{"id":1441,"date":"2021-10-01T18:39:00","date_gmt":"2021-10-01T18:39:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/spooky-cybersecurity-stats\/"},"modified":"2023-05-16T20:29:27","modified_gmt":"2023-05-16T20:29:27","slug":"spooky-cybersecurity-stats","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/","title":{"rendered":"Bone-chilling cybersecurity stats"},"content":{"rendered":"<p>October is Cybersecurity Awareness Month.<\/p>\n<p>Is it a coincidence that Halloween and Cybersecurity Awareness Month are both in October? We don\u2019t think so. Just like with Halloween, the realm of cybersecurity is filled with people masquerading as someone or something they\u2019re not. You can tell when someone\u2019s wearing a Halloween costume, but can you or your clients tell when a bad actor or ransomware has breached your systems? You may think yes, but we\u2019ve found evidence that\u2019ll give you nightmares. Here are several frightening and enlightening cybersecurity stats.<\/p>\n<h2>In 2021, it took an average of 212 days to detect a breach and 75 days to contain it.<\/h2>\n<p>According to their <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\">Cost of a Data Breach Report<\/a>, IBM found that the total lifecycle of a breach is 287 days. That\u2019s a whole week longer than in 2020, with an average lifecycle of 280 days (207 to detect and 73 to contain). In other words, if a business was breached on January 1, 2021, they would STILL be trying to contain it right now \u2014 finally containing it on October 15, 2021.<\/p>\n<h2>In the first 6 months of 2021, ransomware attacks in the US increased 185% and increased 144% in the UK.<\/h2>\n<p>Yes, you read that right \u2014 a triple-digit percentage increase in just 6 months! This <a href=\"https:\/\/www.sonicwall.com\/medialibrary\/en\/white-paper\/mid-year-2021-cyber-threat-report.pdf\" target=\"_blank\" rel=\"noopener\">Mid-Year Threat Report<\/a> also found that ransomware volume rose 180% across all of North America and jumped 234% across all of Europe.<\/p>\n<h2>50% of MSPs reported that ransomware attacks averted antivirus\/anti-malware solutions.<\/h2>\n<p>In the Datto <a href=\"https:\/\/www.datto.com\/resources\/dattos-2020-global-state-of-the-channel-ransomware-report\" target=\"_blank\" rel=\"noopener\">State of the Channel Ransomware Report<\/a>, MSPs stated that ransomware averted cybersecurity efforts including employee training, antivirus, email filtering, pop-up blockers, and endpoint detection. Drilling down further into which antivirus\/anti-malware solutions that didn\u2019t catch the attacks, MSPs said anti-malware filtering (59%), legacy signature-based antivirus (42%), endpoint detection and response (24%), and NextGen antivirus (12%).<\/p>\n<h2>The average cost of ransomware remediation increased 143% from 2020 to 2021.<\/h2>\n<p><a href=\"https:\/\/secure2.sophos.com\/en-us\/content\/state-of-ransomware.aspx\" target=\"_blank\" rel=\"noopener\">Sophos<\/a> found that the average cost to rectify the impacts of a ransomware attack jumped from $0.76 million USD in 2020 to $1.85 million USD in 2021. This cost takes into consideration downtime, people time, device cost, network cost, lost opportunity, and ransom paid.<\/p>\n<h2>Only 65% of data was restored after companies paid the ransom.<\/h2>\n<p>To rub salt in the wound, Sophos also found that after paying the ransom, over one-third of the organizations\u2019 data was still inaccessible. Additionally, of those that paid the ransom, 29% reported that 50% or less of their files were restored and only 8% got all their data back.<\/p>\n<h2>67% of end users don\u2019t know what ransomware is.<\/h2>\n<p>Sure, &#8220;ransomware&#8221; is an everyday term for IT professionals, but when it comes to end users\u2026let\u2019s just say there are a few things they still need to learn before they\u2019re not a risk to an organization\u2019s network. To give you a little glimmer of hope that not all is lost, in their <a href=\"https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/state-of-phish\" target=\"_blank\" rel=\"noopener\">State of the Phish Report<\/a>, Proofpoint did find that 63% know what phishing is and 65% know what malware is. But remember, there\u2019s a BIG difference between knowing what something is and knowing how to avoid it.<\/p>\n<h2>70% of organizations don\u2019t include best practices for remote working in their security awareness training.<\/h2>\n<p>Proofpoint also found that when the whole world shifted to remote work in 2020, 82% of global businesses required or requested more than half of their employees switch to remote work, and yet only 30% of them trained employees on remote work security best practices. More specifically, 90% of US (and 92% of UK) businesses had more than half their employees switch to remote work with only 29% of US (and 36% of UK) businesses actually providing relevant security training.<\/p>\n<h2>45% of end users say they did not change their passwords in the past year, even after a breach.<\/h2>\n<p>While scary, it shouldn\u2019t be that surprising that end users are rather careless with their passwords. As LastPass has looked at the <a href=\"https:\/\/www.lastpass.com\/resources\/ebook\/psychology-of-passwords-2021\" target=\"_blank\" rel=\"noopener\">Psychology of Passwords<\/a>, and what\u2019s truly scary is they proved that most end users know password security is important but don\u2019t seem to actually care enough to do it. After all, 92% say they know that using the same password or a variation is a risk, but 65% still do. Additionally, 68% of those who reuse passwords are afraid of forgetting them, and 52% want to be in control of all their passwords.<\/p>\n<p>Don\u2019t be Scared. Be Prepared.<\/p>\n<p>When you see stats like these, it\u2019s easy to see why there\u2019s a whole month dedicated to cybersecurity and awareness. Make sure your clients are well-protected and properly trained so a weak security strategy and bad habits don&#8217;t come back to haunt them. With no tricks and all treats, our security vendors have the solutions you need, and Pax8 is always here to help shine a light on any uncertainties or questions you have.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/explore\/cybersecurity\">Explore security resources<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.<\/p>\n","protected":false},"author":141,"featured_media":291,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[3,4,35,16,5],"tags":[],"class_list":["post-1441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-trends","category-msp","category-eu","category-uk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bone-chilling cybersecurity stats - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bone-chilling cybersecurity stats - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-01T18:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T20:29:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats_Blog-Image-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1001\" \/>\n\t<meta property=\"og:image:height\" content=\"594\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Bone-chilling cybersecurity stats\",\"datePublished\":\"2021-10-01T18:39:00+00:00\",\"dateModified\":\"2023-05-16T20:29:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/\"},\"wordCount\":785,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats_Blog-Image-01.png\",\"articleSection\":[\"Industry trends\",\"MSPs\",\"Pax8 Europe\",\"Pax8 UK\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/\",\"name\":\"Bone-chilling cybersecurity stats - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats_Blog-Image-01.png\",\"datePublished\":\"2021-10-01T18:39:00+00:00\",\"dateModified\":\"2023-05-16T20:29:27+00:00\",\"description\":\"October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats_Blog-Image-01.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Spooky-Stats_Blog-Image-01.png\",\"width\":1001,\"height\":594,\"caption\":\"Cybersecurity Stats for Cybersecurity Awareness Month\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/spooky-cybersecurity-stats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bone-chilling cybersecurity stats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bone-chilling cybersecurity stats - Pax8 Blog","description":"October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/","og_locale":"en_US","og_type":"article","og_title":"Bone-chilling cybersecurity stats - Pax8 Blog","og_description":"October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.","og_url":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/","og_site_name":"Pax8 Blog","article_published_time":"2021-10-01T18:39:00+00:00","article_modified_time":"2023-05-16T20:29:27+00:00","og_image":[{"width":1001,"height":594,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats_Blog-Image-01.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Bone-chilling cybersecurity stats","datePublished":"2021-10-01T18:39:00+00:00","dateModified":"2023-05-16T20:29:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/"},"wordCount":785,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats_Blog-Image-01.png","articleSection":["Industry trends","MSPs","Pax8 Europe","Pax8 UK","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/","url":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/","name":"Bone-chilling cybersecurity stats - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats_Blog-Image-01.png","datePublished":"2021-10-01T18:39:00+00:00","dateModified":"2023-05-16T20:29:27+00:00","description":"October is Cybersecurity Awareness Month and Pax8 has compiled some truly frightening and enlightening cybersecurity stats that might give you nightmares.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats_Blog-Image-01.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Spooky-Stats_Blog-Image-01.png","width":1001,"height":594,"caption":"Cybersecurity Stats for Cybersecurity Awareness Month"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/spooky-cybersecurity-stats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bone-chilling cybersecurity stats"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1441"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/291"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}