{"id":402,"date":"2023-03-02T09:42:00","date_gmt":"2023-03-02T09:42:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=402"},"modified":"2024-11-06T16:19:06","modified_gmt":"2024-11-06T16:19:06","slug":"the-security-risks-around-microsoft-365","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/","title":{"rendered":"Microsoft 365 &#8211; What Are the Security Risks?"},"content":{"rendered":"\n<p>The Microsoft 365 Suite is currently used by&nbsp;<a href=\"https:\/\/www.usesignhouse.com\/blog\/microsoft-365-suite-stats\">345 million people<\/a>&nbsp;across the globe. Organisations that use the suite tend to integrate it into every aspect of their work, using it to store and share the majority of their data. But holding so much information within one suite makes Microsoft 365 a prime target for cybercriminals.<\/p>\n\n\n\n<p>So, what are some of the most common security risks associated with Microsoft 365?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing Attacks<\/strong><\/h3>\n\n\n\n<p>Last year, Microsoft blocked more than&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-digital-defense-report-2022\">37 billion email threats<\/a>. Although Microsoft 365 has an email protection feature that can detect malicious emails, it can only go so far. In order to breach these defences, cybercriminals are tailoring their attacks to bypass Microsoft\u2019s security measures. Recent research found that&nbsp;<a href=\"https:\/\/www.avanan.com\/resources\/reports\/download\/keeping-your-emails-secure?submissionGuid=439e9404-8f34-44d7-96a2-3d3432697e5d\">18.8% of phishing emails<\/a>&nbsp;bypassed Microsoft Exchange Online Protection (EOP) and Defender.<\/p>\n\n\n\n<p>Installing email gateways can help detect the malicious emails that do make their way past Microsoft\u2019s defences, giving your organisation an extra layer of protection.<\/p>\n\n\n\n<p>In the event that a phishing email does get past both of these defences, you need to make sure your workforce knows how to detect and respond to these malicious emails. Regular staff awareness training should be carried out to ensure that they remain vigilant, know how to spot a threat, and keep them up to date with the latest tactics cybercriminals are using.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Malware and Ransomware<\/strong><\/h3>\n\n\n\n<p>Malware is a common threat to Microsoft 365 users. This malicious software can infect systems through email attachments, links, or downloads. It can also be used to steal data, spy on users, and launch attacks on other systems.<\/p>\n\n\n\n<p>One of the most popular forms of malware that cybercriminals target users with is Ransomware. According to a recent report, 25% of IT professionals either don\u2019t know or don\u2019t think that&nbsp;Microsoft 365&nbsp;data can be&nbsp;<a href=\"https:\/\/www.helpnetsecurity.com\/2022\/10\/03\/ransomware-attack-impact-microsoft-365-data\/\">impacted by a ransomware attack<\/a>.<\/p>\n\n\n\n<p>To protect your organisation from these threats, it\u2019s important to implement anti-malware software, keep software up-to-date, and educate employees on how to detect and avoid an attack.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-digital-defense-report-2022\">Microsoft\u2019s Digital Defence Report<\/a>&nbsp;found that organisations that suffered ransomware attacks had significant gaps in their security operations. In fact:<\/p>\n\n\n\n<p>&#8211; 92% of impacted organisations didn\u2019t implement effective data loss prevention controls to mitigate ransomware risks, leading to critical data loss.&nbsp;<\/p>\n\n\n\n<p>&#8211; 60% of organisations reported no use of an EDR6 tool, a fundamental technology for detection and response.<\/p>\n\n\n\n<p>&#8211; 68% of impacted organisations didn\u2019t have an effective vulnerability and patch management process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Data Breaches<\/strong><\/h3>\n\n\n\n<p>Data breaches are a significant security risk for any organisation that uses Microsoft 365. Most companies store and share sensitive data on the system,&nbsp;such as financial information, customer data, and confidential business information.<\/p>\n\n\n\n<p>With Sharepoint, OneDrive, Outlook and Teams, the Microsoft suite is designed to streamline data sharing, but it also means data can be shared with unauthorised individuals, intentionally or not.<\/p>\n\n\n\n<p>To prevent breaches in Microsoft 365, employees should be using strong passwords and two-factor authentication to keep their accounts secure. They should also receive regular staff awareness training on data security best practice.<\/p>\n\n\n\n<p>Organisations should look to implement security tools and services such as threat detection and response tools, to help prevent and respond to any breaches, and detect any suspicious behaviour.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Insider Threats<\/strong><\/h3>\n\n\n\n<p>Insider threats are a significant security risk for organisations that uses Microsoft 365, as employees can potentially have access to a vast amount of sensitive data.<\/p>\n\n\n\n<p>A malicious insider could intentionally leak or steal this data, or compromise your systems, whereas a negligent insider could accidentally expose sensitive information through carelessness or lack of staff awareness training. You also run the risk of your staff having their credentials stolen, inadvertently allowing unauthorised access to your data and systems.<\/p>\n\n\n\n<p>Insider threats can be challenging to prevent in Microsoft 365, as these environments involve a high degree of collaboration and data sharing. They can also be difficult to detect as the insiders themselves may have authorised access to the data they are seeking to steal or compromise.<\/p>\n\n\n\n<p>Organisations should look to implement access controls, user monitoring and staff awareness training to manage the risk an insider threat brings to your 365 systems.<\/p>\n\n\n\n<p>Adopting the least privilege security concept, where employees only have the minimum levels of access needed to perform in their roles, can also help limit the damage an insider threat can cause.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Secure Your Microsoft 365 Systems<\/strong><\/h3>\n\n\n\n<p>Consideration and knowledge of the security features and hardening configurations of Microsoft 365 is often overlooked or simply assumed to be there by default. Once the system is up and running, it is often ignored until an incident occurs.<\/p>\n\n\n\n<p>At 3B Data Security, our team have investigated and implemented Microsoft 365 for a number of years, and have spent a lot of time helping our clients secure and lock down its functions, improving the default security posture of their 365 system.<\/p>\n\n\n\n<p>As part of our&nbsp;<a href=\"https:\/\/3bdatasecurity.com\/Office-365-Security.php\">Microsoft 365 Security Services<\/a>, we run a security gap analysis of the setup, configurations, functions, and features in use with our client\u2019s 365 system. We then provide guidance, recommendations and feedback for improvements, highlighting any risks and unused features that can help improve the security, governance, or system hardening and management of the devices and system usage.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Get in touch today to find out how we can help secure your Microsoft 365 systems.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/3bdatasecurity.com\/contact.php\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-1024x284.png\" alt=\"Contact Us\" class=\"wp-image-201\" style=\"width:214px;height:auto\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-1024x284.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-300x83.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-768x213.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft 365 Suite is currently used by\u00a0345 million people\u00a0across the globe. So, what are some of the most common security risks associated with Microsoft 365?<\/p>\n","protected":false},"author":5,"featured_media":403,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft 365, What Are the Security Risks?<\/title>\n<meta name=\"description\" content=\"The Microsoft 365 is currently used by\u00a0millions people. So, what are the most common security risks associated with Microsoft 365?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft 365, What Are the Security Risks?\" \/>\n<meta property=\"og:description\" content=\"The Microsoft 365 is currently used by\u00a0millions people. So, what are the most common security risks associated with Microsoft 365?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T09:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T16:19:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-16.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Annabelle Ilsley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annabelle Ilsley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/\"},\"author\":{\"name\":\"Annabelle Ilsley\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"headline\":\"Microsoft 365 &#8211; What Are the Security Risks?\",\"datePublished\":\"2023-03-02T09:42:00+00:00\",\"dateModified\":\"2024-11-06T16:19:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/\"},\"wordCount\":881,\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-16.png\",\"articleSection\":[\"Cyber Risks and More\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/\",\"name\":\"Microsoft 365, What Are the Security Risks?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-16.png\",\"datePublished\":\"2023-03-02T09:42:00+00:00\",\"dateModified\":\"2024-11-06T16:19:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"description\":\"The Microsoft 365 is currently used by\u00a0millions people. So, what are the most common security risks associated with Microsoft 365?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#primaryimage\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-16.png\",\"contentUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-16.png\",\"width\":2000,\"height\":600,\"caption\":\"Microsoft 365 - What Are the Security Risks?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-security-risks-around-microsoft-365\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft 365 &#8211; What Are the Security Risks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\",\"name\":\"Annabelle Ilsley\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/author\\\/ag3bds\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft 365, What Are the Security Risks?","description":"The Microsoft 365 is currently used by\u00a0millions people. So, what are the most common security risks associated with Microsoft 365?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/","og_locale":"en_GB","og_type":"article","og_title":"Microsoft 365, What Are the Security Risks?","og_description":"The Microsoft 365 is currently used by\u00a0millions people. So, what are the most common security risks associated with Microsoft 365?","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2023-03-02T09:42:00+00:00","article_modified_time":"2024-11-06T16:19:06+00:00","og_image":[{"width":2000,"height":600,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-16.png","type":"image\/png"}],"author":"Annabelle Ilsley","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Annabelle Ilsley","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#article","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/"},"author":{"name":"Annabelle Ilsley","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"headline":"Microsoft 365 &#8211; What Are the Security Risks?","datePublished":"2023-03-02T09:42:00+00:00","dateModified":"2024-11-06T16:19:06+00:00","mainEntityOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/"},"wordCount":881,"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-16.png","articleSection":["Cyber Risks and More"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/","name":"Microsoft 365, What Are the Security Risks?","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-16.png","datePublished":"2023-03-02T09:42:00+00:00","dateModified":"2024-11-06T16:19:06+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"description":"The Microsoft 365 is currently used by\u00a0millions people. So, what are the most common security risks associated with Microsoft 365?","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-16.png","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-16.png","width":2000,"height":600,"caption":"Microsoft 365 - What Are the Security Risks?"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-security-risks-around-microsoft-365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft 365 &#8211; What Are the Security Risks?"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6","name":"Annabelle Ilsley","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=402"}],"version-history":[{"count":1,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/402\/revisions"}],"predecessor-version":[{"id":404,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/402\/revisions\/404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/403"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}