{"id":2700,"date":"2025-03-26T16:45:07","date_gmt":"2025-03-26T09:45:07","guid":{"rendered":"http:\/\/rbb.local\/?p=2700"},"modified":"2025-07-09T13:26:32","modified_gmt":"2025-07-09T06:26:32","slug":"how-to-protect-your-device-from-scammers","status":"publish","type":"post","link":"https:\/\/rightsbeyondborder.org\/my\/how-to-protect-your-device-from-scammers\/","title":{"rendered":"How to protect your device from scammers?"},"content":{"rendered":"<p>https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers-212&#215;300.png<\/p>\n<p style=\"font-weight: 400;\"><strong>How to protect your device from scammers<\/strong><strong>?<\/strong><\/p>\n<p style=\"font-weight: 400;\">In today&#8217;s digital world, scams have become increasingly sophisticated, and scammers are constantly finding new ways to trick people into giving up sensitive information or downloading malicious software. Whether you&#8217;re using a smartphone, tablet, or computer, it&#8217;s essential to stay vigilant and take steps to protect your device from scammers. Here are some tips to help safeguard your device:<\/p>\n<ol>\n<li style=\"font-weight: 400;\">Install Security Software<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 One of the first steps to protect your device is to install reputable security software. Antivirus programs can detect and block malicious apps, phishing websites, and other types of scams before they cause harm. Make sure your security software is regularly updated to ensure it can defend against the latest threats.<\/p>\n<ol start=\"2\">\n<li style=\"font-weight: 400;\">Keep Your Operating System and Apps Updated<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Scammers often exploit security vulnerabilities in outdated operating systems and apps. Ensure your device\u2019s operating system (Windows, iOS, Android, etc.) is set to automatically update, or check for updates regularly. Updates typically include important security patches that fix vulnerabilities that scammers might use to gain access to your device.<\/p>\n<ol start=\"3\">\n<li style=\"font-weight: 400;\">Enable Multi-Factor Authentication (MFA)<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Multi-factor authentication adds an extra layer of security by requiring more than just a password to access your accounts. Even if scammers manage to steal your password, they won\u2019t be able to access your accounts without the second authentication factor, such as a one-time code sent to your phone or email.<\/p>\n<ol start=\"4\">\n<li style=\"font-weight: 400;\">Be Cautious with Unknown Links and Attachments<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Scammers often use phishing tactics, sending fraudulent emails, text messages, or direct messages on social media, hoping to trick you into clicking on links or downloading attachments. Always double-check the sender\u2019s email address or phone number, and avoid clicking on suspicious links. When in doubt, visit the website directly by typing the URL into your browser.<\/p>\n<ol start=\"5\">\n<li style=\"font-weight: 400;\">Use Strong and Unique Passwords<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 A strong password is one of the most effective ways to protect your device. Use a combination of uppercase and lowercase letters, numbers, and symbols, and avoid using easily guessed passwords like your name or birthdate. Consider using a password manager to generate and store complex passwords for your accounts.<\/p>\n<ol start=\"6\">\n<li style=\"font-weight: 400;\">Enable Device Lock and Encryption<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Make sure your device is locked with a PIN, password, or biometric authentication (fingerprint or face recognition). This prevents unauthorized access to your device if it&#8217;s lost or stolen. Additionally, enable encryption on your device, which protects your personal data even if someone gains physical access to it.<\/p>\n<ol start=\"7\">\n<li style=\"font-weight: 400;\">Avoid Public Wi-Fi for Sensitive Transactions<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Public Wi-Fi networks are often not secure, making it easier for scammers to intercept your data. Avoid conducting sensitive transactions, such as online banking or shopping, while connected to public Wi-Fi. If necessary, use a Virtual Private Network (VPN) to encrypt your connection and protect your data.<\/p>\n<ol start=\"8\">\n<li style=\"font-weight: 400;\">Monitor Your Accounts Regularly<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Keep an eye on your bank and credit card statements, as well as other online accounts, for any unusual activity. If you spot anything suspicious, report it immediately to the relevant institutions. Early detection is key to minimizing the damage caused by scammers.<\/p>\n<ol start=\"9\">\n<li style=\"font-weight: 400;\">Educate Yourself and Others<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Scammers are always evolving their techniques. Stay informed about common scams, and share this knowledge with your friends and family to help them avoid falling victim to fraud. Recognizing warning signs, such as unsolicited requests for personal information or promises of too-good-to-be-true offers, can help you stay one step ahead.<\/p>\n<ol start=\"10\">\n<li style=\"font-weight: 400;\">Use Caution with Remote Access Requests<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Be wary if someone contacts you and asks to remotely access your device for troubleshooting or other purposes. Legitimate companies will never make unsolicited remote access requests. Always verify the identity of the person contacting you, and never grant remote access to your device unless you are sure it\u2019s safe.<\/p>\n<ol start=\"11\">\n<li style=\"font-weight: 400;\">Backup Your Data Regularly<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">\u00a0\u00a0 Regularly back up your device to ensure you don\u2019t lose important data in case of a scam. Some scams, like ransomware, can lock you out of your data or delete it entirely. Having a backup allows you to recover your files if this happens.<\/p>\n<p style=\"font-weight: 400;\">By following these steps, you can significantly reduce the risk of falling victim to scammers and keep your device and personal information secure. Always remember that scammers rely on your lack of caution and awareness\u2014so staying informed and taking proactive security measures will go a long way in protecting your devices.<\/p>\n<p style=\"font-weight: 400;\">By following these steps, you can significantly reduce the risk of falling victim to scammers and keep your device and personal information secure. Always remember that scammers rely on your lack of caution and awareness\u2014so staying informed and taking proactive security measures will go a long way in protecting your devices.<\/p>","protected":false},"excerpt":{"rendered":"<p>https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers-212&#215;300.png How to protect your device from scammers? In today&#8217;s digital world, scams have become increasingly sophisticated, and scammers are constantly finding new ways to trick people into giving up sensitive information or downloading malicious software. Whether you&#8217;re using a smartphone, tablet, or computer, it&#8217;s essential to stay vigilant and take steps to protect your [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2698,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","footnotes":""},"categories":[128,130],"tags":[],"class_list":["post-2700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information","category-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect your device from scammers? - Rights Beyond Border<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rightsbeyondborder.org\/my\/how-to-protect-your-device-from-scammers\/\" \/>\n<meta property=\"og:locale\" content=\"my_MM\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your device from scammers? - Rights Beyond Border\" \/>\n<meta property=\"og:description\" content=\"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers-212&#215;300.png How to protect your device from scammers? In today&#8217;s digital world, scams have become increasingly sophisticated, and scammers are constantly finding new ways to trick people into giving up sensitive information or downloading malicious software. Whether you&#8217;re using a smartphone, tablet, or computer, it&#8217;s essential to stay vigilant and take steps to protect your [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rightsbeyondborder.org\/my\/how-to-protect-your-device-from-scammers\/\" \/>\n<meta property=\"og:site_name\" content=\"Rights Beyond Border\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RightsBeyondBorder\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-26T09:45:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-09T06:26:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers-724x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"I-Hub Admin RBB Information Hub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"I-Hub Admin RBB Information Hub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/\"},\"author\":{\"name\":\"I-Hub Admin RBB Information Hub\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#\\\/schema\\\/person\\\/e78a9ea2156649a75a01627645560569\"},\"headline\":\"How to protect your device from scammers?\",\"datePublished\":\"2025-03-26T09:45:07+00:00\",\"dateModified\":\"2025-07-09T06:26:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/\"},\"wordCount\":788,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rightsbeyondborder.org\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/How-to-protect-your-device-from-scammers.png\",\"articleSection\":[\"Information\",\"Protection\"],\"inLanguage\":\"my-MM\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/\",\"url\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/\",\"name\":\"How to protect your device from scammers? - Rights Beyond Border\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rightsbeyondborder.org\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/How-to-protect-your-device-from-scammers.png\",\"datePublished\":\"2025-03-26T09:45:07+00:00\",\"dateModified\":\"2025-07-09T06:26:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#breadcrumb\"},\"inLanguage\":\"my-MM\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"my-MM\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rightsbeyondborder.org\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/How-to-protect-your-device-from-scammers.png\",\"contentUrl\":\"https:\\\/\\\/rightsbeyondborder.org\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/How-to-protect-your-device-from-scammers.png\",\"width\":1587,\"height\":2245},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/how-to-protect-your-device-from-scammers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rightsbeyondborder.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your device from scammers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#website\",\"url\":\"https:\\\/\\\/rightsbeyondborder.org\\\/\",\"name\":\"Rights Beyond Border\",\"description\":\"Protecting Child Rights\",\"publisher\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#organization\"},\"alternateName\":\"RBB\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rightsbeyondborder.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"my-MM\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#organization\",\"name\":\"Rights Beyond Border\",\"alternateName\":\"RBB\",\"url\":\"https:\\\/\\\/rightsbeyondborder.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"my-MM\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/rightsbeyondborder.org\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/rbb-logo-3.jpg\",\"contentUrl\":\"https:\\\/\\\/rightsbeyondborder.org\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/rbb-logo-3.jpg\",\"width\":1134,\"height\":621,\"caption\":\"Rights Beyond Border\"},\"image\":{\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RightsBeyondBorder\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCvB2mtk1z43kEYz4NV5XA8w\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/rightsbeyondborder.org\\\/#\\\/schema\\\/person\\\/e78a9ea2156649a75a01627645560569\",\"name\":\"I-Hub Admin RBB Information Hub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"my-MM\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f657c7783ac67900c553929af03989c8c9783659247244148ee4ca4e1147229?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f657c7783ac67900c553929af03989c8c9783659247244148ee4ca4e1147229?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f657c7783ac67900c553929af03989c8c9783659247244148ee4ca4e1147229?s=96&d=mm&r=g\",\"caption\":\"I-Hub Admin RBB Information Hub\"},\"url\":\"https:\\\/\\\/rightsbeyondborder.org\\\/my\\\/author\\\/ihubadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your device from scammers? - Rights Beyond Border","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rightsbeyondborder.org\/my\/how-to-protect-your-device-from-scammers\/","og_locale":"my_MM","og_type":"article","og_title":"How to protect your device from scammers? - Rights Beyond Border","og_description":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers-212&#215;300.png How to protect your device from scammers? In today&#8217;s digital world, scams have become increasingly sophisticated, and scammers are constantly finding new ways to trick people into giving up sensitive information or downloading malicious software. Whether you&#8217;re using a smartphone, tablet, or computer, it&#8217;s essential to stay vigilant and take steps to protect your [&hellip;]","og_url":"https:\/\/rightsbeyondborder.org\/my\/how-to-protect-your-device-from-scammers\/","og_site_name":"Rights Beyond Border","article_publisher":"https:\/\/www.facebook.com\/RightsBeyondBorder","article_published_time":"2025-03-26T09:45:07+00:00","article_modified_time":"2025-07-09T06:26:32+00:00","og_image":[{"width":724,"height":1024,"url":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers-724x1024.png","type":"image\/png"}],"author":"I-Hub Admin RBB Information Hub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"I-Hub Admin RBB Information Hub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#article","isPartOf":{"@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/"},"author":{"name":"I-Hub Admin RBB Information Hub","@id":"https:\/\/rightsbeyondborder.org\/#\/schema\/person\/e78a9ea2156649a75a01627645560569"},"headline":"How to protect your device from scammers?","datePublished":"2025-03-26T09:45:07+00:00","dateModified":"2025-07-09T06:26:32+00:00","mainEntityOfPage":{"@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/"},"wordCount":788,"commentCount":0,"publisher":{"@id":"https:\/\/rightsbeyondborder.org\/#organization"},"image":{"@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#primaryimage"},"thumbnailUrl":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers.png","articleSection":["Information","Protection"],"inLanguage":"my-MM","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/","url":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/","name":"How to protect your device from scammers? - Rights Beyond Border","isPartOf":{"@id":"https:\/\/rightsbeyondborder.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#primaryimage"},"image":{"@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#primaryimage"},"thumbnailUrl":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers.png","datePublished":"2025-03-26T09:45:07+00:00","dateModified":"2025-07-09T06:26:32+00:00","breadcrumb":{"@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#breadcrumb"},"inLanguage":"my-MM","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/"]}]},{"@type":"ImageObject","inLanguage":"my-MM","@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#primaryimage","url":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers.png","contentUrl":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2025\/03\/How-to-protect-your-device-from-scammers.png","width":1587,"height":2245},{"@type":"BreadcrumbList","@id":"https:\/\/rightsbeyondborder.org\/how-to-protect-your-device-from-scammers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rightsbeyondborder.org\/"},{"@type":"ListItem","position":2,"name":"How to protect your device from scammers?"}]},{"@type":"WebSite","@id":"https:\/\/rightsbeyondborder.org\/#website","url":"https:\/\/rightsbeyondborder.org\/","name":"Rights Beyond Border","description":"Protecting Child Rights","publisher":{"@id":"https:\/\/rightsbeyondborder.org\/#organization"},"alternateName":"RBB","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rightsbeyondborder.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"my-MM"},{"@type":"Organization","@id":"https:\/\/rightsbeyondborder.org\/#organization","name":"Rights Beyond Border","alternateName":"RBB","url":"https:\/\/rightsbeyondborder.org\/","logo":{"@type":"ImageObject","inLanguage":"my-MM","@id":"https:\/\/rightsbeyondborder.org\/#\/schema\/logo\/image\/","url":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2024\/05\/rbb-logo-3.jpg","contentUrl":"https:\/\/rightsbeyondborder.org\/wp-content\/uploads\/2024\/05\/rbb-logo-3.jpg","width":1134,"height":621,"caption":"Rights Beyond Border"},"image":{"@id":"https:\/\/rightsbeyondborder.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RightsBeyondBorder","https:\/\/www.youtube.com\/channel\/UCvB2mtk1z43kEYz4NV5XA8w"]},{"@type":"Person","@id":"https:\/\/rightsbeyondborder.org\/#\/schema\/person\/e78a9ea2156649a75a01627645560569","name":"I-Hub Admin RBB Information Hub","image":{"@type":"ImageObject","inLanguage":"my-MM","@id":"https:\/\/secure.gravatar.com\/avatar\/2f657c7783ac67900c553929af03989c8c9783659247244148ee4ca4e1147229?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2f657c7783ac67900c553929af03989c8c9783659247244148ee4ca4e1147229?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2f657c7783ac67900c553929af03989c8c9783659247244148ee4ca4e1147229?s=96&d=mm&r=g","caption":"I-Hub Admin RBB Information Hub"},"url":"https:\/\/rightsbeyondborder.org\/my\/author\/ihubadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/posts\/2700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/comments?post=2700"}],"version-history":[{"count":3,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/posts\/2700\/revisions"}],"predecessor-version":[{"id":28064,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/posts\/2700\/revisions\/28064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/media\/2698"}],"wp:attachment":[{"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/media?parent=2700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/categories?post=2700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rightsbeyondborder.org\/my\/wp-json\/wp\/v2\/tags?post=2700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}