{"id":1490,"date":"2022-05-27T16:18:00","date_gmt":"2022-05-27T16:18:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/msp-cybersecurity-best-practices\/"},"modified":"2023-06-07T11:01:28","modified_gmt":"2023-06-07T11:01:28","slug":"msp-cybersecurity-best-practices","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/","title":{"rendered":"Your clients are secure online. Are you?"},"content":{"rendered":"<p>Mostyn Thomas, Pax8 Senior Director of Security, shares strategies to help MSPs maximise their online protection.<\/p>\n<p>When it comes to keeping your business protected against cybercriminals, it\u2019s way too important to do it yourself. Throughout my 25 years working in IT, I\u2019ve seen many holes in MSPs\u2019 online protection. The tactics used by cybercriminals to extort money and data from businesses have become increasingly complex. Thankfully, cybersecurity solutions have developed alongside criminal tactics. I\u2019ve joined Pax8 as the Senior Director of Security to help protect our partners&#8217; businesses from bad actors looking to profit from the hard work of others.<\/p>\n<p>As a trusted partner for their clients&#8217; IT needs, MSPs are responsible for identifying potential vulnerabilities and addressing them proactively. So, when it comes to keeping their clients&#8217; organisations secure, MSPs act as the first line of defence against cyberthreats. But who are they working with to ensure that their cybersecurity strategy is up to scratch?<\/p>\n<h2>Why are MSPs overlooking their own security?<\/h2>\n<p>It\u2019s important not to be complacent when it comes to keeping a business safe online. MSPs can think they have everything sorted or are so focused on their clients\u2019 protection that they leave their own network exposed. Just because your business has not been impacted by cyberthreats, it does not mean that you don&#8217;t need to take any precautionary measures. Remember, it&#8217;s not a matter of &#8216;if&#8217; but &#8216;when.&#8217; As an MSP, there are critical steps you should take to protect your organisation from cyberattacks.<\/p>\n<p>At Pax8, we regularly see MSPs not adhering to the basics when it comes to cybersecurity best practices. A lack of regular vulnerability assessments, the absence of formal training, and staff logging onto business applications as administrators rather than users are just three examples of flaws in cybersecurity measures.<\/p>\n<p>There\u2019s a difference between selling cybersecurity solutions and implementing them. Business systems and practices become entrenched, making it increasingly difficult to spot flaws. The nature of technology means that both online threats and protective software are becoming increasingly advanced. Measures implemented years ago \u2014 even months ago \u2014 are no longer sufficient.\u202f<a href=\"https:\/\/www.pax8.com\/blog\/modern-workplace-security\/\" target=\"_blank\" rel=\"noopener\"> Keeping an organisation adequately protected against cybercrime<\/a>\u202fis time-consuming, but it\u2019s a task that\u2019s well worth the investment.<\/p>\n<h2>Flawed cybersecurity measures mean increased risks to businesses<\/h2>\n<p>The risks posed to MSPs by criminals are countless and can often be devastating to businesses. If an organisation is successfully breached by a criminal, it could bring the whole operation to a halt and cost significant sums of money. Worse, the criminal could sit within the business\u2019 network and attack clients from the position of privilege held over these networks by MSPs. Is it worth saving time and money now to risk potentially astronomical costs and reputational damage later?<\/p>\n<p>While most MSPs recognise the issues and risks posed and implement security policies, these usually aren\u2019t sufficient. Often, they will put in action a top line endpoint security product but won\u2019t configure their SPF or DMARC record correctly. This example is one of many that underscores how far robust cybersecurity practices, conducted consistently and well, can go in protecting a business.<\/p>\n<h2>Keeping your business protected<\/h2>\n<p>There are several ways to keep a business secure. By leveraging the\u202f <a href=\"https:\/\/www.pax8.com\/marketplace\/?_marketplace_vendor_categories=security\" target=\"_blank\" rel=\"noopener\">world-class security solutions<\/a> offered\u202fby the Pax8 Marketplace, MSPs can derive a multitude of benefits to enhance their security posture and minimise the risk of cyberattacks.<\/p>\n<p>Cyber insurance is a key investment for any MSP business. A breach in a business\u2019 security is likely to be costly. Taking out insurance now could save the money that would otherwise be spent on remediation fees if the worst-case scenario becomes a reality.<\/p>\n<p>Arguably, the most effective tool in an MSP\u2019s arsenal when it comes to keeping an organisation secure is ensuring that team members know what to look out for. Regular and in-depth training will play a key role in minimising the risks posed by cybercriminals to a business\u2019 data and profits. Make sure that people know the warning signs, and what to do if something doesn\u2019t look quite right.<\/p>\n<p>Another point to consider is how many members of a team are accessing the business\u2019 online workspace as an administrator unnecessarily. Granting staff admin rights rather than the rights of a user will make them more attractive targets for hackers and increase the potential damage they could inadvertently cause to a business if they make a mistake. While regularly updating user rights for each employee may take additional time, it\u2019s a worthwhile investment when it comes to keeping an organisation\u2019s data secure.<\/p>\n<p>Cybersecurity is too important to manage yourself. Join me at a <a href=\"https:\/\/www.pax8.com\/en-uk\/pax8-events\/\" target=\"_blank\" rel=\"noopener\">Pax8 Cybersecurity Masterclass<\/a> to learn how to keep your organisation, its data, and its profits secure.<\/p>\n<p><a href=\"https:\/\/www.pax8.com\/en-uk\/explore\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Learn more about cybersecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mostyn Thomas, Pax8 Senior Director of Security, shares strategies to help MSPs maximise their online protection. When it comes to keeping your business protected against cybercriminals, it\u2019s way too important to do it yourself. Throughout my 25 years working in IT, I\u2019ve seen many holes in MSPs\u2019 online protection. The tactics used by cybercriminals to [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":2015,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[35,7,16,5],"tags":[],"class_list":["post-1490","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eu","category-pax8-partners","category-uk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top MSP cybersecurity best practices for your business - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Identify critical MSP cybersecurity gaps to protect your data from cyberthreats. Learn best practices from a cybersecurity expert.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure your business: Top MSP cybersecurity best practices\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t wait until it&#039;s too late. Learn the best strategies from our cybersecurity expert to protect your business from cyberthreats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-27T16:18:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-07T11:01:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Secure your business: Top MSP cybersecurity best practices\" \/>\n<meta name=\"twitter:description\" content=\"Don&#039;t wait until it&#039;s too late. Learn the best strategies from our cybersecurity expert to protect your business from cyberthreats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"Your clients are secure online. Are you?\",\"datePublished\":\"2022-05-27T16:18:00+00:00\",\"dateModified\":\"2023-06-07T11:01:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/\"},\"wordCount\":802,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/security-blog-featured-image-update.jpg\",\"articleSection\":[\"Pax8 Europe\",\"Pax8 partners\",\"Pax8 UK\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/\",\"name\":\"Top MSP cybersecurity best practices for your business - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/security-blog-featured-image-update.jpg\",\"datePublished\":\"2022-05-27T16:18:00+00:00\",\"dateModified\":\"2023-06-07T11:01:28+00:00\",\"description\":\"Identify critical MSP cybersecurity gaps to protect your data from cyberthreats. Learn best practices from a cybersecurity expert.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/security-blog-featured-image-update.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/security-blog-featured-image-update.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/msp-cybersecurity-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your clients are secure online. Are you?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top MSP cybersecurity best practices for your business - Pax8 Blog","description":"Identify critical MSP cybersecurity gaps to protect your data from cyberthreats. Learn best practices from a cybersecurity expert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Secure your business: Top MSP cybersecurity best practices","og_description":"Don't wait until it's too late. Learn the best strategies from our cybersecurity expert to protect your business from cyberthreats.","og_url":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/","og_site_name":"Pax8 Blog","article_published_time":"2022-05-27T16:18:00+00:00","article_modified_time":"2023-06-07T11:01:28+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg","type":"image\/jpeg"}],"author":"narnold","twitter_card":"summary_large_image","twitter_title":"Secure your business: Top MSP cybersecurity best practices","twitter_description":"Don't wait until it's too late. Learn the best strategies from our cybersecurity expert to protect your business from cyberthreats.","twitter_image":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"Your clients are secure online. Are you?","datePublished":"2022-05-27T16:18:00+00:00","dateModified":"2023-06-07T11:01:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/"},"wordCount":802,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg","articleSection":["Pax8 Europe","Pax8 partners","Pax8 UK","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/","url":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/","name":"Top MSP cybersecurity best practices for your business - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg","datePublished":"2022-05-27T16:18:00+00:00","dateModified":"2023-06-07T11:01:28+00:00","description":"Identify critical MSP cybersecurity gaps to protect your data from cyberthreats. Learn best practices from a cybersecurity expert.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2022\/05\/security-blog-featured-image-update.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/msp-cybersecurity-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Your clients are secure online. Are you?"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1490"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1490\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/2015"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}