"datePublished\":\"2024-07-17T14:07:02+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"Secure Programming Is Part Of A College Information Technology Training Program. Call Us Or Visit Our Website Today For More Information!\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg\",\"width\":945,\"height\":600,\"caption\":\"Secure Coding\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Practices For Secure Programming In The Modern Era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Programming Is Crucial To Protect Data | ITI College","description":"Secure Programming Is Part Of A College Information Technology Training Program. Call Us Or Visit Our Website Today For More Information!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/","og_locale":"en_US","og_type":"article","og_title":"Secure Programming Is Crucial To Protect Data | ITI College","og_description":"Secure Programming Is Part Of A College Information Technology Training Program. Call Us Or Visit Our Website Today For More Information!","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/","og_site_name":"ITI College","article_published_time":"2024-07-17T14:07:02+00:00","og_image":[{"width":945,"height":600,"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Best Practices For Secure Programming In The Modern Era","datePublished":"2024-07-17T14:07:02+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/"},"wordCount":868,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg","articleSection":["Information Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/","name":"Secure Programming Is Crucial To Protect Data | ITI College","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg","datePublished":"2024-07-17T14:07:02+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"Secure Programming Is Part Of A College Information Technology Training Program. Call Us Or Visit Our Website Today For More Information!","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Secure-Coding-2.jpg","width":945,"height":600,"caption":"Secure Coding"},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/best-practices-for-secure-programming\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Best Practices For Secure Programming In The Modern Era"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/38826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=38826"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/38826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media\/49891"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=38826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=38826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=38826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}