{"id":91934,"date":"2020-09-24T09:00:56","date_gmt":"2020-09-24T16:00:56","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91934"},"modified":"2023-05-15T23:06:08","modified_gmt":"2023-05-16T06:06:08","slug":"microsoft-security-6-tips-centric-cybersecurity-security-training","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/","title":{"rendered":"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training"},"content":{"rendered":"

Everyone knows about phishing scams, and most of us think we\u2019re too smart to take the bait. Our confidence often reaches superhero levels when we\u2019re logged onto a company network. As Chief Security Advisor for Microsoft, and previously at telco Swisscom, it\u2019s my business to understand how well employees adapt security training into their daily routines. Years of experience have taught me there are commonalities in human behavior that cut across all levels of an organization. Above all, people want to trust the company they work for and the communications they receive. It\u2019s our task to help them understand that yes, their employer is looking out for them, but they also need to be vigilant to protect themselves and their company\u2019s private data.<\/p>\n

Tip #1: Make it fun.<\/strong> That means creating training modules that people will actually want<\/em> to watch. Think of your favorite TV shows. There\u2019s a reason you want to binge every episode. You care about the characters, or you\u2019re at least interested in how their dilemmas work out. A good example is the Fox TV show 24<\/em>; every episode was one hour in an unfolding storyline with high stakes. Your training program doesn\u2019t need life-or-death consequences, but it should give people a reason to watch beyond just checking a box for compliance.<\/p>\n

Tip #2: Make it easy. <\/strong>Your end-user is your customer; so, you need them to buy-in. When investigating new security solutions, I ask: \u201cCould you explain how this works to my mother in thirty minutes or less?\u201d If not, it\u2019s probably not a user-friendly solution. Asking people to create a password with 20 characters consisting of random symbols, cases, and numbers (that they shouldn\u2019t write down) is not easy. For a better option, try passwordless authentication options for Azure Active Directory<\/a>. If your organization has \u00a0Microsoft Defender for Office 365 Plan 2, which includes Threat Investigation and Response<\/a> capabilities, you can employ Attack Simulator in the Security & Compliance Center to run realistic scenarios. These simulated attacks can help you easily identify vulnerable users before a real attacker comes knocking.<\/p>\n

Tip #3: Focus on your highest risk. <\/strong>Nearly one in three security breaches starts with a phishing attack<\/a> costing the affected organization an average of USD1.4 million. Even after security training, employees still click on phishing links at an average rate of 20 \u2013 30 percent. With the rise in people working from home, new forms, such as consent phishing<\/a>, have cropped up to take advantage of new vulnerabilities. Direct your resources to where the people in your organization can see the risk is real, and you\u2019ll generate positive engagement.<\/p>\n

Tip #4: Be transparent about breaches. <\/strong>No organization can claim 100 percent invulnerability. Let people know they are the first line of defense. Communicating with staff when a successful attack occurs will help them remain alert. It\u2019s okay to provide examples as long as you don\u2019t reveal so much information that it’s obvious who clicked on that fake Zoom invitation. Be careful not to treat employees like children. They need to own their own actions, but shaming won\u2019t make your organization safer.<\/p>\n

Tip #5: Avoid a compliance only mindset. <\/strong>Yes, that once-a-year cybersecurity training your people dutifully click through meets the organizational requirement. But gaining employee buy-in means doing more than just checking the box. Schedule a refresher course after a breach, even if the victim happens to be another company. Creating a security program that\u2019s fun and engaging will probably cost more, but ask yourself how high the costs from downtime and lost productivity from a major breach would run. Better to invest those funds in protection upfront.<\/p>\n

Tip #6: Communicate and educate continuously. <\/strong>Make security news part of your normal staff communications. Talk to your people about the headline-making hacks that target large corporations and government agencies, as well as the smaller identity theft and payment-app scams we all contend with. Talk about supply chain security and the dangers of using unauthorized devices and shadow IT. Cybersecurity threats can feel overwhelming and scary. Communication helps demystify those threats and makes employees feel empowered to protect themselves and their organizations.<\/p>\n

To learn more about Microsoft Security solutions visit our website.<\/a>\u00a0 Bookmark the\u00a0Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us at\u00a0@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"

Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.<\/p>\n","protected":false},"author":96,"featured_media":91936,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3684],"products":[3702,3703],"threat-intelligence":[],"tags":[3809],"coauthors":[1936],"class_list":["post-91934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-security-operations","products-microsoft-entra","products-microsoft-entra-id","tag-security-strategies"],"yoast_head":"\nMicrosoft Security: 6 tips for enabling people-centric cybersecurity with security training | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-24T16:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:06:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"263\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Halbheer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Halbheer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/roger-halbheer\/\",\"@type\":\"Person\",\"@name\":\"Roger Halbheer\"}],\"headline\":\"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training\",\"datePublished\":\"2020-09-24T16:00:56+00:00\",\"dateModified\":\"2023-05-16T06:06:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\"},\"wordCount\":735,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png\",\"keywords\":[\"Security strategies\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\",\"name\":\"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png\",\"datePublished\":\"2020-09-24T16:00:56+00:00\",\"dateModified\":\"2023-05-16T06:06:08+00:00\",\"description\":\"Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png\",\"width\":500,\"height\":263,\"caption\":\"An image of a man working remotely on a Dell Latitude 7410 from his diningroom table.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training | Microsoft Security Blog","description":"Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training | Microsoft Security Blog","og_description":"Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-09-24T16:00:56+00:00","article_modified_time":"2023-05-16T06:06:08+00:00","og_image":[{"width":500,"height":263,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png","type":"image\/png"}],"author":"Roger Halbheer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Halbheer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/roger-halbheer\/","@type":"Person","@name":"Roger Halbheer"}],"headline":"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training","datePublished":"2020-09-24T16:00:56+00:00","dateModified":"2023-05-16T06:06:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/"},"wordCount":735,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png","keywords":["Security strategies"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/","name":"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png","datePublished":"2020-09-24T16:00:56+00:00","dateModified":"2023-05-16T06:06:08+00:00","description":"Get actionable insights for empowering frontline workers as part a robust cybersecurity solution.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/09\/WIN20_PRO_RemoteWorking_015-9-24FEATURE.png","width":500,"height":263,"caption":"An image of a man working remotely on a Dell Latitude 7410 from his diningroom table."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/24\/microsoft-security-6-tips-centric-cybersecurity-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Security: 6 tips for enabling people-centric cybersecurity with security training"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91934"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=91934"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/91936"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=91934"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=91934"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=91934"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=91934"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=91934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=91934"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=91934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}