{"id":1501,"date":"2022-01-28T12:00:00","date_gmt":"2022-01-28T12:00:00","guid":{"rendered":"https:\/\/pdisoftwareprd.wpengine.com\/?p=1501"},"modified":"2022-12-12T15:43:52","modified_gmt":"2022-12-12T15:43:52","slug":"4-threat-qsrs-should-avoid","status":"publish","type":"post","link":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/","title":{"rendered":"4 Threat Vulnerabilities QSRs Should Avoid"},"content":{"rendered":"\n<p>With a large population of part-time workers, multiple remote sites, and a high number of payment transactions processed each day, the QSR industry presents a target-rich environment for cybercriminals. Unfortunately, just like many other highly distributed businesses, QSRs usually don\u2019t have the time, resources, or expertise to focus on cybersecurity. And that can put your business, your customers, and your reputation at risk.<\/p>\n\n\n\n<p>This is one of the primary reasons why QSRs and other small businesses remain at the forefront of&nbsp;<a href=\"https:\/\/parachutetechs.com\/2022-cyber-attack-statistics-data-and-trends\/\" rel=\"noreferrer noopener\" target=\"_blank\">ransomware and other cyberattacks<\/a>. But your business doesn\u2019t need to become yet another statistic.<\/p>\n\n\n\n<p>If you operate a QSR, you need to be realistic about the cyberthreats you face. You can start by&nbsp;educating yourself&nbsp;on where your business is vulnerable and what you can do about it.<\/p>\n\n\n\n<p>Here are four key areas to think about in terms of avoiding risk and improving your cybersecurity posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-1-beware-the-manager-s-pc\">1. Beware the manager\u2019s PC<\/h2>\n\n\n\n<p>If you want to find the biggest potential weakness for a QSR, start with the back-office computer (AKA the manager\u2019s PC). It\u2019s directly connected to the Internet and it often has a single logon credential and a password used by multiple employees. And there\u2019s rarely multi-factor authentication (MFA) to verify credentials.<\/p>\n\n\n\n<p>Plus, the PC tends to get used for a lot of non-business purposes: Employees downloading music, browsing unauthorized websites, and opening sketchy email attachments. In other words, it\u2019s highly susceptible to a security breach. To avoid those issues, think about implementing MFA for passwords, restricting user access, and always running the latest anti-virus software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Be careful about connecting those PCs to your POS system<\/h2>\n\n\n\n<p>Given what I just explained about those back-office computers, you need to be extremely careful about connecting them to your front-of-house POS system (which is typically secure and not directly linked to the Internet to help ensure&nbsp;PCI compliance). Otherwise, any infiltration of the back-office computer could lead to an exposure of your secure POS system.<\/p>\n\n\n\n<p>It\u2019s a best practice to segment your networks and your data traffic to isolate all financial-related data and in-scope PCI-compliant systems like your POS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Be wary of third parties maintaining your POS system<\/h2>\n\n\n\n<p>Did you know that your POS vendor isn\u2019t usually the same company that maintains your POS system? Even if the system and software you purchased are PCI-compliant, you\u2019re still reliant on third-party vendors maintaining everything. This isn\u2019t to imply that those vendors are untrustworthy, but it does expose a potential way to breach that system.<\/p>\n\n\n\n<p>Could they walk into your store and plug a USB stick into the wrong machine and start creating havoc? Even if that\u2019s unintentional, the point is you have less control over your systems. Or, worse, this could blur the lines of responsibility in identifying the source or extent of an actual security breach. Make sure you know your vendors and what they\u2019re doing rather than automatically giving them unrestricted access to your systems.<\/p>\n\n\n\n<p>For instance, some management tools might provide direct access to hundreds of your endpoints. If a vendor with access to all those endpoints gets breached, the attacker might have access to potentially thousands of endpoints (those from your business along with all the other companies that vendor manages). While these types of remote access tools might be necessary, it\u2019s important for you to deploy appropriate endpoint protection so you have an early detection and prevention mechanism to avoid being the victim of an&nbsp;<a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/kaseya-rmm-cyberattack-warning\/\" rel=\"noreferrer noopener\" target=\"_blank\">extended MSP breach<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Prioritize your patches<\/h2>\n\n\n\n<p>Even under the best circumstances, it\u2019s not easy to continually update your Windows machines with the right software upgrades and patches (just think of how you handle your own home computer). In fact, many internal IT teams and third-party vendors don\u2019t want to make every update for fear of messing something up or possibly introducing more risk.<\/p>\n\n\n\n<p>However, known vulnerabilities and outdated software are an open invitation to ransomware and other threats. So, who at your business decides which updates to make\u2026and how often? Who\u2019s testing and maintaining these updates? If you don\u2019t know what\u2019s updated and what\u2019s not, it can make it even harder to detect a threat or recover from a security breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Look for the right cybersecurity partner<\/h2>\n\n\n\n<p>With so many aspects of cybersecurity to worry about, you can\u2019t afford to go it alone. This is why it\u2019s important to have a reliable partner that can proactively monitor and report on all your systems in a holistic manner.<\/p>\n\n\n\n<p>Look for a&nbsp;managed security services offering&nbsp;that includes the latest tools and best-practice methodologies gained from experience across all types of industries. Just think of it as an extension of your own IT team\u2014or even your full cybersecurity team if you don\u2019t have the right in-house expertise or resources.<\/p>\n\n\n\n<p>By offloading that technical burden, you can get back to what you do best\u2014turning your diners into loyal customers.<\/p>\n\n\n\n<p>Learn how PDI can help you strengthen your security posture&nbsp;<a href=\"https:\/\/pditechnologies.com\/restaurants-other-retail\/secure-sites\/\">here<\/a>.<\/p>\n\n\n\n<section class=\"wp-block-mbm-container alignwide\" style=\"padding-top:16px;padding-bottom:16px\"><div class=\"mbm-container\">\n<div class=\"mbm-card wp-block-mbm-card pattern-callout has-background has-blue-alt-2-background-color has-border border-radius__0 padding__sm\">\n<div class=\"wp-block-mbm-semantic-wrapper pattern-callout__left mbm-div\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"49\" height=\"49\" src=\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/07\/report-icon.svg\" alt=\"Report Icon\" class=\"wp-image-667\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-mbm-semantic-wrapper pattern-callout__right mbm-div\">\n<div class=\"wp-block-mbm-semantic-wrapper pattern-callout__content mbm-div\">\n<h2 class=\"pattern-callout__title has-white-base-color has-text-color has-delta-font-size wp-block-heading\">Stop ransomware<\/h2>\n\n\n\n<p class=\"pattern-callout__text has-white-base-color has-text-color has-echo-font-size\">Protect your customers and your brand against cyberthreats.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-blue-base-background-color has-background wp-element-button\" href=\"https:\/\/pditechnologies.com\/qsr-security\/\">Learn More<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>With a large population of part-time workers, multiple remote sites, and a high number of payment transactions processed each day, the QSR industry presents a target-rich environment for cybercriminals. Unfortunately, just like many other highly distributed businesses, QSRs usually don\u2019t have the time, resources, or expertise to focus on cybersecurity. And that can put your [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":1502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"categories":[10],"tags":[16,145,149],"pdi_resource_tier":[146,150],"class_list":["post-1501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-erp-and-back-office","tag-restaurant-qsr-and-other-retail"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 Threat Vulnerabilities QSRs Should Avoid | PDI<\/title>\n<meta name=\"description\" content=\"Don\u2019t know where your business is vulnerable and what to do about it? We have 4 threat vulnerability QSRs for you to avoid.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Threat Vulnerabilities QSRs Should Avoid\" \/>\n<meta property=\"og:description\" content=\"Don\u2019t know where your business is vulnerable and what to do about it? We have 4 threat vulnerability QSRs for you to avoid.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\" \/>\n<meta property=\"og:site_name\" content=\"PDI Technologies, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pditechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-28T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-12T15:43:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"974\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Ketelsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pditechnologies\" \/>\n<meta name=\"twitter:site\" content=\"@pditechnologies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Ketelsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\"},\"author\":{\"name\":\"Jason Ketelsen\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c\"},\"headline\":\"4 Threat Vulnerabilities QSRs Should Avoid\",\"datePublished\":\"2022-01-28T12:00:00+00:00\",\"dateModified\":\"2022-12-12T15:43:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\"},\"wordCount\":864,\"publisher\":{\"@id\":\"https:\/\/pditechnologies.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg\",\"keywords\":[\"Cybersecurity\",\"ERP and Back Office\",\"Restaurant QSR and Other Retail\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\",\"url\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\",\"name\":\"4 Threat Vulnerabilities QSRs Should Avoid | PDI\",\"isPartOf\":{\"@id\":\"https:\/\/pditechnologies.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg\",\"datePublished\":\"2022-01-28T12:00:00+00:00\",\"dateModified\":\"2022-12-12T15:43:52+00:00\",\"description\":\"Don\u2019t know where your business is vulnerable and what to do about it? We have 4 threat vulnerability QSRs for you to avoid.\",\"breadcrumb\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage\",\"url\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg\",\"contentUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg\",\"width\":1350,\"height\":974,\"caption\":\"Register as C-Store Counter\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"PDI Home\",\"item\":\"https:\/\/pditechnologies.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Threat Vulnerabilities QSRs Should Avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pditechnologies.com\/#website\",\"url\":\"https:\/\/pditechnologies.com\/\",\"name\":\"PDI Technologies, Inc.\",\"description\":\"Convenience Store Software | Wholesale Petroleum Software | PDI\",\"publisher\":{\"@id\":\"https:\/\/pditechnologies.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pditechnologies.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pditechnologies.com\/#organization\",\"name\":\"PDI Technologies, Inc.\",\"url\":\"https:\/\/pditechnologies.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png\",\"contentUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png\",\"width\":200,\"height\":200,\"caption\":\"PDI Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pditechnologies\",\"https:\/\/x.com\/pditechnologies\",\"https:\/\/www.linkedin.com\/company\/pdi-technologies\",\"https:\/\/www.instagram.com\/pditechnologies\/\",\"https:\/\/www.youtube.com\/channel\/pdi-tech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c\",\"name\":\"Jason Ketelsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g\",\"caption\":\"Jason Ketelsen\"},\"url\":\"https:\/\/pditechnologies.com\/author\/j-ketelsen\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 Threat Vulnerabilities QSRs Should Avoid | PDI","description":"Don\u2019t know where your business is vulnerable and what to do about it? We have 4 threat vulnerability QSRs for you to avoid.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/","og_locale":"en_US","og_type":"article","og_title":"4 Threat Vulnerabilities QSRs Should Avoid","og_description":"Don\u2019t know where your business is vulnerable and what to do about it? We have 4 threat vulnerability QSRs for you to avoid.","og_url":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/","og_site_name":"PDI Technologies, Inc.","article_publisher":"https:\/\/www.facebook.com\/pditechnologies","article_published_time":"2022-01-28T12:00:00+00:00","article_modified_time":"2022-12-12T15:43:52+00:00","og_image":[{"width":1350,"height":974,"url":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg","type":"image\/jpeg"}],"author":"Jason Ketelsen","twitter_card":"summary_large_image","twitter_creator":"@pditechnologies","twitter_site":"@pditechnologies","twitter_misc":{"Written by":"Jason Ketelsen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#article","isPartOf":{"@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/"},"author":{"name":"Jason Ketelsen","@id":"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c"},"headline":"4 Threat Vulnerabilities QSRs Should Avoid","datePublished":"2022-01-28T12:00:00+00:00","dateModified":"2022-12-12T15:43:52+00:00","mainEntityOfPage":{"@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/"},"wordCount":864,"publisher":{"@id":"https:\/\/pditechnologies.com\/#organization"},"image":{"@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg","keywords":["Cybersecurity","ERP and Back Office","Restaurant QSR and Other Retail"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/","url":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/","name":"4 Threat Vulnerabilities QSRs Should Avoid | PDI","isPartOf":{"@id":"https:\/\/pditechnologies.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage"},"image":{"@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg","datePublished":"2022-01-28T12:00:00+00:00","dateModified":"2022-12-12T15:43:52+00:00","description":"Don\u2019t know where your business is vulnerable and what to do about it? We have 4 threat vulnerability QSRs for you to avoid.","breadcrumb":{"@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#primaryimage","url":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg","contentUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/4-Threats-QSRs-Should-Avoid.jpg","width":1350,"height":974,"caption":"Register as C-Store Counter"},{"@type":"BreadcrumbList","@id":"https:\/\/pditechnologies.com\/blog\/4-threat-qsrs-should-avoid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"PDI Home","item":"https:\/\/pditechnologies.com\/"},{"@type":"ListItem","position":2,"name":"4 Threat Vulnerabilities QSRs Should Avoid"}]},{"@type":"WebSite","@id":"https:\/\/pditechnologies.com\/#website","url":"https:\/\/pditechnologies.com\/","name":"PDI Technologies, Inc.","description":"Convenience Store Software | Wholesale Petroleum Software | PDI","publisher":{"@id":"https:\/\/pditechnologies.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pditechnologies.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pditechnologies.com\/#organization","name":"PDI Technologies, Inc.","url":"https:\/\/pditechnologies.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/","url":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png","contentUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png","width":200,"height":200,"caption":"PDI Technologies, Inc."},"image":{"@id":"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pditechnologies","https:\/\/x.com\/pditechnologies","https:\/\/www.linkedin.com\/company\/pdi-technologies","https:\/\/www.instagram.com\/pditechnologies\/","https:\/\/www.youtube.com\/channel\/pdi-tech"]},{"@type":"Person","@id":"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c","name":"Jason Ketelsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pditechnologies.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g","caption":"Jason Ketelsen"},"url":"https:\/\/pditechnologies.com\/author\/j-ketelsen\/"}]}},"_links":{"self":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/posts\/1501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/comments?post=1501"}],"version-history":[{"count":0,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/posts\/1501\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/media\/1502"}],"wp:attachment":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/media?parent=1501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/categories?post=1501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/tags?post=1501"},{"taxonomy":"pdi_resource_tier","embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/pdi_resource_tier?post=1501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}