{"id":1486,"date":"2022-05-11T11:39:00","date_gmt":"2022-05-11T11:39:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/cybercrime-business-protection\/"},"modified":"2023-05-15T21:00:46","modified_gmt":"2023-05-15T21:00:46","slug":"cybercrime-business-protection","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/","title":{"rendered":"Don\u2019t be a cybercrime statistic"},"content":{"rendered":"<p>The 2022 Cybersecurity Breach survey highlights the value for MSPs implementing best-in-class cybersecurity systems.<\/p>\n<p>Data from the annual survey run by the National Cybersecurity Centre and the Department for Digital, Culture, Media, and Sport reveal that although eight in ten businesses (82%) report cybersecurity as a high priority for senior business leaders, there has not been a corresponding increase in actions to implement enhanced cybersecurity.<\/p>\n<p>The survey results show that 39% of UK businesses identified a cyberattack in the past 12 months, remaining consistent with the previous year, although the report suggests that fewer cyber mature organisations in this space may be underreporting.<\/p>\n<p>Within the group of organisations reporting cyberattacks, 31% of businesses and 26% of charities estimate they were attacked at least once a week. Looking at organisations reporting a material outcome, such as loss of money or data, gives an average estimated cost of all cyber-attacks in the past 12 months of \u00a34,200. Considering only medium and large businesses, this cost rises to \u00a319,400. These figures could be conservative as the lack of framework for the financial impacts of cyberattacks may have resulted in underreporting.<\/p>\n<h2><span class=\"TextRun MacChromeBold SCXW75225912 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW75225912 BCX0\" data-ccp-parastyle=\"heading 3\">The Most Common Types of Cybercrime<\/span><\/span><\/h2>\n<p>The survey shows that the most common threats were phishing attempts (83%), although about one in five (21%) of businesses that reported a cyberattack identified a more sophisticated threat such as a denial of service, malware, or ransomware attack.<\/p>\n<p>A secure, forward-thinking business must implement anti-phishing solutions to protect critical, sensitive data. Solutions like <a href=\"https:\/\/www.pax8.com\/en-uk\/vendors\/ironscales\/\" target=\"_blank\" rel=\"noopener\">Ironscales<\/a>, <a href=\"https:\/\/www.pax8.com\/en-uk\/vendors\/proofpoint\/\" target=\"_blank\" rel=\"noopener\">Proofpoint<\/a>, and <a href=\"https:\/\/www.pax8.com\/en-uk\/vendors\/avanan\/\" target=\"_blank\" rel=\"noopener\">Avanan<\/a> provide malware and URL protection, whilst implementing security measures against the phishing and spear-phishing techniques used by cybercriminals looking to exploit hard-working businesses.<\/p>\n<p>Adding a smart password manager tool to the security stack can help MSPs and their clients prevent phishing attempts and reduce the risk of data breaches. <a href=\"https:\/\/www.pax8.com\/blog\/password-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">The average employee has 191 different passwords for work accounts<\/a>.\u00a0 If each one is not unique, it means that a successful phishing attempt could give a hacker access to any system where the same password is used.<\/p>\n<p>A smart password management system enables end-users to automatically generate random, secure passwords for each account and store them in a vault. A solution such as LastPass also incorporates a multi-device authentication system. This adds an extra layer of security by asking users to submit additional verification when they log in, usually on a different device.<\/p>\n<p>Despite its lower prevalence, survey respondents cited ransomware as a major threat, with 56% of businesses having a policy not to pay ransom. However, research carried out by Proofpoint reveals that <a href=\"https:\/\/www.pax8.com\/blog\/protect-your-business-against-ransomware\/\" target=\"_blank\" rel=\"noopener\">businesses in the UK are the most likely to pay cybercriminals<\/a>, and many organisations that have been victims of ransomware end up paying several times to recover data critical to their business.<\/p>\n<h2>Impact of Remote Working on Cybercrime<\/h2>\n<p>Managing online security threats, such as phishing and ransomware, has become more complex in the modern workplace, as many employees continue to work remotely, at least part of the time.<\/p>\n<p>However, some steps can be taken to <a href=\"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/\" target=\"_blank\" rel=\"noopener\">protect your modern workplace against cybercrime<\/a>. These steps make remote systems more secure with endpoint detection and response solutions that remediate threats across all devices, desktops, and servers.<\/p>\n<h2>Where Businesses Go for Cybersecurity Services<\/h2>\n<p>Just over half of businesses (54%) have acted in the past 12 months to identify cybersecurity risks, with security monitoring tools (35%) being the most common. Qualitative interviews, however, found that limited board understanding meant the risk was often passed on.<\/p>\n<p>Small, medium and large businesses outsource their IT and cybersecurity to an external supplier 58%, 55%, and 60% of the time respectively. Organisations choosing this approach have access to greater expertise, resources, and higher standards for cybersecurity.<\/p>\n<p>The survey data also show that 43% of businesses have an insurance policy that covers cyber risks. However, only 6% of businesses have the Cyber Essential certification and 1% have Cyber Essentials plus, which is largely due to relatively low awareness.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/explore\/cybersecurity\">Explore security resources<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2022 Cybersecurity Breach survey highlights the value for MSPs implementing best-in-class cybersecurity systems. Data from the annual survey run by the National Cybersecurity Centre and the Department for Digital, Culture, Media, and Sport reveal that although eight in ten businesses (82%) report cybersecurity as a high priority for senior business leaders, there has not [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":412,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,35,7,16,5],"tags":[],"class_list":["post-1486","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-eu","category-pax8-partners","category-uk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Don\u2019t be a cybercrime statistic - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"The UK government has released the 2022 Cybersecurity Breach Survey, detailing how British businesses have been impacted by cybercrime in the last year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t be a cybercrime statistic\" \/>\n<meta property=\"og:description\" content=\"The 2022 Cybersecurity Breach survey highlights the value for MSPs in implementing best-in-class cybersecurity systems.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T11:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-15T21:00:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Don\u2019t be a cybercrime statistic\" \/>\n<meta name=\"twitter:description\" content=\"The 2022 Cybersecurity Breach survey highlights the value for MSPs in implementing best-in-class cybersecurity systems.\u00a0\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Don\u2019t be a cybercrime statistic\",\"datePublished\":\"2022-05-11T11:39:00+00:00\",\"dateModified\":\"2023-05-15T21:00:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/cybercrime-chain.jpg\",\"articleSection\":[\"MSPs\",\"Pax8 Europe\",\"Pax8 partners\",\"Pax8 UK\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/\",\"name\":\"Don\u2019t be a cybercrime statistic - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/cybercrime-chain.jpg\",\"datePublished\":\"2022-05-11T11:39:00+00:00\",\"dateModified\":\"2023-05-15T21:00:46+00:00\",\"description\":\"The UK government has released the 2022 Cybersecurity Breach Survey, detailing how British businesses have been impacted by cybercrime in the last year.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/cybercrime-chain.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/cybercrime-chain.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybercrime-business-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t be a cybercrime statistic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don\u2019t be a cybercrime statistic - Pax8 Blog","description":"The UK government has released the 2022 Cybersecurity Breach Survey, detailing how British businesses have been impacted by cybercrime in the last year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/","og_locale":"en_US","og_type":"article","og_title":"Don\u2019t be a cybercrime statistic","og_description":"The 2022 Cybersecurity Breach survey highlights the value for MSPs in implementing best-in-class cybersecurity systems.\u00a0","og_url":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/","og_site_name":"Pax8 Blog","article_published_time":"2022-05-11T11:39:00+00:00","article_modified_time":"2023-05-15T21:00:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_title":"Don\u2019t be a cybercrime statistic","twitter_description":"The 2022 Cybersecurity Breach survey highlights the value for MSPs in implementing best-in-class cybersecurity systems.\u00a0","twitter_image":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg","twitter_misc":{"Written by":"narnold","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Don\u2019t be a cybercrime statistic","datePublished":"2022-05-11T11:39:00+00:00","dateModified":"2023-05-15T21:00:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg","articleSection":["MSPs","Pax8 Europe","Pax8 partners","Pax8 UK","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/","url":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/","name":"Don\u2019t be a cybercrime statistic - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg","datePublished":"2022-05-11T11:39:00+00:00","dateModified":"2023-05-15T21:00:46+00:00","description":"The UK government has released the 2022 Cybersecurity Breach Survey, detailing how British businesses have been impacted by cybercrime in the last year.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/cybercrime-chain.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/cybercrime-business-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t be a cybercrime statistic"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1486"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1486\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/412"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}