{"id":1461,"date":"2022-01-19T15:17:00","date_gmt":"2022-01-19T15:17:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/modern-workplace-security\/"},"modified":"2023-05-16T01:23:12","modified_gmt":"2023-05-16T01:23:12","slug":"modern-workplace-security","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/","title":{"rendered":"Protecting the modern workplace against cybercrime"},"content":{"rendered":"<p>Build the perfect security stack to protect your clients.<\/p>\n<p>Hybrid working causes problems for small businesses looking to protect staff and systems against cybercrime. According to the Microsoft New Future of Work Report, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/uploads\/prod\/2021\/01\/NewFutureOfWorkReport.pdf\" target=\"_blank\" rel=\"noopener\">80% of security professionals surveyed<\/a> said they had encountered increased security threats since the shift to remote work began. Learn how to protect your clients with a proven vendor stack to support their security and productivity in the workplace.<\/p>\n<h2>Protecting Your Endpoints<\/h2>\n<p>As the workforce continues to work remotely, the number of wireless devices being used by employees has increased the number of vulnerable endpoints in a given organisation. Every laptop, every tablet, and every smartphone is a potential threat to security. It\u2019s been reported that over <a href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2019\/09\/08\/5-key-insights-from-absolutes-2019-endpoint-security-trends-report\/?sh=7e4fe8573b7c\" target=\"_blank\" rel=\"noopener\">70% of breaches<\/a> originate at an endpoint. Now is the time to make sure that your clients\u2019 end users are protected.<\/p>\n<p>While traditional anti-virus software solutions merely try to prevent attacks, modern Endpoint Detection and Response (EDR) solutions actively discover and remediate threats across devices, desktops, and servers, and are a great way to protect your clients against fileless malware, document and browser exploits, malicious scripts, and credential scraping. Safeguard end users with automation, machine learning, and behaviour monitoring EDR software.<\/p>\n<h2>Endpoint Protection with SentinelOne<\/h2>\n<p><a href=\"https:\/\/www.pax8.com\/vendors\/sentinelone\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_uk_modern_workplace_security&amp;utm_term=general_brand&amp;utm_content=vendor_page\" target=\"_blank\" rel=\"noopener\">SentinelOne<\/a> delivers autonomous endpoint protection through a single agent that successfully prevents, detects, and responds to attacks across all major vendors. The SentinelOne platform saves time by applying AI to automatically eliminate threats in real time for both on-premise and cloud environments. SentinelOne is the only solution to provide full visibility across networks directly from the endpoint.<\/p>\n<h2>Addressing Communication Concerns<\/h2>\n<p>Malicious emails are the greatest cyber threat an organisation can face, and phishing, ransomware, and other forms of malware have become increasingly difficult to spot. A recent Proofpoint study shows that over <a href=\"https:\/\/www.proofpoint.com\/sites\/default\/files\/white-papers\/UK_CISO-REPORT_FINAL.pdf\" target=\"_blank\" rel=\"noopener\">96% of phishing and malware attacks<\/a> originate via email. Everybody thinks that they\u2019ll spot a threatening email, but it only takes one slip up to put the security and financial stability of your end user\u2019s business in jeopardy.<\/p>\n<p>Most email providers have some form of native security measures in place. Whilst this inbuilt security provides some protection, it is not sufficient to defend against advanced cyberattacks. IBM has ranked phishing as the second most expensive cause of data breaches, costing breached businesses <a href=\"https:\/\/www.tessian.com\/blog\/phishing-statistics-2020\/\" target=\"_blank\" rel=\"noopener\">an average of $4.65 million<\/a>. By building your own cloud tech stack, you can protect your clients\u2019 cybersecurity with the most effective tools on the market.<\/p>\n<h3>Three Solutions for Protecting Communications<\/h3>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>Leverage the defence <a href=\"https:\/\/www.pax8.com\/vendors\/ironscales\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_uk_modern_workplace_security&amp;utm_term=general_brand&amp;utm_content=vendor_page\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">IRONSCALES<\/span><\/a> delivers to help your clients protect their employees\u2019 inboxes.<\/li>\n<li><span class=\"s1\"><a href=\"https:\/\/www.pax8.com\/vendors\/proofpoint\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_uk_modern_workplace_security&amp;utm_term=general_brand&amp;utm_content=vendor_page\" target=\"_blank\" rel=\"noopener\">Proofpoint<\/a> will protect your client\u2019s business against advanced cyberattacks in the form of email, mobile apps, or social media. Ensure that your client has the right intelligence and tools to respond quickly when things go wrong.<\/span><\/li>\n<li>The award-winning web filtering, email filtering, and email archiving SaaS service, <a href=\"https:\/\/www.pax8.com\/vendors\/titanhq\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_uk_modern_workplace_security&amp;utm_term=general_brand&amp;utm_content=vendor_page\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">TitanHQ,<\/span><\/a> will protect your clients\u2019 end users against malware, ransomware, phishing, viruses, botnets, and other threats.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h2>Building Safety into Remote Work<\/h2>\n<p>When it comes to working remotely, the best way to protect your online accounts is with multi-factor authentication (MFA), which brings an additional layer of security to by requiring end users to prove their identity either biometrically or with an external device.<\/p>\n<p>Whilst MFA ensures that only the right people can access a client\u2019s digital workspace, implementing a virtual private network (VPN) enables\u00a0 the user to access private resources securely, no matter where they are working. Your clients\u2019 teams will be able to work using private or public Wi-Fi safely, without running the risk of any cybercriminals joining the ride.<\/p>\n<h3><\/h3>\n<h3>Remote Work Protection with LastPass<\/h3>\n<p><span class=\"s1\"><a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/lastpass\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_uk_modern_workplace_security&amp;utm_term=general_brand&amp;utm_content=vendor_page\" target=\"_blank\" rel=\"noopener\">LastPass by LogMeIn<\/a> empowers your clients to generate, store and share their credentials seamlessly with single sign-on (SSO) and multi-factor authentication (MFA).<\/span><\/p>\n<h2><\/h2>\n<h2>Building Your Security Stack<\/h2>\n<p><span class=\"s1\"><a href=\"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/\" target=\"_blank\" rel=\"noopener\">Build your unique security stack<\/a> with Pax8 to protect your clients\u2019 end users. Choose from a range of vendors, all of whom have passed <a href=\"https:\/\/www.pax8.com\/blog\/pax8-vendor-process\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">a rigorous, 150-step vetting process<\/span><\/a>.<\/span><\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/vendors\/category\/security\/\">Explore security solutions<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Build the perfect security stack to protect your clients. Hybrid working causes problems for small businesses looking to protect staff and systems against cybercrime. According to the Microsoft New Future of Work Report, 80% of security professionals surveyed said they had encountered increased security threats since the shift to remote work began. Learn how to [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":342,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[35,16,5],"tags":[],"class_list":["post-1461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eu","category-uk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting the modern workplace against cybercrime - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Stack security solutions from Pax8 to protect end users against online threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the modern workplace against cybercrime - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Stack security solutions from Pax8 to protect end users against online threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-19T15:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T01:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/hands-typing-on-keyboard-colored-lights.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Protecting the modern workplace against cybercrime\",\"datePublished\":\"2022-01-19T15:17:00+00:00\",\"dateModified\":\"2023-05-16T01:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/\"},\"wordCount\":664,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/hands-typing-on-keyboard-colored-lights.jpg\",\"articleSection\":[\"Pax8 Europe\",\"Pax8 UK\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/\",\"name\":\"Protecting the modern workplace against cybercrime - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/hands-typing-on-keyboard-colored-lights.jpg\",\"datePublished\":\"2022-01-19T15:17:00+00:00\",\"dateModified\":\"2023-05-16T01:23:12+00:00\",\"description\":\"Stack security solutions from Pax8 to protect end users against online threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/hands-typing-on-keyboard-colored-lights.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/hands-typing-on-keyboard-colored-lights.jpg\",\"width\":2000,\"height\":1333,\"caption\":\"hands typing on keyboard with colored lights above representing a secure protected online website experience\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/modern-workplace-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting the modern workplace against cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting the modern workplace against cybercrime - Pax8 Blog","description":"Stack security solutions from Pax8 to protect end users against online threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/","og_locale":"en_US","og_type":"article","og_title":"Protecting the modern workplace against cybercrime - Pax8 Blog","og_description":"Stack security solutions from Pax8 to protect end users against online threats.","og_url":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/","og_site_name":"Pax8 Blog","article_published_time":"2022-01-19T15:17:00+00:00","article_modified_time":"2023-05-16T01:23:12+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/hands-typing-on-keyboard-colored-lights.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Protecting the modern workplace against cybercrime","datePublished":"2022-01-19T15:17:00+00:00","dateModified":"2023-05-16T01:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/"},"wordCount":664,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/hands-typing-on-keyboard-colored-lights.jpg","articleSection":["Pax8 Europe","Pax8 UK","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/","url":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/","name":"Protecting the modern workplace against cybercrime - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/hands-typing-on-keyboard-colored-lights.jpg","datePublished":"2022-01-19T15:17:00+00:00","dateModified":"2023-05-16T01:23:12+00:00","description":"Stack security solutions from Pax8 to protect end users against online threats.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/modern-workplace-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/hands-typing-on-keyboard-colored-lights.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/hands-typing-on-keyboard-colored-lights.jpg","width":2000,"height":1333,"caption":"hands typing on keyboard with colored lights above representing a secure protected online website experience"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting the modern workplace against cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1461"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1461\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/342"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}