{"id":955,"date":"2024-12-23T13:46:18","date_gmt":"2024-12-23T13:46:18","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=955"},"modified":"2025-02-11T22:15:54","modified_gmt":"2025-02-11T22:15:54","slug":"how-to-protect-your-genetic-data-from-hackers","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/","title":{"rendered":"How to Protect Your Genetic Data from Hackers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions. However, it is also one of the most sensitive forms of personal information and a prime target for hackers. With cyberattacks on the rise and data privacy concerns mounting, protecting your genetic data is essential. They also ask for a lot of trust with your DNA information \u2014 trust that, in some ways, may not be earned. This article explores strategies to safeguard your genetic information and minimize risks.<\/span><\/p>\n<h1><span style=\"font-weight: 400;\">Past Breaches\u00a0<\/span><\/h1>\n<p><span style=\"font-weight: 400;\">Direct-to-consumer DNA testing kits have experienced several notable breaches in recent years, exposing sensitive genetic and personal data.\u00a0<\/span><\/p>\n<p><b>23andMe (2023):<\/b><span style=\"font-weight: 400;\"> Hackers accessed data for nearly 6.9 million users by exploiting old, reused passwords. This breach included personal ancestry and genetic information, highlighting vulnerabilities in account security practices.<\/span><\/p>\n<p><b>MyHeritage (2018):<\/b><span style=\"font-weight: 400;\"> A breach exposed email addresses and hashed passwords of 92 million users. Although genetic data was stored on separate systems, this incident raised concerns about data compartmentalization and security measures.<\/span><\/p>\n<p><b>DNA Diagnostics Center (2021):<\/b><span style=\"font-weight: 400;\"> Unauthorized access compromised data from over 2 million individuals, including sensitive genetic testing information stored from a legacy database..<\/span><\/p>\n<p><b>GEDmatch (2020):<\/b><span style=\"font-weight: 400;\"> This third-party genealogy platform was targeted in a breach that allowed hackers to access the profiles of individuals who hadn\u2019t opted in to law enforcement use. This incident raised ethical concerns about consent and privacy in genetic databases..<\/span><\/p>\n<h1><span style=\"font-weight: 400;\">How can you protect your data from hackers?<\/span><\/h1>\n<h4><b>1. Choose Trustworthy Genetic Testing Companies<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Not all genetic testing companies have the same level of security and privacy protection. Before submitting your DNA for analysis, research the company thoroughly.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Research the company\u2019s policies:<\/b><span style=\"font-weight: 400;\"> Look for companies with transparent privacy policies that clearly outline how your data will be used, stored, and shared.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ensure robust encryption:<\/b><span style=\"font-weight: 400;\"> Verify that the company encrypts your genetic data both during transmission and storage to prevent unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Understand data-sharing practices:<\/b><span style=\"font-weight: 400;\"> Some companies share data with third-party researchers or marketers. Opt for companies that allow you to opt out of such sharing.<\/span><\/li>\n<\/ul>\n<h4><b>2. Use Strong and Unique Passwords<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">A secure account begins with a strong password. Weak credentials are often the first point of entry for hackers.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Create complex passwords:<\/b><span style=\"font-weight: 400;\"> Use a mix of upper- and lowercase letters, numbers, and special characters. Avoid easily guessable information like birthdays or names.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enable multi-factor authentication (MFA):<\/b><span style=\"font-weight: 400;\"> Add an extra layer of protection by requiring a second verification step, such as a code sent to your phone.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Avoid password reuse:<\/b><span style=\"font-weight: 400;\"> Each online account, including genetic testing platforms, should have its own unique password.<\/span><\/li>\n<\/ul>\n<h4><b>3. Review and Limit Data Sharing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">When signing up for genetic testing, pay close attention to what you\u2019re consenting to.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Understand consent agreements:<\/b><span style=\"font-weight: 400;\"> Read the fine print to determine whether your data will be shared with researchers or sold to third parties.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Opt out of unnecessary sharing:<\/b><span style=\"font-weight: 400;\"> Many companies allow users to decline participation in research programs or data-sharing agreements.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Request data deletion:<\/b><span style=\"font-weight: 400;\"> If you\u2019re no longer using the service, some companies allow you to delete your genetic data permanently.<\/span><\/li>\n<\/ul>\n<h4><b>4. Be Wary of Public DNA Databases<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">While uploading your DNA to public databases can help trace ancestry or connect with relatives, it also comes with significant risks.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Avoid uploading raw DNA files:<\/b><span style=\"font-weight: 400;\"> Sharing your genetic data on public platforms increases the chances of exposure to hackers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Understand the risks:<\/b><span style=\"font-weight: 400;\"> Law enforcement or other parties may access public databases without your consent, raising both privacy and ethical concerns.<\/span><\/li>\n<\/ul>\n<h4><b>5. Protect Your Devices and Networks<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Hackers often exploit vulnerabilities in devices and networks to gain access to sensitive data.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Update your software:<\/b><span style=\"font-weight: 400;\"> Regularly update your devices to patch security vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use secure networks:<\/b><span style=\"font-weight: 400;\"> Avoid accessing your genetic data on public Wi-Fi. If necessary, use a virtual private network (VPN) to encrypt your connection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Install antivirus software:<\/b><span style=\"font-weight: 400;\"> Protect your devices from malware that could steal your personal information.<\/span><\/li>\n<\/ul>\n<h4><b>6. Monitor for Data Breaches<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Data breaches can occur even with reputable companies. Stay vigilant to minimize potential damage.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Set up alerts:<\/b><span style=\"font-weight: 400;\"> Use services like \u201cHave I Been Pwned\u201d to monitor whether your accounts have been compromised.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Stay informed:<\/b><span style=\"font-weight: 400;\"> Keep track of news related to breaches affecting genetic testing companies.<\/span><\/li>\n<\/ul>\n<h4><b>7. Advocate for Better Regulations<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Stronger legal protections are critical to safeguarding genetic data.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Support privacy legislation:<\/b><span style=\"font-weight: 400;\"> Advocate for laws that restrict the misuse of genetic information and require companies to adopt strict security measures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Know your rights:<\/b><span style=\"font-weight: 400;\"> Familiarize yourself with laws such as the Genetic Information Nondiscrimination Act (GINA) in the U.S., which prohibits genetic discrimination in health insurance and employment.<\/span><\/li>\n<\/ul>\n<h4><b>8. Think Before Sharing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Your genetic data doesn\u2019t just belong to you\u2014it contains information about your family as well.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Discuss with relatives:<\/b><span style=\"font-weight: 400;\"> Before sharing your genetic data, consider how it might impact your family\u2019s privacy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Limit online sharing:<\/b><span style=\"font-weight: 400;\"> Avoid posting genetic information or test results on social media or public forums, where they can be exploited.<\/span><\/li>\n<\/ul>\n<h4><b>9. Use Encryption and Secure Backups<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">If you store your genetic data locally, take steps to protect it.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Encrypt files:<\/b><span style=\"font-weight: 400;\"> Use encryption tools to secure any genetic data stored on your devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Backup securely:<\/b><span style=\"font-weight: 400;\"> Keep backups in encrypted external drives rather than on cloud services with uncertain security policies.<\/span><\/li>\n<\/ul>\n<h3><b>Conclusion\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Your genetic data is a valuable and deeply personal asset that deserves the highest level of protection. By choosing reputable companies, securing your accounts, and being cautious with sharing, you can significantly reduce the risk of your genetic information falling into the wrong hands. With the right precautions, you can explore the benefits of genetic testing while safeguarding your privacy.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Monitoring Remote Sessions<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Security monitoring is crucial for preventing ransomware attacks as it enables early detection, identification of vulnerabilities, monitoring for anomalies, data protection, and compliance with regulatory requirements.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/products\/tsf-products.php\"><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v7<\/span><\/a><span style=\"font-weight: 400;\"> will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions. However, it is also one of the most sensitive forms of personal [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":957,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-955","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Genetic Data from Hackers - Blogs<\/title>\n<meta name=\"description\" content=\"Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Genetic Data from Hackers - Blogs\" \/>\n<meta property=\"og:description\" content=\"Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-23T13:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T22:15:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/\",\"name\":\"How to Protect Your Genetic Data from Hackers - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg\",\"datePublished\":\"2024-12-23T13:46:18+00:00\",\"dateModified\":\"2025-02-11T22:15:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Genetic Data from Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Genetic Data from Hackers - Blogs","description":"Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Genetic Data from Hackers - Blogs","og_description":"Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2024-12-23T13:46:18+00:00","article_modified_time":"2025-02-11T22:15:54+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/","name":"How to Protect Your Genetic Data from Hackers - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg","datePublished":"2024-12-23T13:46:18+00:00","dateModified":"2025-02-11T22:15:54+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Consumer DNA testing kits like those from 23andMe, Ancestry.com and MyHeritage promise a road map to your genealogy, ethnicity and family history and, in some cases, information about your genetic health. Genetic data offers profound insights into our ancestry, health risks, and predispositions.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/12\/dnatesting-2-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/how-to-protect-your-genetic-data-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Genetic Data from Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=955"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/955\/revisions"}],"predecessor-version":[{"id":977,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/955\/revisions\/977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/957"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}