{"id":246952,"date":"2025-02-18T04:36:05","date_gmt":"2025-02-18T04:36:05","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/msp-it-security\/"},"modified":"2025-02-18T04:36:05","modified_gmt":"2025-02-18T04:36:05","slug":"msp-it-security","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/msp-it-security\/","title":{"rendered":"What Is MSP Security and Why Does Your Business Need It?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today&#039;s digital landscape, the security of your passwords is more critical than ever, especially in light of the alarming trend of <strong>leaked passwords<\/strong>. These leaks often surface on various online forums and <strong>data breach websites<\/strong>, where hackers share compromised credentials from massive data breaches. The significance of leaked passwords in the realm of cybersecurity cannot be overstated, as they can lead to <strong>unauthorized access<\/strong> to personal accounts, financial information, and sensitive business data. For users, the relevance of this issue is profound; not only does it highlight the importance of creating <strong>strong, unique passwords<\/strong>, but it also underscores the necessity of employing security measures such as <strong>two-factor authentication<\/strong> to safeguard against potential threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Understanding_the_Core_Components_of_MSP_Security\" >Understanding the Core Components of MSP Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Common_Cyber_Threats_Targeting_MSP_Relationships\" >Common Cyber Threats Targeting MSP Relationships<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Essential_Security_Measures_for_MSP_Partnerships\" >Essential Security Measures for MSP Partnerships<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Regulatory_Compliance_and_MSP_Security_Standards\" >Regulatory Compliance and MSP Security Standards<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Building_a_Resilient_MSP_Security_Framework\" >Building a Resilient MSP Security Framework<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Best_Practices_for_Evaluating_Your_MSPs_Security_Posture\" >Best Practices for Evaluating Your MSP&#039;s Security Posture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Implementing_a_Successful_MSP_Security_Strategy\" >Implementing a Successful MSP Security Strategy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#How_Much_Does_MSP_Security_Typically_Cost_for_Small_to_Medium_Businesses\" >How Much Does MSP Security Typically Cost for Small to Medium Businesses?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#Can_Businesses_Maintain_In-House_IT_Alongside_MSP_Security_Services\" >Can Businesses Maintain In-House IT Alongside MSP Security Services?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#How_Long_Does_Implementing_Comprehensive_MSP_Security_Usually_Take\" >How Long Does Implementing Comprehensive MSP Security Usually Take?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#What_Insurance_Coverage_Should_Businesses_Have_When_Working_With_MSPS\" >What Insurance Coverage Should Businesses Have When Working With MSPS?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#How_Often_Should_Companies_Switch_or_Review_Their_MSP_Security_Providers\" >How Often Should Companies Switch or Review Their MSP Security Providers?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/msp-it-security\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>MSP Security provides comprehensive protection for business networks through firewalls, antivirus software, and access control systems.<\/li>\n<li>It safeguards sensitive data from cyber threats like ransomware, phishing attacks, and malware that can cripple business operations.<\/li>\n<li>Implementing MSP Security ensures compliance with regulations like HIPAA and GDPR, protecting businesses from legal consequences.<\/li>\n<li>Regular security assessments and data backups through MSPs help prevent costly downtime and data loss incidents.<\/li>\n<li>Multi-factor authentication and strong password policies strengthen access control, reducing the risk of unauthorized system entry.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_Core_Components_of_MSP_Security\"><\/span>Understanding the Core Components of MSP Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to keeping computers and data safe, <strong>MSP security<\/strong> is like having a super-smart guard dog for your business! Think of it as your digital best friend that never sleeps.<\/p>\n<p>I want to share with you the main parts that make MSP security work. First, there&#039;s the <strong>firewall<\/strong> &#8211; it&#039;s like a fence around your playground that keeps out the bad guys.<\/p>\n<p>Then we&#039;ve <strong>antivirus software<\/strong>, which is like having a shield that blocks germs from making your computer sick. Have you ever played &#034;Red Light, Green Light&#034;? That&#039;s how <strong>access control<\/strong> works &#8211; it only lets the right people in!<\/p>\n<p>The best part? There&#039;s also something called <strong>backup<\/strong>, which is like having a spare cookie when you accidentally drop yours!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_Cyber_Threats_Targeting_MSP_Relationships\"><\/span>Common Cyber Threats Targeting MSP Relationships<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like <strong>sneaky pirates<\/strong> trying to steal treasure, <strong>bad guys<\/strong> on the internet want to trick MSPs and steal important computer stuff!<\/p>\n<p>I&#039;ve seen these <strong>cyber-meanies<\/strong> use all sorts of tricks to break into MSP networks.<\/p>\n<p>Have you ever played hide and seek? Well, these hackers play a not-so-fun version where they hide <strong>nasty viruses<\/strong> in emails or websites.<\/p>\n<p>They might pretend to be your friend or try to trick you with fake messages. Sometimes they use &#034;ransomware&#034; (that&#039;s like putting a giant lock on your computer and demanding candy to release it).<\/p>\n<p>The scariest part? When bad guys get into one MSP&#039;s network, they can sneak into all their customers&#039; computers too!<\/p>\n<p>It&#039;s like if someone got the <strong>master key<\/strong> to every house in your neighborhood.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Essential_Security_Measures_for_MSP_Partnerships\"><\/span>Essential Security Measures for MSP Partnerships<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Protecting your MSP partnership is like building the world&#039;s coolest treehouse security system! You want to keep all those cyber bad guys out, just like you&#039;d keep nosy siblings away from your secret hideout.<\/p>\n<p>Let me share some super important security tricks! First, you&#039;ll need <strong>strong passwords<\/strong> &#8211; think of them as your special secret handshake.<\/p>\n<p>Next, we use something called &#034;two-factor authentication&#034; &#8211; it&#039;s like having a double-locked door where you need both a key and a special code to get in.<\/p>\n<p>Regular security check-ups are important too, just like going to the doctor.<\/p>\n<p>And guess what? We <strong>back up<\/strong> all your <strong>important stuff<\/strong>, kind of like making copies of your favorite trading cards &#8211; so if something happens, you&#039;ve got spares! Additionally, implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-technology\/\">multi-factor authentication<\/a> significantly enhances your overall security by adding extra layers of protection against unauthorized access.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Regulatory_Compliance_and_MSP_Security_Standards\"><\/span>Regulatory Compliance and MSP Security Standards<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>I want to tell you about something super important called regulatory compliance. It&#039;s like having special rules that keep everyone safe when using computers and data &#8211; just like how we have rules at recess!<\/p>\n<p>When we work with MSPs (that&#039;s short for Managed Service Providers &#8211; think of them as computer helpers), we need to follow lots of different rules. Let me show you some of the most important ones:<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Rule Type<\/th>\n<th style=\"text-align: center\">What It Means<\/th>\n<th style=\"text-align: center\">Why It Matters<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">HIPAA<\/td>\n<td style=\"text-align: center\">Keeps medical info safe<\/td>\n<td style=\"text-align: center\">Like a secret diary for doctors<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">GDPR<\/td>\n<td style=\"text-align: center\">Protects people&#039;s privacy<\/td>\n<td style=\"text-align: center\">Like having a special password<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">PCI DSS<\/td>\n<td style=\"text-align: center\">Keeps money stuff secure<\/td>\n<td style=\"text-align: center\">Like a piggy bank with a lock<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">SOC 2<\/td>\n<td style=\"text-align: center\">Makes sure systems work right<\/td>\n<td style=\"text-align: center\">Like following a safety checklist<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Fun fact: Following these rules is just like following the recipe when baking cookies &#8211; skip a step, and things might not turn out right!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Building_a_Resilient_MSP_Security_Framework\"><\/span>Building a Resilient MSP Security Framework<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A strong <strong>MSP security framework<\/strong> reminds me of building a super-cool LEGO castle! You need all the right pieces to make it strong and safe, just like protecting your business&#039;s digital home.<\/p>\n<p>Think of it like building layers of protection &#8211; first, you&#039;ve got your <strong>strong walls<\/strong> (that&#039;s your firewall!), then your security cameras (we call those <strong>monitoring tools<\/strong>), and finally your trusty guards (that&#039;s your <strong>antivirus software<\/strong>).<\/p>\n<p>Have you ever played &#034;Red Light, Green Light&#034;? That&#039;s exactly how our security checks work &#8211; stopping bad stuff and letting good stuff through!<\/p>\n<p>I&#039;ll help you create awesome security rules, just like following a recipe for your favorite cookies.<\/p>\n<p>We&#039;ll add cool features like backup systems (it&#039;s like having a spare toy when one breaks) and regular <strong>security check-ups<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Evaluating_Your_MSPs_Security_Posture\"><\/span>Best Practices for Evaluating Your MSP&#039;s Security Posture<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s see if your MSP is as strong as a superhero! Just like checking if your bike helmet fits right, you need to make sure your MSP is keeping your business safe and sound.<\/p>\n<p>I&#039;ll help you look for some important clues! First, ask your MSP if they&#039;ve special <strong>security badges<\/strong> (we call these certifications).<\/p>\n<p>Do they run <strong>safety drills<\/strong> (like <strong>security tests<\/strong>) to catch bad guys before they cause trouble? Think of it like a game of hide-and-seek, but with computer safety!<\/p>\n<p>Check if they&#039;re using the <strong>latest security tools<\/strong> &#8211; it&#039;s like having the newest, coolest protective gear!<\/p>\n<p>Ask them how quickly they can <strong>fix problems<\/strong>, just like how fast you&#039;d put a bandage on a scrape. Additionally, make sure they implement <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-vs-two-factor-authentication\/\">multi-factor authentication<\/a> to enhance user security and reduce unauthorized access risks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementing_a_Successful_MSP_Security_Strategy\"><\/span>Implementing a Successful MSP Security Strategy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Building a strong <strong>MSP security strategy<\/strong> is like making the world&#039;s best pillow fort! You want to make sure every part is super secure and cozy, right?<\/p>\n<p>First, I&#039;ll help you pick the best <strong>security tools<\/strong> &#8211; it&#039;s like choosing your favorite building blocks! You&#039;ll need a <strong>super-strong firewall<\/strong> (that&#039;s like a magical shield), password protection (think of it as your secret hideout code), and <strong>monitoring tools<\/strong> (your trusty lookout buddy).<\/p>\n<p>Have you ever played &#034;red light, green light&#034;? Well, MSP security works kind of the same way! We watch for any bad guys trying to sneak in (red light!) and keep the good stuff moving smoothly (green light!).<\/p>\n<p>Let&#039;s train your team to spot trouble &#8211; just like being a security superhero! We&#039;ll practice spotting <strong>suspicious emails<\/strong> and keeping your digital fort safe.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Does_MSP_Security_Typically_Cost_for_Small_to_Medium_Businesses\"><\/span>How Much Does MSP Security Typically Cost for Small to Medium Businesses?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>MSP security costs typically range from $50 to $250 per user monthly, depending on what you need!<\/p>\n<p>I&#039;ve seen small businesses with 10 employees pay around $500-2,500 monthly. It&#039;s like buying a security guard for your digital stuff!<\/p>\n<p>The price changes based on things like how many computers you have, what kind of protection you want, and if you need <strong>24\/7 monitoring<\/strong>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Businesses_Maintain_In-House_IT_Alongside_MSP_Security_Services\"><\/span>Can Businesses Maintain In-House IT Alongside MSP Security Services?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, you can totally mix <strong>in-house IT<\/strong> with <strong>MSP security<\/strong>!<\/p>\n<p>It&#039;s like having both a home cook and a restaurant to help with meals. Your in-house team handles daily tech tasks while MSP security adds extra protection &#8211; just like wearing both a helmet and knee pads when skating.<\/p>\n<p>I&#039;ve seen many businesses use this combo successfully, keeping their trusted IT staff while getting <strong>specialized security help<\/strong>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_Implementing_Comprehensive_MSP_Security_Usually_Take\"><\/span>How Long Does Implementing Comprehensive MSP Security Usually Take?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;d say it usually takes about <strong>2-4 weeks<\/strong> to get MSP security up and running.<\/p>\n<p>It&#039;s kind of like building a huge blanket fort &#8211; you&#039;ve got to set up all the different parts!<\/p>\n<p>First, we look at what your business needs (that&#039;s 2-3 days).<\/p>\n<p>Then, we install the <strong>security tools<\/strong> (about a week).<\/p>\n<p>Finally, we <strong>train your team<\/strong> and test everything to make sure it&#039;s working perfectly!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Insurance_Coverage_Should_Businesses_Have_When_Working_With_MSPS\"><\/span>What Insurance Coverage Should Businesses Have When Working With MSPS?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I always tell my business friends they need three main types of insurance when working with MSPs.<\/p>\n<p>First, you&#039;ll want <strong>cyber liability insurance<\/strong> &#8211; it&#039;s like a safety net for data breaches.<\/p>\n<p>Second, <strong>professional liability insurance<\/strong> protects you if your MSP makes mistakes.<\/p>\n<p>Finally, don&#039;t forget <strong>business interruption coverage<\/strong>! It helps if your systems go down and you can&#039;t work.<\/p>\n<p>Think of insurance like a superhero shield for your company!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_Companies_Switch_or_Review_Their_MSP_Security_Providers\"><\/span>How Often Should Companies Switch or Review Their MSP Security Providers?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend reviewing your <strong>MSP security provider<\/strong> annually and considering a switch every 3-5 years.<\/p>\n<p>Think of it like getting a check-up! During your <strong>yearly review<\/strong>, I&#039;ll check if they&#039;re keeping up with the latest security tools, meeting your needs, and providing good service.<\/p>\n<p>If they&#039;re falling behind or your business has outgrown them, it&#039;s time to shop for a <strong>new MSP partner<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you focus on enhancing your <strong>MSP security<\/strong>, remember that <strong>password security<\/strong> is a critical component of your overall defense strategy. Weak or poorly managed passwords can serve as gateways for cybercriminals to breach your systems. To fortify your business against these threats, it&#039;s essential to implement effective <strong>password management<\/strong> and passkey management solutions.<\/p>\n<p>Take control of your <strong>digital security<\/strong> by signing up for a free account at <strong>LogMeOnce<\/strong>, where you can explore advanced password management tools designed to protect your sensitive information. Don&#039;t wait until it&#039;s too late&#x2014;secure your credentials today and empower your business with the confidence it needs to thrive in a digital landscape. Visit <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> now to get started on your journey to better security!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Jump into the world of MSP security and discover how it shields your business from cyber threats lurking in today&#8217;s digital landscape.<\/p>\n","protected":false},"author":5,"featured_media":246951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[972,36229,31044],"class_list":["post-246952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-cyber-threats","tag-digital-landscape","tag-msp-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246952"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246952\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246951"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}