{"id":1484,"date":"2022-04-27T13:41:00","date_gmt":"2022-04-27T13:41:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/cybercns-cybersecurity-protection\/"},"modified":"2023-05-17T14:42:42","modified_gmt":"2023-05-17T14:42:42","slug":"cybercns-cybersecurity-protection","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/","title":{"rendered":"Stay ahead in the cybersecurity race with CyberCNS"},"content":{"rendered":"<p>CyberCNS protects businesses\u2019 critical data.<\/p>\n<p>Cybersecurity is an increasing priority for business leaders in today\u2019s flexible working environment. With more employees operating remotely, staying ahead in the race against cybercrime is more critical than ever. As an MSP, you\u2019re at the forefront of supporting the move to the modern digital workplace; but with this comes IT complexity and greater cybersecurity vulnerability leaving businesses exposed to malware and ransomware attacks.<\/p>\n<p>To protect business-critical data from cybercriminals, you need to help your clients expand and transform their security systems. As threats continue to rise and get more sophisticated, point-in-time vulnerability scans are no longer enough to stop cybercriminals hacking into networks. To keep data safe, a security platform that operates a continuous scanning solution to identify and remediate constant vulnerabilities is recommended.<\/p>\n<h2>A Security Platform Based on Continuous Vulnerability Scanning<\/h2>\n<p>CyberCNS is a security platform built by MSPs for MSPs to safeguard critical data from vulnerabilities and exploits. It uses continuous vulnerability scanning technology that identifies critical weak points in the cloud, at the workplace, and in work-from-home environments.<\/p>\n<p>The vendor provides a unique, additional security layer to the technology stack that can be deployed both in the cloud or on-premises. It allows users to automatically view all assets \u2013 such as the Azure Active Directory (AD) security anomalies and Microsoft Secure Score across multiple tenants and networks.<\/p>\n<p>Once a solution has been deployed, best-in-class technology regularly scans for both internal and external vulnerabilities. MSPs can mitigate risks and show IT teams how risk was avoided by uncovering system misconfigurations, firewall port inspections, newly discovered assets, and the Internet of Things (IoT).<\/p>\n<h2>UK Businesses are More Likely to Pay Cybercriminals<\/h2>\n<p>As cybercrime gets more sophisticated, increasing numbers of UK businesses are experiencing phishing attacks that can result in demands for payment to recover critical data. <a href=\"https:\/\/www.pax8.com\/blog\/protect-your-business-against-ransomware\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=uk_blog_cybercns&amp;utm_term=security&amp;utm_content=blogpost\" target=\"_blank\" rel=\"noopener\">Research carried out by Proofpoint<\/a> revealed that 82% of British firms that have been victims of ransomware attacks paid the hackers to get their data back. With the global average standing at 58%, this makes <a href=\"https:\/\/www.pax8.com\/blog\/protect-your-business-against-ransomware\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=uk_blog_cybercns&amp;utm_term=security&amp;utm_content=blogpost\" target=\"_blank\" rel=\"noopener\">businesses in the UK more likely to pay cybercriminals<\/a>.<\/p>\n<p>Adding CyberCNS to your line card as part of a top tier security stack will help you and your clients get ahead in the fight against cybercrime and stay compliant with regulations and compliance frameworks.<\/p>\n<p>CyberCNS adheres to the requirements of the IDENTIFY (DF) portion of the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\">National Institute of Standards and Technology (NIST) Cybersecurity Framework<\/a>.<\/p>\n<h2>Top Tier Security that is Easy to Deploy<\/h2>\n<p>Because CyberCNS has been specifically designed by MSPs, it\u2019s an easy tool to deploy and integrate with leading Professional Services Software (PSA) tools. The platform also incorporates a comprehensive reporting tool that can be used in presale client meetings. Moreover, CyberCNS offers affordable month-to-month pricing.<\/p>\n<h2>Find Out More About CyberCNS<\/h2>\n<p>A <a href=\"https:\/\/www.pax8.com\/en-uk\/vendores\/connectsecure\/resources\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=uk_blog_cybercns&amp;utm_term=security&amp;utm_content=guide_pdf\" target=\"_blank\" rel=\"noopener\">white paper<\/a> produced by CyberCNS explains how this cloud-native platform offers a complete asset discovery, one-time internal and external security assessments, and remediation plans to fix critical security issues.<\/p>\n<p>Build CyberCNS into your security stack to protect your clients against sophisticated threat actors.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/en-us\/vendors\/connectsecure\">Explore CyberCNS solutions<\/a><br \/>\n<a href=\"\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.<\/p>\n","protected":false},"author":141,"featured_media":408,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,35,7,16,5],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-eu","category-pax8-partners","category-uk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stay ahead in the cybersecurity race with CyberCNS - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stay ahead in the cybersecurity race with CyberCNS - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T13:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T14:42:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/security-symbol-on-networked-planet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Stay ahead in the cybersecurity race with CyberCNS\",\"datePublished\":\"2022-04-27T13:41:00+00:00\",\"dateModified\":\"2023-05-17T14:42:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/\"},\"wordCount\":519,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/security-symbol-on-networked-planet.jpg\",\"articleSection\":[\"MSPs\",\"Pax8 Europe\",\"Pax8 partners\",\"Pax8 UK\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/\",\"name\":\"Stay ahead in the cybersecurity race with CyberCNS - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/security-symbol-on-networked-planet.jpg\",\"datePublished\":\"2022-04-27T13:41:00+00:00\",\"dateModified\":\"2023-05-17T14:42:42+00:00\",\"description\":\"CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/security-symbol-on-networked-planet.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/security-symbol-on-networked-planet.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercns-cybersecurity-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stay ahead in the cybersecurity race with CyberCNS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stay ahead in the cybersecurity race with CyberCNS - Pax8 Blog","description":"CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/","og_locale":"en_US","og_type":"article","og_title":"Stay ahead in the cybersecurity race with CyberCNS - Pax8 Blog","og_description":"CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.","og_url":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/","og_site_name":"Pax8 Blog","article_published_time":"2022-04-27T13:41:00+00:00","article_modified_time":"2023-05-17T14:42:42+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/security-symbol-on-networked-planet.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Stay ahead in the cybersecurity race with CyberCNS","datePublished":"2022-04-27T13:41:00+00:00","dateModified":"2023-05-17T14:42:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/"},"wordCount":519,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/security-symbol-on-networked-planet.jpg","articleSection":["MSPs","Pax8 Europe","Pax8 partners","Pax8 UK","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/","url":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/","name":"Stay ahead in the cybersecurity race with CyberCNS - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/security-symbol-on-networked-planet.jpg","datePublished":"2022-04-27T13:41:00+00:00","dateModified":"2023-05-17T14:42:42+00:00","description":"CyberCNS boosts MSP\u2019s and end-user\u2019s cybersecurity protection.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/security-symbol-on-networked-planet.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/security-symbol-on-networked-planet.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/cybercns-cybersecurity-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Stay ahead in the cybersecurity race with CyberCNS"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/408"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}