{"id":2991,"date":"2018-02-09T07:45:33","date_gmt":"2018-02-09T15:45:33","guid":{"rendered":""},"modified":"2025-05-15T07:44:44","modified_gmt":"2025-05-15T14:44:44","slug":"business-security-in-an-era-of-cybercrime","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/","title":{"rendered":"Business security in an era of cybercrime"},"content":{"rendered":"<p>Cybersecurity remains a top concern for businesses across every industry\u2014and for good reason. With operations becoming increasingly reliant on mobile, cloud-first applications, IT systems face new types of threats, and attackers won\u2019t wait for you to catch up. This is why having a proactive and robust approach to cybersecurity is so important.<\/p>\n<p>It typically takes 24-48 hours after a breach for a cyberattacker to have complete control over your network.<sup>1<\/sup> Once attackers have control of your systems, it\u2019s only a matter of time before they begin to corrupt files, download business and employee information, and manipulate your databases. Cyberattackers are constantly evolving their methods, and the security breaches they cause can have a catastrophic impact on the organizations they target. In fact, the average cost of a data breach is $4 million.<sup>2<\/sup><\/p>\n<p>Businesses must stay vigilant and develop defense strategies against cyberattacks by making a commitment to cybersecurity. As we begin a new year, new threats are arising and new attack strategies are taking shape. Cyberattacks are becoming more sophisticated and the number of cybercriminals is increasing as cybercrime becomes more lucrative. Having advanced security software is important for staying ahead of threats and to mitigate risk, but the software itself can also be a target.<sup>3<\/sup><\/p>\n<p>The reality is, it\u2019s not a matter of <em>whether<\/em> your business will come under attack, it\u2019s a matter of <em>when<\/em>. Hackers and attackers will continue to exploit vulnerabilities in security protection, so threat detection alone is not enough. Therefore, making cyber resiliency a top focus of your business\u2019s security strategy can help you take a proactive approach to mitigating risk. Your business needs to have the capabilities to evolve alongside cyberthreats to stay vigilant and protect your business data. This means partnering with the right cloud and security provider.<br \/><strong>Securing your systems with Microsoft <\/strong>Microsoft is dedicated to fighting cybercrime and advocating for a robust approach to cybersecurity. Our Cyber Defense Operations Center brings security experts and data scientists together to analyze and stay on top of the evolving threat landscape. Our team of experts is constantly developing new practices, procedures, and solutions that identify and diminish new threats. This approach ensures Microsoft products meet the highest security and compliance standards.<\/p>\n<p>Within all Microsoft products, security is built-in to ensure your business is equipped to take on any threat. Microsoft invests deeply in developing trustworthy computing platforms and security expertise. By harnessing the power of machine learning, Microsoft platforms enable our customers to detect threats at a high velocity and with accuracy to prioritize how you respond to threats to stay a step ahead.<\/p>\n<p>We\u2019re dedicated to making sure you\u2019re protected from cyberthreats across the globe. Industry leaders and our experts are at the ready to bring you the latest insights and information to help you elevate your security posture. On March 14, the Virtual Security Summit will stream live online. This is a three-hour, session-packed event designed for senior IT decision-makers, security professionals, and legal teams to gain insights into how you can lead the way in cybersecurity.<\/p>\n<p>During the event, you\u2019ll have the opportunity to learn from industry leaders about topics such as:<\/p>\n<ul>\n<li>The Anatomy of a Breach: How Hackers Break In<\/li>\n<li>New Threats in 2018<\/li>\n<li>An Introduction to Blockchain, Crypto, and Security<\/li>\n<li>Understanding Microsoft\u2019s Cybersecurity Reference Architecture<\/li>\n<li>Cyber Resiliency and the Future of innovations in Cloud Security<\/li>\n<li>Best Practices: How to ensure Cyber Defense in an Era of Cybercrime<\/li>\n<\/ul>\n<p>Don\u2019t wait to take the next steps in keeping your organization\u2019s data secure. <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fonlinexperiences.com%2FLaunch%2FQReg.htm%3FShowKey%3D47771%26AffiliateData%3DVSS18mibBG%26wt.mc_id%3DAID668470_QSG_EML_NLTR_219331&amp;data=04%7C01%7Cv-kyell%40microsoft.com%7C67a271add21a453e9a2d08d56f23fff9%7Cee3303d7fb734b0c8589bcd847f1c277%7C1%7C0%7C636537122768734436%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwifQ%3D%3D%7C-1&amp;sdata=62Q0u4hrwEN%2FUrNLVgZfr9FStB5y6P6pyN7wMyAqWJU%3D&amp;reserved=0\">Register today to livestream the Virtual Security Summit on March 14<\/a>.<\/p>\n<p><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fonlinexperiences.com%2FLaunch%2FQReg.htm%3FShowKey%3D47771%26AffiliateData%3DVSS18mibBG%26wt.mc_id%3DAID668470_QSG_EML_NLTR_219331&amp;data=04%7C01%7Cv-kyell%40microsoft.com%7C67a271add21a453e9a2d08d56f23fff9%7Cee3303d7fb734b0c8589bcd847f1c277%7C1%7C0%7C636537122768734436%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwifQ%3D%3D%7C-1&amp;sdata=62Q0u4hrwEN%2FUrNLVgZfr9FStB5y6P6pyN7wMyAqWJU%3D&amp;reserved=0\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-481950\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/MSFT_VirtualSecuritySummit_MiBBlog_CTA_R3V1.jpg\" alt=\"\" width=\"760\" height=\"516\" \/><\/a><\/p>\n<hr \/>\n<p>1\u00a0https:\/\/cloud-platform-assets.azurewebsites.net\/anatomy-of-a-breach\/<br \/>2\u00a0https:\/\/info.microsoft.com\/rs\/157-GQE-382\/images\/EN-MSFT-SCRTY-CNTNT-Intelligent%20Security%20e-book%20-%20Lockheed%20Martin.pdf<br \/>3\u00a0https:\/\/www.csoonline.com\/article\/3241766\/cyber-attacks-espionage\/top-5-cybersecurity-concerns-for-2018.html<\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It typically takes 24-48 hours after a breach for a cyberattacker to have complete control over your network and the average cost of a data breach is $4 million.<\/p>\n","protected":false},"author":0,"featured_media":10822,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1542],"post_tag":[],"content-type":[],"coauthors":[790],"class_list":["post-2991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business security in an era of cybercrime - Microsoft in Business Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business security in an era of cybercrime - Microsoft in Business Blogs\" \/>\n<meta property=\"og:description\" content=\"It typically takes 24-48 hours after a breach for a cyberattacker to have complete control over your network and the average cost of a data breach is $4 million.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft in Business Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-09T15:45:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T14:44:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 min read\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Microsoft in Business Team\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\"},\"author\":[{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/author\/microsoft-in-business-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft in Business Team\"}],\"headline\":\"Business security in an era of cybercrime\",\"datePublished\":\"2018-02-09T15:45:33+00:00\",\"dateModified\":\"2025-05-15T14:44:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\",\"name\":\"Business security in an era of cybercrime - Microsoft in Business Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg\",\"datePublished\":\"2018-02-09T15:45:33+00:00\",\"dateModified\":\"2025-05-15T14:44:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business security in an era of cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\",\"name\":\"Microsoft in Business Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\",\"name\":\"Microsoft in Business Blogs\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"width\":400,\"height\":400,\"caption\":\"Microsoft in Business Blogs\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business security in an era of cybercrime - Microsoft in Business Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"Business security in an era of cybercrime - Microsoft in Business Blogs","og_description":"It typically takes 24-48 hours after a breach for a cyberattacker to have complete control over your network and the average cost of a data breach is $4 million.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/","og_site_name":"Microsoft in Business Blogs","article_published_time":"2018-02-09T15:45:33+00:00","article_modified_time":"2025-05-15T14:44:44+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 min read","Written by":"Microsoft in Business Team"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#article","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/"},"author":[{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/author\/microsoft-in-business-team\/","@type":"Person","@name":"Microsoft in Business Team"}],"headline":"Business security in an era of cybercrime","datePublished":"2018-02-09T15:45:33+00:00","dateModified":"2025-05-15T14:44:44+00:00","mainEntityOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/"},"wordCount":635,"publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/","name":"Business security in an era of cybercrime - Microsoft in Business Blogs","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg","datePublished":"2018-02-09T15:45:33+00:00","dateModified":"2025-05-15T14:44:44+00:00","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/02\/17607_MSFT_VirutalSecuritySummit_MIBBlog_960x300_R4_V1.jpg","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2018\/02\/09\/business-security-in-an-era-of-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/"},{"@type":"ListItem","position":2,"name":"Business security in an era of cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/","name":"Microsoft in Business Blogs","description":"","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization","name":"Microsoft in Business Blogs","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","width":400,"height":400,"caption":"Microsoft in Business Blogs"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/"}}]}},"msxcm_animated_featured_image":null,"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/2991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/comments?post=2991"}],"version-history":[{"count":2,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/2991\/revisions"}],"predecessor-version":[{"id":69742,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/2991\/revisions\/69742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media\/10822"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media?parent=2991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/categories?post=2991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/post_tag?post=2991"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/content-type?post=2991"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/coauthors?post=2991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}