{"id":1488,"date":"2022-05-12T16:24:00","date_gmt":"2022-05-12T16:24:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/acronis-advanced-security\/"},"modified":"2023-05-11T20:58:18","modified_gmt":"2023-05-11T20:58:18","slug":"acronis-advanced-security","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/","title":{"rendered":"Build Your defence against cyberthreats with Acronis"},"content":{"rendered":"<p>Advanced Security and Advanced Email Security will protect your clients against cybercrime.<\/p>\n<p>The rapid increase in the number of employees working remotely due to the pandemic is a key driver of IT complexity and greater cybersecurity vulnerability and, as a result, businesses have seen a 300% spike in cybercrime.<\/p>\n<p>In this heightened threat landscape, more than 57% of cyberattacks are missed by traditional antivirus solutions and 69% of businesses spend more time managing tools than defending against\u00a0 threats. As an MSP, you\u2019re the first line of defence for modern businesses looking to protect their organisation against cybercrime.<\/p>\n<p>Minimise risk with AI-powered <a href=\"https:\/\/www.pax8.com\/en-uk\/resources\/acronis-advanced-security-pack-for-acronis-cyber-protect-cloud\/\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Protect Cloud<\/a> \u2013 a single solution that integrates cybersecurity, data protection and security management, enhanced with Advanced Security\u2019s full-stack anti-malware capabilities. Next generation Acronis solutions enable MSPs to build superior cyber protection services, while cutting operating costs and boosting recurring revenue. With one solution, you can modernise your data protection and cybersecurity offering with the unmatched cyber protection services your clients need.<\/p>\n<h2>Don\u2019t Fall into the Trap of Paying Cybercriminals<\/h2>\n<p>Acronis solutions can also protect against ransomware attacks. As cybercrime has become more sophisticated, an increasing number of UK businesses are experiencing phishing attacks that can result in demands for payment to recover critical data. It&#8217;s already been proven that businesses in the <a href=\"https:\/\/www.pax8.com\/blog\/protect-your-business-against-ransomware\/\" target=\"_blank\" rel=\"noopener\">UK the most likely to pay cyber-criminals<\/a>. Protect your clients\u2019 businesses with the advanced endpoint protection with Acronis.<\/p>\n<h2>Acronis Advanced Security<\/h2>\n<p>The Advanced Security add-on extends the endpoint protection capabilities of Acronis Cyber Protect Cloud, so you can lower the risks to your clients with enhanced anti-malware protection and remediation services.<\/p>\n<p>With <a href=\"https:\/\/www.pax8.com\/en-uk\/resources\/acronis-advanced-security-pack-for-acronis-cyber-protect-cloud\/\" target=\"_blank\" rel=\"noopener\">Acronis Advanced Security<\/a>, you replace inefficient, legacy anti-virus products with fully integrated and automated cyber protection that is simple to deploy, configure, and manage. The software will also help you improve detection rates and speed to catch more threats with exploit prevention, URL filtering, automatic anti-malware scans for backed-up data, and an enhanced virus signature database.<\/p>\n<p>Managing a single, integrated solution will enable you to expand your security services, quickly and easily improve efficiency and reduce manpower involvement, enabling more efficient, faster, and less costly remediation.<\/p>\n<h2>Fast Forensic Insights<\/h2>\n<p>Acronis Advanced Security gives you access to forensic insights to conduct thorough post-incident investigations and proper remediation. This helps keep costs down by collecting digital evidence and storing it in a secure central repository. Additionally, this minimises the risk of future web-based attacks and exploits, protecting you and your clients.<\/p>\n<h2>Acronis Advanced Email Security<\/h2>\n<p>Security pros consider email one of their top five cybersecurity priorities, but you can protect the riskiest communication channel with unmatched detection technologies from Acronis.<\/p>\n<p><a href=\"https:\/\/www.pax8.com\/en-uk\/resources\/acronis-advanced-email-security-pack-for-acronis-cyber-protect-cloud\/\" target=\"_blank\" rel=\"noopener\">Acronis Advanced Email Security<\/a> is a unique solution that combines CPU-level technology, signature-based detection, URL reputation checks, unique image-recognition algorithms, and machine learning with DMARC record checks. This next-generation cloud-based technology enables you to intercept any email-borne attack \u2013 such as spam, phishing, business email compromise (BEC), malware, advanced persistent threats (APTs) and zero-days &#8211; within seconds.<\/p>\n<p>Advanced Email Security is a single solution that ingrates cloud-based email security with backup, recovery, next-generation anti-malware and cyber protection management. Acronis\u2019 data backup software enables you to easily scan clients\u2019 machines to identify unprotected files, applications and workloads to proactively protect their data. This means you can offer more thorough cyber protection without increasing your costs and resources.<\/p>\n<p>The software also boasts a smart reporting function &#8211; with easily accessible and manageable datasets as well as weekly, monthly, and ad-hoc reports &#8211; so you can clearly demonstrate the value of Advanced Email Security to your clients.<\/p>\n<h2>Help Your Clients Meet Regulations<\/h2>\n<p>The sophisticated solutions provided by Acronis will also help your clients meet compliance and regulatory requirements by ensuring that all their workloads are protected \u2013 from data and applications to systems.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/en-us\/vendors\/acronis\">Explore Acronis solutions<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n<p>Protect your clients\u2019 businesses with the latest software solutions with Acronis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advanced Security and Advanced Email Security will protect your clients against cybercrime. The rapid increase in the number of employees working remotely due to the pandemic is a key driver of IT complexity and greater cybersecurity vulnerability and, as a result, businesses have seen a 300% spike in cybercrime. In this heightened threat landscape, more [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":417,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[35,16,5],"tags":[],"class_list":["post-1488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eu","category-uk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Build Your defence against cyberthreats with Acronis - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Protect your clients\u2019 businesses against cybercrime with the latest best-in-class security software from Acronis\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Build Your defence against cyberthreats with Acronis - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Protect your clients\u2019 businesses against cybercrime with the latest best-in-class security software from Acronis\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-12T16:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T20:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/glowing-orb-with-security-locks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Build Your defence against cyberthreats with Acronis\",\"datePublished\":\"2022-05-12T16:24:00+00:00\",\"dateModified\":\"2023-05-11T20:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/\"},\"wordCount\":648,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/glowing-orb-with-security-locks.jpg\",\"articleSection\":[\"Pax8 Europe\",\"Pax8 UK\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/\",\"name\":\"Build Your defence against cyberthreats with Acronis - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/glowing-orb-with-security-locks.jpg\",\"datePublished\":\"2022-05-12T16:24:00+00:00\",\"dateModified\":\"2023-05-11T20:58:18+00:00\",\"description\":\"Protect your clients\u2019 businesses against cybercrime with the latest best-in-class security software from Acronis\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/glowing-orb-with-security-locks.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/glowing-orb-with-security-locks.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/acronis-advanced-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Build Your defence against cyberthreats with Acronis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Build Your defence against cyberthreats with Acronis - Pax8 Blog","description":"Protect your clients\u2019 businesses against cybercrime with the latest best-in-class security software from Acronis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/","og_locale":"en_US","og_type":"article","og_title":"Build Your defence against cyberthreats with Acronis - Pax8 Blog","og_description":"Protect your clients\u2019 businesses against cybercrime with the latest best-in-class security software from Acronis","og_url":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/","og_site_name":"Pax8 Blog","article_published_time":"2022-05-12T16:24:00+00:00","article_modified_time":"2023-05-11T20:58:18+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/glowing-orb-with-security-locks.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Build Your defence against cyberthreats with Acronis","datePublished":"2022-05-12T16:24:00+00:00","dateModified":"2023-05-11T20:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/"},"wordCount":648,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/glowing-orb-with-security-locks.jpg","articleSection":["Pax8 Europe","Pax8 UK","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/","url":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/","name":"Build Your defence against cyberthreats with Acronis - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/glowing-orb-with-security-locks.jpg","datePublished":"2022-05-12T16:24:00+00:00","dateModified":"2023-05-11T20:58:18+00:00","description":"Protect your clients\u2019 businesses against cybercrime with the latest best-in-class security software from Acronis","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/glowing-orb-with-security-locks.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/glowing-orb-with-security-locks.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/acronis-advanced-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Build Your defence against cyberthreats with Acronis"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1488"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/417"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}