{"id":27834,"date":"2025-08-19T00:00:06","date_gmt":"2025-08-19T07:00:06","guid":{"rendered":"https:\/\/www.edelalon.com\/blog\/?p=27834"},"modified":"2025-08-19T08:11:56","modified_gmt":"2025-08-19T15:11:56","slug":"ways-intruders-can-get-past-access-control-systems","status":"publish","type":"post","link":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/","title":{"rendered":"Ways Intruders Can Get Past Access Control Systems"},"content":{"rendered":"<p>Access control systems provide powerful security for buildings, offices, and restricted areas. But nothing\u2019s ever totally foolproof. Intruders have developed several ways to get past access control systems and a host of other security measures. If you have a business you\u2019re trying to protect, read on to understand your security system\u2019s vulnerabilities and what you can do to strengthen defenses.<\/p>\n<h2>Physical Card Manipulation<\/h2>\n<p>One of the most common methods intruders use involves exploiting the <a href=\"https:\/\/authoriz-id.com\/blogs\/news\/complete-guide-to-access-control-cards-types-and-uses\" target=\"_blank\" rel=\"noopener\">different types of access control cards<\/a> and their potential weaknesses. For example, skilled individuals can clone proximity cards using readily available equipment, creating duplicate credentials that appear legitimate to card readers. This process typically involves getting close enough to an authorized user\u2019s card to capture its data wirelessly.<\/p>\n<p>Card skimming is another threat. Criminals install hidden devices on card readers that capture credential information when legitimate users swipe or tap their cards. These devices then transmit stolen data wirelessly to nearby receivers.<\/p>\n<h2>Tailgating<\/h2>\n<p>Tailgating is the act of an unauthorized individual following legitimate users through secured entrances. Once the authorized user opens the door with their card or biometrics, the intruder sneaks in. They usually take advantage of politeness or distraction. Intruders might carry boxes, wear uniforms, or engage in conversation to appear as though they belong in the facility.<\/p>\n<h2>Social Engineering<\/h2>\n<p>Social engineering attacks manipulate employees into providing access or information. An intruder might pose as a delivery person, maintenance worker, or new employee who \u201cforgot\u201d their access card. These scenarios exploit people\u2019s natural tendency to be helpful.<\/p>\n<h2>Technical System Vulnerabilities<\/h2>\n<p>Electronic access control systems can be vulnerable to various technical attacks. For one, power disruptions may cause some systems to default to an unlocked state, creating opportunities for unauthorized entry. Intruders sometimes target backup power supplies or main electrical feeds to trigger these fail-safe mechanisms.<\/p>\n<p>Network-connected access control systems face cybersecurity risks similar to other IT infrastructure. Hackers might exploit weak passwords, unpatched software, or unsecured network connections to gain administrative access to the system. Once inside, they can create new credentials, disable alarms, or unlock doors remotely.<\/p>\n<h2>Physical Bypass Methods<\/h2>\n<p>Some intruders don\u2019t even bother with the card reader or biometric scanner. Instead, they try old-fashioned physical door bypassing. Lock bumping, picking, or drilling can defeat mechanical backup systems. Door frame manipulation might allow someone to bypass the locking mechanism entirely, especially on older installations with worn hardware.<\/p>\n<p>Attackers might also target the wiring between card readers and control panels. By accessing junction boxes or following cable runs, they might create short circuits to trigger door releases or disable alarm functions.<\/p>\n<h2>Strengthening Your Defense<\/h2>\n<p>Once you recognize the ways that intruders can get past access control systems, you can strengthen your defenses with target upgrades.<\/p>\n<h3>Train Employees<\/h3>\n<p>Start with your employees. Make sure they understand how to identify suspicious people. Also, make sure they never allow anyone without a card or the appropriate credentials to enter your facility.<\/p>\n<h3>Get the Best Access Control System<\/h3>\n<p>Did you try to save money by installing a budget access control system? Your business\u2019s security is worth far more than the initial cost of a cutting-edge system. The newer the technology you use, the less likely intruders are to know how to break in or even want to try.<\/p>\n<h3>Upgrade Cybersecurity Measures<\/h3>\n<p>In addition to the access control system itself, make sure you <a href=\"https:\/\/www.edelalon.com\/blog\/2023\/08\/minimizing-risk-in-the-face-of-top-cybersecurity-threats\/\" target=\"_blank\" rel=\"noopener\">understand and defend against cybersecurity risks<\/a> that could compromise your system virtually.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.<\/p>\n","protected":false},"author":13,"featured_media":27836,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[4678],"tags":[5588,5589,5587],"class_list":{"0":"post-27834","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-access","9":"tag-control","10":"tag-intruders"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ways Intruders Can Get Past Access Control Systems<\/title>\n<meta name=\"description\" content=\"Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ways Intruders Can Get Past Access Control Systems\" \/>\n<meta property=\"og:description\" content=\"Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Edel Alon\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-19T07:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T15:11:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2025\/08\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Edel Alon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edel Alon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/\"},\"author\":{\"name\":\"Edel Alon\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#\\\/schema\\\/person\\\/95a632abaeb9f072ff56f1ce6471a520\"},\"headline\":\"Ways Intruders Can Get Past Access Control Systems\",\"datePublished\":\"2025-08-19T07:00:06+00:00\",\"dateModified\":\"2025-08-19T15:11:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/\"},\"wordCount\":582,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#\\\/schema\\\/person\\\/aaf86bfa75efb59a5f0855c63e330e42\"},\"image\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg\",\"keywords\":[\"access\",\"control\",\"intruders\"],\"articleSection\":[\"Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/\",\"url\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/\",\"name\":\"Ways Intruders Can Get Past Access Control Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg\",\"datePublished\":\"2025-08-19T07:00:06+00:00\",\"dateModified\":\"2025-08-19T15:11:56+00:00\",\"description\":\"Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg\",\"width\":1200,\"height\":628,\"caption\":\"A close-up of a hand holding a silver card up to an access control system panel with a keypad.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/2025\\\/08\\\/ways-intruders-can-get-past-access-control-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ways Intruders Can Get Past Access Control Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/\",\"name\":\"Edel Alon\",\"description\":\"Projects, Tools, Craft, Food, Music, and Other Stuff\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#\\\/schema\\\/person\\\/aaf86bfa75efb59a5f0855c63e330e42\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#\\\/schema\\\/person\\\/aaf86bfa75efb59a5f0855c63e330e42\",\"name\":\"Edel Alon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/edel-alon-logobl.png\",\"url\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/edel-alon-logobl.png\",\"contentUrl\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/edel-alon-logobl.png\",\"width\":136,\"height\":80,\"caption\":\"Edel Alon\"},\"logo\":{\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/edel-alon-logobl.png\"},\"description\":\"Edel-Ryan Alon is a starving musician, failed artist, connoisseur of fine foods, aspiring entrepreneur, husband, father of two, geek by day, cook by night, and an all around great guy.\",\"sameAs\":[\"https:\\\/\\\/edelalon.com\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/#\\\/schema\\\/person\\\/95a632abaeb9f072ff56f1ce6471a520\",\"name\":\"Edel Alon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d3d080b87329e9c61fbc20bfc8a62ac0599286da6cbea663a2038daf25e292?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d3d080b87329e9c61fbc20bfc8a62ac0599286da6cbea663a2038daf25e292?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d3d080b87329e9c61fbc20bfc8a62ac0599286da6cbea663a2038daf25e292?s=96&d=blank&r=g\",\"caption\":\"Edel Alon\"},\"url\":\"https:\\\/\\\/www.edelalon.com\\\/blog\\\/author\\\/logicalpositionpublishing2gmail-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ways Intruders Can Get Past Access Control Systems","description":"Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/","og_locale":"en_US","og_type":"article","og_title":"Ways Intruders Can Get Past Access Control Systems","og_description":"Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.","og_url":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/","og_site_name":"Edel Alon","article_published_time":"2025-08-19T07:00:06+00:00","article_modified_time":"2025-08-19T15:11:56+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2025\/08\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg","type":"image\/jpeg"}],"author":"Edel Alon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Edel Alon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#article","isPartOf":{"@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/"},"author":{"name":"Edel Alon","@id":"https:\/\/www.edelalon.com\/blog\/#\/schema\/person\/95a632abaeb9f072ff56f1ce6471a520"},"headline":"Ways Intruders Can Get Past Access Control Systems","datePublished":"2025-08-19T07:00:06+00:00","dateModified":"2025-08-19T15:11:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/"},"wordCount":582,"commentCount":0,"publisher":{"@id":"https:\/\/www.edelalon.com\/blog\/#\/schema\/person\/aaf86bfa75efb59a5f0855c63e330e42"},"image":{"@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2025\/08\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg","keywords":["access","control","intruders"],"articleSection":["Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/","url":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/","name":"Ways Intruders Can Get Past Access Control Systems","isPartOf":{"@id":"https:\/\/www.edelalon.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2025\/08\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg","datePublished":"2025-08-19T07:00:06+00:00","dateModified":"2025-08-19T15:11:56+00:00","description":"Learn common methods intruders use to bypass access control systems, from card cloning to social engineering, and how to strengthen your defenses.","breadcrumb":{"@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#primaryimage","url":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2025\/08\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg","contentUrl":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2025\/08\/A-close-up-of-a-hand-holding-a-silver-card-up-to-an-access-control-system-panel-with-a-keypad.jpeg","width":1200,"height":628,"caption":"A close-up of a hand holding a silver card up to an access control system panel with a keypad."},{"@type":"BreadcrumbList","@id":"https:\/\/www.edelalon.com\/blog\/2025\/08\/ways-intruders-can-get-past-access-control-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edelalon.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ways Intruders Can Get Past Access Control Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.edelalon.com\/blog\/#website","url":"https:\/\/www.edelalon.com\/blog\/","name":"Edel Alon","description":"Projects, Tools, Craft, Food, Music, and Other Stuff","publisher":{"@id":"https:\/\/www.edelalon.com\/blog\/#\/schema\/person\/aaf86bfa75efb59a5f0855c63e330e42"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edelalon.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.edelalon.com\/blog\/#\/schema\/person\/aaf86bfa75efb59a5f0855c63e330e42","name":"Edel Alon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2017\/09\/edel-alon-logobl.png","url":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2017\/09\/edel-alon-logobl.png","contentUrl":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2017\/09\/edel-alon-logobl.png","width":136,"height":80,"caption":"Edel Alon"},"logo":{"@id":"https:\/\/www.edelalon.com\/blog\/wp-content\/uploads\/2017\/09\/edel-alon-logobl.png"},"description":"Edel-Ryan Alon is a starving musician, failed artist, connoisseur of fine foods, aspiring entrepreneur, husband, father of two, geek by day, cook by night, and an all around great guy.","sameAs":["https:\/\/edelalon.com"]},{"@type":"Person","@id":"https:\/\/www.edelalon.com\/blog\/#\/schema\/person\/95a632abaeb9f072ff56f1ce6471a520","name":"Edel Alon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07d3d080b87329e9c61fbc20bfc8a62ac0599286da6cbea663a2038daf25e292?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07d3d080b87329e9c61fbc20bfc8a62ac0599286da6cbea663a2038daf25e292?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07d3d080b87329e9c61fbc20bfc8a62ac0599286da6cbea663a2038daf25e292?s=96&d=blank&r=g","caption":"Edel Alon"},"url":"https:\/\/www.edelalon.com\/blog\/author\/logicalpositionpublishing2gmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/posts\/27834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/comments?post=27834"}],"version-history":[{"count":1,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/posts\/27834\/revisions"}],"predecessor-version":[{"id":27837,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/posts\/27834\/revisions\/27837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/media\/27836"}],"wp:attachment":[{"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/media?parent=27834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/categories?post=27834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edelalon.com\/blog\/wp-json\/wp\/v2\/tags?post=27834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}