{"id":4539,"date":"2022-12-08T09:07:09","date_gmt":"2022-12-08T14:07:09","guid":{"rendered":"https:\/\/ionic.io\/blog\/?p=4539"},"modified":"2024-02-09T14:29:02","modified_gmt":"2024-02-09T19:29:02","slug":"how-to-address-mobile-app-security-risks","status":"publish","type":"post","link":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks","title":{"rendered":"How to Address Mobile App Security Risks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One of today\u2019s most sought-after commodities? Data. Knowing someone\u2019s personal information means many opportunities for potential monetary gain. And the fast track to these goods is likely in your pocket &#8211; your smartphone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A vast amount of personal, customer, and enterprise data is stored and accessible through smartphones, which makes mobile apps the perfect conduit for potential theft<\/span><b>.<\/b><span style=\"font-weight: 400;\"> But what exactly are they going after? How can you address the security holes that exist within mobile apps? And what can you do to protect your data going forward?<\/span><\/p>\n<p><!--more--><\/p>\n<h2>What are hackers after?<\/h2>\n<p><span style=\"font-weight: 400;\">Knowing <\/span><a href=\"https:\/\/learn.g2.com\/mobile-app-security\"><span style=\"font-weight: 400;\">the main targets attackers are after<\/span><\/a><span style=\"font-weight: 400;\"> is the first step in mitigating security threats. One of the most common data points they are looking to dig out are credentials for the device or external services. These credentials are likely used elsewhere and can be leveraged to gain access to more than just one app.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Personal data like name, SSN, address, and location are also atop the list. Such data points are not just highly valuable to an attacker, but also have a great prospect of being sold. Credit card information including card number, CVV, and expiration date is another highly profitable target. Many do not check their statements as closely as they should, leaving the door open for stolen data to be used under the radar. Finally, access to a device can be the main objective. Sensitive data on the device, such as intellectual property, corporate account data for customer phishing, or digital infrastructure credentials, can be just what the hacker wants.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s not just lesser-known organizations that find themselves in the line of sight of hackers. In fact, household names like <\/span><a href=\"https:\/\/www.darkreading.com\/application-security\/mobile-application-security-2021-s-breaches\"><span style=\"font-weight: 400;\">Apple, Google, and Slack<\/span><\/a><span style=\"font-weight: 400;\"> have found themselves in harm&#8217;s way. As described in <\/span><a href=\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\"><span style=\"font-weight: 400;\">The Top Attack Vectors for Mobile Threats<\/span><\/a><span style=\"font-weight: 400;\">, hackers took advantage of some of the most common attack points: poor data storage, inadequately developed code, and platforms with poor architecture.<\/span><\/p>\n<h2>How can you address security holes in your app?<\/h2>\n<p><span style=\"font-weight: 400;\">To best address potential holes in your mobile app, you\u2019ll need to look both within your organization as well as externally.<\/span><\/p>\n<h3>Follow best practices<\/h3>\n<p><span style=\"font-weight: 400;\">Keeping a development team educated on secure coding standards and proper architecture is critical. Otherwise, teams may leave the door open for one of the most common attack vectors, man-in-the-middle (MITM) attacks. With MITM, attackers can leverage unencrypted HTTP requests to capture sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the same vein, it\u2019s crucial to ensure proper input validation for data submitted via mobile apps. Malformed data can consist of harmful code and trigger malfunctions not just in the mobile app, but further down the line. To this end, backend systems should always perform their own validation and not assume the data coming from the mobile app is \u201cclean.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best ways to discover improper coding practices is to perform code reviews. Whether it\u2019s a lack of experience or just a slip-up, developers should look to their peers to double-check their work. Having multiple eyes on code before it enters production is a great way to reduce security holes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, <\/span><a href=\"https:\/\/ionic.io\/products\/secure-storage\"><span style=\"font-weight: 400;\">data must be stored correctly<\/span><\/a><span style=\"font-weight: 400;\">, not just within a database, but on mobile devices as well. Improperly stored data is one of the most common attack points and is oftentimes a result of poor encryption. By implementing more secure encryption practices, teams can rest assured that even if a bad actor gains access to data, it would be unintelligible and therefore useless.<\/span><\/p>\n<h3>Test, test, test<\/h3>\n<p><span style=\"font-weight: 400;\">Before code gets released, it should be peer-reviewed and thoroughly tested. There are a <\/span><a href=\"https:\/\/learn.g2.com\/mobile-app-security#:~:text=app%20security%20testing.-,Mobile%20app%20security%20testing,-involves%20testing%20your\"><span style=\"font-weight: 400;\">variety of testing procedures<\/span><\/a><span style=\"font-weight: 400;\"> mobile apps can be put through to ensure security robustness, including static analysis, dynamic analysis, penetration testing, and hybrid testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Static analysis testing is a great way to continuously inspect code quality and code security. Source code is executed by a program and compared against a set of coding rules. With the results, teams have better visibility into their code base and can more effectively act on areas of concern.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dynamic analysis testing is one of the more well-known techniques. This entails working with the app in real time and testing its behavior as an end-user. Development logic doesn\u2019t always match up with the natural course of action, so this can be an incredibly effective way to find holes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Penetration testing involves testing against vulnerabilities within a network, server, web apps, endpoints, and of course mobile devices. <\/span><a href=\"https:\/\/www.getastra.com\/blog\/app-security\/mobile-application-penetration-testing\/#:~:text=in%20these%20apps.-,Mobile%20penetration%20testing,-tests%20mobile%20applications\"><span style=\"font-weight: 400;\">Mobile penetration testing<\/span><\/a><span style=\"font-weight: 400;\"> inspects mobile applications for security vulnerabilities, using either manual or automated techniques. The aim is to identify security flaws and rectify them before an attack can occur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, hybrid testing is a combination of two or more of the aforementioned testing methods. By testing your application through various procedures, you drastically reduce the risk of a security breach.<\/span><\/p>\n<h3>Turn to an expert<\/h3>\n<p><span style=\"font-weight: 400;\">For instances where your internal team isn\u2019t the best source of knowledge for secure coding practices, it may make sense to offload the development of specific features and functionalities to a third party entirely. When it comes to security, the best solution could be to implement services and plugins authored by experts. By doing so, your internal team can focus on core business functionality and you have peace of mind that when it comes to security, trusted external partners have your back.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best options on the market to guarantee your application has a secure foundation is the <\/span><a href=\"https:\/\/ionic.io\/secure\"><span style=\"font-weight: 400;\">\u201cSecurity Trifecta\u201d from Ionic<\/span><\/a><span style=\"font-weight: 400;\">. By utilizing a trio of plugins\u2013Identity Vault, Auth Connect, and Secure Storage\u2013teams can properly safeguard end-users and their data via advanced mobile security features. Implemented with the latest native security best practices, plugins for biometrics, single sign-on, and secure storage provide the peace of mind developers need and end-users count on.<\/span><\/p>\n<h2>What should you do moving forward?<\/h2>\n<p><span style=\"font-weight: 400;\">When it comes to security, the best defense is a good offense, and that means getting proactive about keeping your applications, data, and ultimately users safe.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ensure that security is ingrained in your organization\u2019s culture by having regular training and sharing information about potential threats with your team. By knowing what to look out for, you can reduce the risk of human error, which was a factor in <\/span><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/2022\/dbir\/2022-data-breach-investigations-report-dbir.pdf\"><span style=\"font-weight: 400;\">82% of cyberattacks in 2021<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having the right tools is also critical to preventing attacks before they can occur. From biometric authentication to encrypted storage, there are numerous ways to ensure your data is secure from development through production.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lastly, security is a team effort, so beyond regular training, having internal or external experts who are dedicated to auditing processes and staying up to date on best practices is paramount. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of today\u2019s most sought-after commodities? Data. Knowing someone\u2019s personal information means many opportunities for potential monetary gain. And the fast track to these goods is likely in your pocket &#8211; your smartphone. A vast amount of personal, customer, and enterprise data is stored and accessible through smartphones, which makes mobile apps the perfect conduit [&hellip;]<\/p>\n","protected":false},"author":94,"featured_media":4540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"publish_to_discourse":"0","publish_post_category":"26","wpdc_auto_publish_overridden":"","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"556833","discourse_permalink":"http:\/\/forum.ionicframework.com\/t\/how-to-address-mobile-app-security-risks\/229399","wpdc_publishing_response":"","wpdc_publishing_error":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,123],"tags":[265],"class_list":["post-4539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-perspectives","tag-ionic-enterprise-sdk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Address Mobile App Security Risks - Ionic Blog<\/title>\n<meta name=\"description\" content=\"Mobile apps are a major target for hackers. That&#039;s why understanding what they are after and how to address the risks is important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Address Mobile App Security Risks\" \/>\n<meta property=\"og:description\" content=\"Mobile apps are a major target for hackers. That&#039;s why understanding what they are after and how to address the risks is important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\" \/>\n<meta property=\"og:site_name\" content=\"Ionic Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T14:07:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-09T19:29:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Conner Simmons\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@connerwsimmons\" \/>\n<meta name=\"twitter:site\" content=\"@ionicframework\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Conner Simmons\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#article\",\"isPartOf\":{\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\"},\"author\":{\"name\":\"Conner Simmons\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd\"},\"headline\":\"How to Address Mobile App Security Risks\",\"datePublished\":\"2022-12-08T14:07:09+00:00\",\"dateModified\":\"2024-02-09T19:29:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\"},\"wordCount\":1109,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ionic.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png\",\"keywords\":[\"Ionic Enterprise SDK\"],\"articleSection\":[\"All\",\"Perspectives\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\",\"url\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\",\"name\":\"How to Address Mobile App Security Risks - Ionic Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ionic.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png\",\"datePublished\":\"2022-12-08T14:07:09+00:00\",\"dateModified\":\"2024-02-09T19:29:02+00:00\",\"description\":\"Mobile apps are a major target for hackers. That's why understanding what they are after and how to address the risks is important.\",\"breadcrumb\":{\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png\",\"width\":2240,\"height\":1120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ionic.io\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Address Mobile App Security Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ionic.io\/blog\/#website\",\"url\":\"https:\/\/ionic.io\/blog\/\",\"name\":\"ionic.io\/blog\",\"description\":\"Build amazing native and progressive web apps with the web\",\"publisher\":{\"@id\":\"https:\/\/ionic.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ionic.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ionic.io\/blog\/#organization\",\"name\":\"Ionic\",\"url\":\"https:\/\/ionic.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png\",\"width\":1920,\"height\":854,\"caption\":\"Ionic\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ionicframework\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd\",\"name\":\"Conner Simmons\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg\",\"caption\":\"Conner Simmons\"},\"description\":\"Product Team\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/connersimmons\/\",\"https:\/\/x.com\/connerwsimmons\"],\"jobTitle\":\"Product Evangelist\",\"worksFor\":\"Ionic\",\"url\":\"https:\/\/ionic.io\/blog\/author\/conner\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Address Mobile App Security Risks - Ionic Blog","description":"Mobile apps are a major target for hackers. That's why understanding what they are after and how to address the risks is important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks","og_locale":"en_US","og_type":"article","og_title":"How to Address Mobile App Security Risks","og_description":"Mobile apps are a major target for hackers. That's why understanding what they are after and how to address the risks is important.","og_url":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks","og_site_name":"Ionic Blog","article_published_time":"2022-12-08T14:07:09+00:00","article_modified_time":"2024-02-09T19:29:02+00:00","og_image":[{"width":2240,"height":1120,"url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png","type":"image\/png"}],"author":"Conner Simmons","twitter_card":"summary_large_image","twitter_creator":"@connerwsimmons","twitter_site":"@ionicframework","twitter_misc":{"Written by":"Conner Simmons","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#article","isPartOf":{"@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks"},"author":{"name":"Conner Simmons","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd"},"headline":"How to Address Mobile App Security Risks","datePublished":"2022-12-08T14:07:09+00:00","dateModified":"2024-02-09T19:29:02+00:00","mainEntityOfPage":{"@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks"},"wordCount":1109,"commentCount":0,"publisher":{"@id":"https:\/\/ionic.io\/blog\/#organization"},"image":{"@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage"},"thumbnailUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png","keywords":["Ionic Enterprise SDK"],"articleSection":["All","Perspectives"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks","url":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks","name":"How to Address Mobile App Security Risks - Ionic Blog","isPartOf":{"@id":"https:\/\/ionic.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage"},"image":{"@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage"},"thumbnailUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png","datePublished":"2022-12-08T14:07:09+00:00","dateModified":"2024-02-09T19:29:02+00:00","description":"Mobile apps are a major target for hackers. That's why understanding what they are after and how to address the risks is important.","breadcrumb":{"@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#primaryimage","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png","width":2240,"height":1120},{"@type":"BreadcrumbList","@id":"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ionic.io\/blog"},{"@type":"ListItem","position":2,"name":"How to Address Mobile App Security Risks"}]},{"@type":"WebSite","@id":"https:\/\/ionic.io\/blog\/#website","url":"https:\/\/ionic.io\/blog\/","name":"ionic.io\/blog","description":"Build amazing native and progressive web apps with the web","publisher":{"@id":"https:\/\/ionic.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ionic.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ionic.io\/blog\/#organization","name":"Ionic","url":"https:\/\/ionic.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png","width":1920,"height":854,"caption":"Ionic"},"image":{"@id":"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ionicframework"]},{"@type":"Person","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd","name":"Conner Simmons","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg","caption":"Conner Simmons"},"description":"Product Team","sameAs":["https:\/\/www.linkedin.com\/in\/connersimmons\/","https:\/\/x.com\/connerwsimmons"],"jobTitle":"Product Evangelist","worksFor":"Ionic","url":"https:\/\/ionic.io\/blog\/author\/conner"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity2-feature-image.png","_links":{"self":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/comments?post=4539"}],"version-history":[{"count":1,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4539\/revisions"}],"predecessor-version":[{"id":4572,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4539\/revisions\/4572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/media\/4540"}],"wp:attachment":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/media?parent=4539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/categories?post=4539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/tags?post=4539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}