{"id":1374,"date":"2021-03-30T16:56:00","date_gmt":"2021-03-30T16:56:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/security-strategy-assessment\/"},"modified":"2023-05-17T00:50:05","modified_gmt":"2023-05-17T00:50:05","slug":"security-strategy-assessment","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/","title":{"rendered":"Are you confident in your security strategy?"},"content":{"rendered":"<p>Discover potential vulnerabilities in your security strategy.<\/p>\n<p>No cybersecurity strategy is 100% foolproof, no matter how many solutions you\u2019ve got in your security stack.<\/p>\n<p>Businesses face a rising volume of cyberattacks that are becoming increasingly sophisticated and continue to evolve into new forms and methods. This is especially true in our current world of remote work, which creates greater exposure for company networks and data. And finally, employees are still, well, <em>human<\/em> \u2014 and prone to human mistakes that can lead to data breaches.<\/p>\n<p>However, if you take a <a href=\"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/\" target=\"_blank\" rel=\"noopener\">layered approach to security<\/a>, are aware of common areas of vulnerability, and take the time to assess your clients\u2019 security strategies on a regular basis, you can ensure that you don\u2019t have any glaring weaknesses that can be easily exploited.<\/p>\n<p>Below are seven areas of potential vulnerability that you should take into account when assessing your security strategy for clients.<\/p>\n<h2>1. Multi-factor authentication (MFA)<\/h2>\n<p>Passwords continue to be a weak link for many employees, who experience &#8220;password fatigue&#8221; due to the number of unique, complex passwords they are expected to maintain. This can lead to the greatest sin for password management \u2014 reusing passwords across accounts.<\/p>\n<p>MFA strengthens access security by requiring a second form of authentication in addition to a password, such as codes sent via text or email or provided through authenticator apps.<\/p>\n<p>Enabling and requiring MFA is one of the single most effective ways to drastically reinforce digital security. In fact, <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks\/\" target=\"_blank\" rel=\"noopener\">Microsoft reports<\/a> that 99% of account hacks are blocked using MFA.<\/p>\n<h2>2. End user security awareness<\/h2>\n<p>The weakest link in your security chain? End users. People are fallible and mistakes can happen to anyone, especially if they are tired, stressed, or rushed.<\/p>\n<p>Additionally, phishing emails continue to grow in sophistication, making them much harder to detect. Gone are the obvious scam emails full of grammar and spelling mistakes. These days, a phishing email can be spoofed to look exactly like one you get from your bank, down to the logo and email signature.<\/p>\n<p>Users today have to be trained to become savvy to these new and improved phishing tricks \u2014 end user security awareness training is the best way to help them learn to identify and report suspected phishing attempts. And it has proven success, with <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/DBIR_2018_Report.pdf\" target=\"_blank\" rel=\"noopener\">78% of end users<\/a> not clicking on a single phishing email after training.<\/p>\n<p>Additionally, the most successful security awareness campaigns promote a culture of security awareness within the company. This is best achieved through ongoing training programs, rather than a &#8220;one and done&#8221; training session.<\/p>\n<h2>3. Phishing and ransomware protection<\/h2>\n<p>Phishing is the leading cause for bad actors to gain entry into systems and data, while ransomware attacks continue to increase for businesses of all sizes.<\/p>\n<p>To defend against phishing and ransomware, you should layer multiple methods and solutions. In addition to the end user training mentioned above, you should add behavior-based anti-phishing detection and response as part of your email security, and deploy robust endpoint security, DNS protection, firewalls, email backup and archiving, and a security operations center (SOC) or security operations center as a service (SOCaaS).<\/p>\n<h2>4. Data management and compliance<\/h2>\n<p>Data is the top resource for today\u2019s businesses, but many organizations do not take care of their data hygiene. Can your clients answer questions, such as:<\/p>\n<p><strong>\u2022<\/strong> Who has access to what data?<\/p>\n<p><strong>\u2022<\/strong> Who <em>should<\/em> have access to what data?<\/p>\n<p><strong>\u2022<\/strong> What data needs to be archived or encrypted?<\/p>\n<p><strong>\u2022<\/strong> Can you prevent sensitive and personally identifiable information (PII) from leaving the organization?<\/p>\n<p>These data management questions are especially important for organizations that fall under data compliance regulations, such as HIPAA, CJIS, CMMC, and PCI. Data leaks or breaches for these organizations can lead to massive fines and penalties.<\/p>\n<p>Data loss prevention features can protect confidential and critical information from being accidentally shared, lost, leaked, or stolen through rule-based monitoring and alerts (e.g., &#8220;no number formats that indicate Social Security Numbers are allowed to be sent in outbound emails&#8221;).<\/p>\n<p>For clients in industries such as healthcare that must comply with HIPAA, compliance software helps provide structured guidance to achieve and maintain HIPAA compliance, via assessments, training, and support.<\/p>\n<h2>5. Mobility and remote workers<\/h2>\n<p>In today\u2019s world of remote work, company data is spread across a much wider surface area, including multiple devices per employee. This creates security weaknesses, with mobile devices now one of the most targeted entry points for incoming malware through malicious wireless networks, application vulnerabilities, and lost or stolen devices.<\/p>\n<p>In fact, <a href=\"https:\/\/www.optiv.com\/visual-landscape-cybersecurity\" target=\"_blank\" rel=\"noopener\">79% of businesses<\/a> say the proliferation of mobile applications has a major or significant impact on their cybersecurity strategies.<\/p>\n<p>To add an extra layer of security to mobile endpoints, be sure to implement mobile security solutions, such as device management and application management, that can manage and protect mobile smartphones, tablets, laptops, and IoT devices.<\/p>\n<h2>6. Test and re-test<\/h2>\n<p>A strategy that\u2019s never tested is just a hypothesis. It\u2019s critical to perform regularly scheduled check-ins to assess security systems and processes, so you can ensure that everything is performing as planned.<\/p>\n<p>For example, if you rolled out an end user security training program, check that all new hires have been enrolled and completed the courses. \u00a0Or, if you have just implemented a new security stack, perform a vulnerability assessment or network penetration test to find and remediate any security gaps.<\/p>\n<p>By assessing your clients\u2019 security strategy regularly, you can catch vulnerabilities before they are able to be exploited by bad actors.<\/p>\n<h2>7. Check yourself<\/h2>\n<p>As an MSP, you are potentially one of the biggest threats to your downstream clients\u2019 security. If you leverage a remote monitoring and management (RMM) tool, you have direct reach into your clients\u2019 endpoints \u2014 which is the exact access a cybercriminal wants. An attacker who hacks an MSP\u2019s RMM tool can push ransomware to every client at once, instead of breaking into each business one at a time.<\/p>\n<p>That\u2019s why it\u2019s crucial that you protect yourself before you protect your clients! Always follow all the same best practices that you recommend to clients. Another benefit of using the same security stack internally that you sell to clients is that you gain first-hand knowledge of the solutions to make your sales pitch more genuine.<\/p>\n<h3>Find Out How Your Security Strategy Stacks Up<\/h3>\n<p>Need a boost when it comes to beefing up your security strategy? Our <a href=\"https:\/\/www.pax8.com\/en-us\/professional-services\/\" target=\"_blank\" rel=\"noopener\">white-labeled Professional Services<\/a> team can advise on mobile data management (MDM) and enterprise data management (EDM) solutions or provide advanced security guidance to keep your client environments safe.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/explore\/cybersecurity\">Explore security resources<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover potential vulnerabilities in your security strategy. No cybersecurity strategy is 100% foolproof, no matter how many solutions you\u2019ve got in your security stack. Businesses face a rising volume of cyberattacks that are becoming increasingly sophisticated and continue to evolve into new forms and methods. This is especially true in our current world of remote [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":122,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-1374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are you confident in your security strategy? - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"No security strategy is 100% foolproof. Don\u2019t let these seven areas become potential vulnerabilities. Take the assessment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you confident in your security strategy? - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"No security strategy is 100% foolproof. Don\u2019t let these seven areas become potential vulnerabilities. Take the assessment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-30T16:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T00:50:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Security-Strategy-Assessment-Pax8.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Are you confident in your security strategy?\",\"datePublished\":\"2021-03-30T16:56:00+00:00\",\"dateModified\":\"2023-05-17T00:50:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/\"},\"wordCount\":1086,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Security-Strategy-Assessment-Pax8.png\",\"articleSection\":[\"MSPs\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/\",\"name\":\"Are you confident in your security strategy? - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Security-Strategy-Assessment-Pax8.png\",\"datePublished\":\"2021-03-30T16:56:00+00:00\",\"dateModified\":\"2023-05-17T00:50:05+00:00\",\"description\":\"No security strategy is 100% foolproof. Don\u2019t let these seven areas become potential vulnerabilities. Take the assessment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Security-Strategy-Assessment-Pax8.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Security-Strategy-Assessment-Pax8.png\",\"width\":2000,\"height\":1334,\"caption\":\"Black man working at his computer assessing his security strategy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/security-strategy-assessment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are you confident in your security strategy?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you confident in your security strategy? - Pax8 Blog","description":"No security strategy is 100% foolproof. Don\u2019t let these seven areas become potential vulnerabilities. Take the assessment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Are you confident in your security strategy? - Pax8 Blog","og_description":"No security strategy is 100% foolproof. Don\u2019t let these seven areas become potential vulnerabilities. Take the assessment.","og_url":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/","og_site_name":"Pax8 Blog","article_published_time":"2021-03-30T16:56:00+00:00","article_modified_time":"2023-05-17T00:50:05+00:00","og_image":[{"width":2000,"height":1334,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Security-Strategy-Assessment-Pax8.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Are you confident in your security strategy?","datePublished":"2021-03-30T16:56:00+00:00","dateModified":"2023-05-17T00:50:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/"},"wordCount":1086,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Security-Strategy-Assessment-Pax8.png","articleSection":["MSPs","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/","url":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/","name":"Are you confident in your security strategy? - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Security-Strategy-Assessment-Pax8.png","datePublished":"2021-03-30T16:56:00+00:00","dateModified":"2023-05-17T00:50:05+00:00","description":"No security strategy is 100% foolproof. Don\u2019t let these seven areas become potential vulnerabilities. Take the assessment.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Security-Strategy-Assessment-Pax8.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Security-Strategy-Assessment-Pax8.png","width":2000,"height":1334,"caption":"Black man working at his computer assessing his security strategy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/security-strategy-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are you confident in your security strategy?"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1374"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1374\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/122"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}