{"id":3667,"date":"2023-11-20T14:53:43","date_gmt":"2023-11-20T09:23:43","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=3667"},"modified":"2024-08-01T16:21:45","modified_gmt":"2024-08-01T10:51:45","slug":"unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/","title":{"rendered":"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs)"},"content":{"rendered":"<p><a href=\"https:\/\/us.norton.com\/blog\/emerging-threats\/cybersecurity-statistics\"><span style=\"font-weight: 400;\">Norton Security<\/span><\/a><span style=\"font-weight: 400;\"> reports that global cybercrime costs are expected to grow by 15% a year, reaching $10.5 trillion annually by 2025.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From malware and Denial-of-Service (DoS) attacks to phishing, spoofing and code injection attacks to IoT-based attacks, the onslaught is relentless. <\/span><a href=\"https:\/\/ung.edu\/continuing-education\/news-and-media\/cybersecurity.php\"><span style=\"font-weight: 400;\">Cybersecurity Ventures<\/span><\/a><span style=\"font-weight: 400;\"> says in the last decade there have been 44 attacks every second. Just this October, the Indian Council of Medical Research (ICMR) was attacked in what is suspected to be the biggest <\/span><a href=\"https:\/\/www.news18.com\/india\/indias-biggest-data-leak-so-far-covid-19-test-info-of-81-5cr-citizens-with-icmr-up-for-sale-exclusive-8637743.html\"><span style=\"font-weight: 400;\">data leak<\/span><\/a><span style=\"font-weight: 400;\"> in the country. Details of 815 million Indian citizens \u2014 Aadhaar and passport information along with names, phone numbers and addresses \u2014 were on \u2018sale\u2019.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that a new breed of defenders has emerged \u2014 managed security services providers (MSSPs).<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3668\" src=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?resize=1140%2C760&#038;ssl=1\" alt=\"\" width=\"1140\" height=\"760\" srcset=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?w=1140&amp;ssl=1 1140w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?resize=768%2C512&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?resize=750%2C500&amp;ssl=1 750w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/span><\/p>\n<h3><span style=\"font-weight: 400;\">What are Managed Security Services Providers (MSSPs)?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">MSSPs are third-party providers that offer network security services, allowing an organization\u2019s IT team to focus on core activities. MSSPs enhance efficiency by managing firewalls with continuous monitoring, intrusion detection for comprehensive protection, scanning for vulnerabilities and so on. In short, it\u2019s a complete outsourced security solution for an organization and is vital to the efficient functioning of cloud-based infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s explore some of the key reasons businesses are using MSSPs.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Specialized expertise<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">MSSPs offer an umbrella of specialised expertise beyond what an in-house IT team can handle.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, managed firewalls that constantly respond to potential threats; intrusion detection to protect all devices and systems to ensure they are not used by bad actors to harm other systems inside or outside the organisation; vulnerability scanning to identify potential threats and pinpoint vulnerabilities; a portfolio of antiviral services to detect the most salient of threats; governance, risk and compliance applications to act as \u201csecurity auditors\u201d; incident response and forensic analysis to understand how an attack happened; and penetration testing to expose weaknesses and vulnerabilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine if your own team had to handle all this along with their core responsibilities &#8211; it\u2019s hard to build in-depth in-house expertise across such a wide range of specializations.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Proactive monitoring<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">MSSPs use advanced tools and technologies to continuously monitor networks, detect threats and ensure swift responses, thereby identifying and mitigating risks before they escalate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Besides merely detecting issues, proactive monitoring helps you make strategic rather than tactical business decisions. For example, proactive monitoring allows for you to implement application-level monitoring, which helps detect performance degradations in real time and take pre-emptive measures. Proactive monitoring tools also continuously monitor network traffic and system logs to continuously and constantly detect any suspicious activities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This significantly decreases the duration ransomware resides within the system, mitigating potential impact and downtime and recovery costs.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Cutting-edge tools and processes<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">MSSPs use cutting-edge tools and processes to prevent and identify threats. For example, threat intelligence tools allow security analysts to perform analysis at scale as well as allow them to identify threats in seemingly unrelated security events. Data security software tools enable MSSPs to encrypt data, back it up, mask it and prevent loss from breaches or exfiltration transmissions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most MSSPs have tools that leverage AI for cyber analytics to identify behaviours of advanced attackers as well as provide real-time monitoring for both on-premises and hybrid cloud environments.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Business continuity<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyberattacks don\u2019t just affect businesses financially &#8211; they impact business continuity too. According to a <\/span><a href=\"https:\/\/www.provendata.com\/blog\/how-long-does-it-take-to-recover-from-ransomware\/#:~:text=According%20to%20a%20Statista%20survey,investigation%20process%2C%20and%20system%20building.\"><span style=\"font-weight: 400;\">Statista<\/span><\/a><span style=\"font-weight: 400;\"> survey, the average recovery time after a ransomware attack is 22 days.<br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A few years ago, UK-based telecom provider <\/span><a href=\"https:\/\/www.theguardian.com\/business\/2016\/feb\/02\/talktalk-cyberattack-costs-customers-leave\"><span style=\"font-weight: 400;\">TalkTalk<\/span><\/a><span style=\"font-weight: 400;\"> lost 101,000 customers and suffered costs of \u00a360m as a result of a cyber-attack. Potentially more expensive is the loss of reputation that results from an attack. A cyberattack tends to signal to the public that your network security may not be \u201csecure\u201d and their data may not be safe in your hands. Another reason to get an MSSP on board.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Financial benefits<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s a misconception that outsourcing security services is costly. On the other hand, running Security Operations Centres (SOCs) in-house can be expensive. A <\/span><a href=\"https:\/\/www.scmagazine.com\/news\/complexity-and-cost-chip-away-at-socs-perceived-return-on-investment\"><span style=\"font-weight: 400;\">survey<\/span><\/a><span style=\"font-weight: 400;\"> by Ponemon Institute in 2021 found that half of 17,200 IT and security practitioners said their SOC\u2019s ROI has become worse over the years. Companies said an in-house SOC cost an average of about $2.72 million annually on security engineering work alone. That\u2019s because 24\/7\/365 staffing coverage, an organization would require three sets of staff to cover three eight-hour shifts. So, you can imagine the salary costs alone!<\/span><\/p>\n<p><a href=\"https:\/\/cybersecurity.att.com\/blogs\/security-essentials\/how-to-justify-your-cybersecurity-budget\"><span style=\"font-weight: 400;\">Deloitte<\/span><\/a><span style=\"font-weight: 400;\"> and the Financial Services Information Sharing and Analysis Center found that financial services on average spend 10% of their IT budgets on cybersecurity (0.2% to 0.9% of company revenue per full-time employee).\u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Partnering with an MSSP can often result in increased productivity, greater efficiency and significant cost savings as they eliminate the need for businesses to invest heavily in expensive infrastructure and personnel. If you\u2019d like to know just how much you can save costs and boost efficiency by hiring an MSSP, give CloudNow a call.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Norton Security reports that global cybercrime costs are expected to grow by 15% a year, reaching $10.5 trillion annually by 2025. From malware and Denial-of-Service (DoS) attacks to phishing, spoofing and code injection attacks to IoT-based attacks, the onslaught is relentless. Cybersecurity Ventures says in the last decade there have been 44 attacks every second. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3668,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-others"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs) - Discover Better Value Faster<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs) - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"Norton Security reports that global cybercrime costs are expected to grow by 15% a year, reaching $10.5 trillion annually by 2025. From malware and Denial-of-Service (DoS) attacks to phishing, spoofing and code injection attacks to IoT-based attacks, the onslaught is relentless. Cybersecurity Ventures says in the last decade there have been 44 attacks every second. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T09:23:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-01T10:51:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dinesh Harikrishnan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&ssl=1\",\"contentUrl\":\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&ssl=1\",\"width\":1140,\"height\":760},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/\",\"name\":\"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs) - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#primaryimage\"},\"datePublished\":\"2023-11-20T09:23:43+00:00\",\"dateModified\":\"2024-08-01T10:51:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/e470a91daa71167a9113fe5c4a197532\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs)\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/e470a91daa71167a9113fe5c4a197532\",\"name\":\"Dinesh Harikrishnan\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/12\/AJU3351-scaled-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/12\/AJU3351-scaled-96x96.jpg\",\"caption\":\"Dinesh Harikrishnan\"},\"description\":\"Dinesh Harikrishnan has over 8 years of extensive experience in Software Development, paired with in-depth exposure to customer facing roles in Support, Technical Consultancy, Business Analysis and Pre-Sales.\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/dinesh-h\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs) - Discover Better Value Faster","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/","og_locale":"en_US","og_type":"article","og_title":"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs) - Discover Better Value Faster","og_description":"Norton Security reports that global cybercrime costs are expected to grow by 15% a year, reaching $10.5 trillion annually by 2025. From malware and Denial-of-Service (DoS) attacks to phishing, spoofing and code injection attacks to IoT-based attacks, the onslaught is relentless. Cybersecurity Ventures says in the last decade there have been 44 attacks every second. [&hellip;]","og_url":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/","og_site_name":"Discover Better Value Faster","article_published_time":"2023-11-20T09:23:43+00:00","article_modified_time":"2024-08-01T10:51:45+00:00","og_image":[{"width":1140,"height":760,"url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&ssl=1","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dinesh Harikrishnan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&ssl=1","contentUrl":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&ssl=1","width":1140,"height":760},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/","name":"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs) - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#primaryimage"},"datePublished":"2023-11-20T09:23:43+00:00","dateModified":"2024-08-01T10:51:45+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/e470a91daa71167a9113fe5c4a197532"},"breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/unlocking-business-security-the-rise-of-cloud-managed-security-service-providers-mssps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Unlocking Business Security: The Rise of Cloud Managed Security Service Providers (MSSPs)"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/e470a91daa71167a9113fe5c4a197532","name":"Dinesh Harikrishnan","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/12\/AJU3351-scaled-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/12\/AJU3351-scaled-96x96.jpg","caption":"Dinesh Harikrishnan"},"description":"Dinesh Harikrishnan has over 8 years of extensive experience in Software Development, paired with in-depth exposure to customer facing roles in Support, Technical Consultancy, Business Analysis and Pre-Sales.","url":"https:\/\/www.cloudnowtech.com\/blog\/author\/dinesh-h\/"}]}},"jetpack_featured_media_url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2023\/11\/Blog-146.png?fit=1140%2C760&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=3667"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3667\/revisions"}],"predecessor-version":[{"id":3669,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3667\/revisions\/3669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/3668"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=3667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=3667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=3667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}