{"id":59532,"date":"2022-02-22T14:53:00","date_gmt":"2022-02-22T19:53:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=59532"},"modified":"2024-11-14T12:23:42","modified_gmt":"2024-11-14T17:23:42","slug":"zero-trust-benefits-smes","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes","title":{"rendered":"The Benefits of Zero Trust Security to Small and Medium Enterprises"},"content":{"rendered":"\n

Zero Trust security<\/a> is a modern approach to security that addresses the dissipation of the traditional security \u201cperimeter.\u201d The perimeter-based \u201ccastle and moat\u201d security approach has decreased in effectiveness as SaaS and cloud-based environments become business standard. <\/p>\n\n\n\n

Now, Zero Trust security is transitioning from being a \u201cnice to have\u201d to a necessity for businesses of all sizes. And while security is often written off as a problem for large enterprises, Zero Trust is now just as necessary for small and medium enterprises (SMEs).<\/p>\n\n\n\n

Fortunately, Zero Trust presents many benefits to SMEs. And while the road to achieving full Zero Trust<\/a> is long, even partial Zero Trust environments help SMEs improve their security and gain advantage in several other areas. This blog will delineate those advantages, starting with the most critical: reliable security in the modern workplace.<\/p>\n\n\n\n

Reliable Security in a Modern Work Environment<\/h2>\n\n\n\n

Security Is Everyone\u2019s Problem<\/h3>\n\n\n\n

The idea that large enterprises are the only businesses that need to worry about security is a myth. Cybercrime trends follow similar patterns<\/a> in small and large businesses alike, and attacks are on the rise. <\/p>\n\n\n\n

Cybercrime skyrocketed in 2020<\/a> as cybercriminals took advantage of newly created and vulnerable remote environments. Today, bad actors continue to exploit gaps in companies\u2019 remote and hybrid infrastructure, and cybercrime continues to rise<\/a>. <\/p>\n\n\n\n

Now that the average SME has 30% of employees<\/a> working remotely and 32.5% working hybrid-remotely, SMEs\u2019 security programs need to support remote and hybrid setups.<\/p>\n\n\n\n

In fact, SME IT professionals ranked \u201cadding layered security so work-from-anywhere is truly secure\u201d as their top priority for both 2021 and 2022<\/a>, and over 80% agreed that remote and hybrid-remote work increased their focus on security. SMEs need security that can account for these work-from-anywhere environments, and the traditional perimeter method falls short.<\/p>\n\n\n\n

Why Perimeter Security Falls Short<\/h3>\n\n\n\n

Traditional perimeter security fails modern environments on two main accounts: first, it tries to apply the idea of a physical perimeter to a perimeterless environment. Cloud-based environments don’t have central on-prem infrastructure to protect; thus, the idea of a perimeter becomes irrelevant. <\/p>\n\n\n\n

Second, perimeter security places all of its safeguards at the initial access transaction (i.e., the perimeter), and trusts these safeguards so fully that it assumes that anyone inside the perimeter is trustworthy. <\/p>\n\n\n\n

While a desirable ideal, this has proved unrealistic; cybercriminals are now so fast and sophisticated that security experts say attacks are inevitable: plan for when<\/em>, not if<\/em> they occur. <\/p>\n\n\n\n

How Zero Trust Provides Better Security<\/h3>\n\n\n\n

Zero Trust security emerged as a response to the perimeter method\u2019s shortcomings; it was designed to protect modern cloud environments. <\/p>\n\n\n\n

To start, it prescribes secure<\/em> authentication everywhere: multi-factor authentication (MFA<\/a>) instead of a simple password login. This makes access exponentially more secure than the traditional password model. It also requires principle of least privilege (PLP)<\/a> enforcement and secure authentication at every transaction instead of just at the \u201cperimeter,\u201d which immediately improves login security and prevents lateral movement in case of a breach.<\/p>\n\n\n\n

In addition, Zero Trust architectures and the solutions that support them generally provide better visibility and control in cloud-based environments to improve threat detection and mitigation. <\/p>\n\n\n\n

Overall, Zero Trust provides SMEs the best defense against cybercrime and a sustainable security foundation for long-term remote and hybrid work<\/a>. <\/p>\n\n\n\n

Future-Proof Technology<\/h2>\n\n\n\n

Legacy equipment has always been somewhat change-averse: any changes are rooted in physical equipment, making them expensive, time-consuming, and difficult to implement. By contrast, Zero Trust\u2019s departure from physical infrastructure makes Zero Trust architectures more malleable and adaptable than traditional perimeter-based security and, therefore, better suited to adapt to future changes. <\/p>\n\n\n\n

The ability to embrace change is particularly important to the SME, which needs to remain nimble and adaptable amidst frequent organizational and market changes.  <\/p>\n\n\n\n

Better Usability<\/h2>\n\n\n\n

Zero Trust security frameworks are designed to accommodate cloud resources, which have evolved to be more user-friendly than their legacy counterparts. As such, Zero Trust implementations tend to be similarly cloud-based and user-friendly. <\/p>\n\n\n\n

From reducing the user\u2019s need to remember and input passwords to automating onboarding and offboarding<\/a>, Zero Trust implementations tend to improve the employee experience. Zero Trust environments use integration, automation, and a single source of truth, which in turn offer users consistent, intuitive, and seamless experiences. <\/p>\n\n\n\n

User buy-in is a critical component of a Zero Trust implementation, and the employee experience is becoming a differentiator for employers. Improving the user experience helps SMEs promote Zero Trust buy-in and keep employees satisfied.<\/p>\n\n\n\n

Improved Admin Experience<\/h2>\n\n\n\n

In addition to improving the user experience, Zero Trust security also provides a better experience for IT admins. Zero Trust prescribes software-driven architecture that improves visibility and streamlines management (especially in hybrid and remote environments).<\/p>\n\n\n\n

This relieves some of IT\u2019s burden, simplifies security administration, and improves IT admins\u2019 ability to detect and address issues before they become breaches. <\/p>\n\n\n\n

Streamlining the IT admin\u2019s experience heightens security while creating an environment that fosters smooth organizational changes, scaling, and IT maintenance. In SMEs where IT departments may be strained, this saved time can be reallocated to make a significant impact in other IT initiatives<\/a> without compromising on security. It\u2019s also a major contributor to buy-in among IT teams, which is just as critical as user buy-in for getting your Zero Trust program to take hold.<\/p>\n\n\n\n

Market Differentiator<\/h2>\n\n\n\n

Vendor security is moving up in priority for customers. As data privacy falls under increasing scrutiny, businesses and individual consumers alike want to ensure their data remains secure in a third party\u2019s hands. When shopping for vendors, therefore, security can be a significant differentiator. <\/p>\n\n\n\n

If your competitors haven\u2019t implemented Zero Trust yet (and they likely haven\u2019t: only 23% of SMEs<\/a> have fully implemented Zero Trust so far), citing Zero Trust practices can be a significant differentiator for your organization.<\/p>\n\n\n\n

If your competitors do <\/em>follow Zero Trust practices, you\u2019re behind if you can\u2019t follow suit. Shoring up your security and including your Zero Trust practices in your messaging can keep your business competitive. <\/p>\n\n\n\n

Demystifying Zero Trust<\/h2>\n\n\n\n

Zero Trust security has risen in popularity over the last few years as it becomes necessary to defend modern work-from-anywhere environments. However, its prevalence in the market has led to some misuse of the term and misconceptions around what Zero Trust<\/a> is (and what it isn\u2019t). This confusion can make for a difficult Zero Trust journey, especially for SMEs, who are likely working with small IT teams and constrained budgets.<\/p>\n\n\n\n

The first step to achieving Zero Trust is understanding what it is and what you\u2019ll need to do to get there. JumpCloud\u2019s whitepaper, Zero Trust Demystified, is designed to clarify misconceptions and cut through the noise with clear, actionable guidelines for SMEs looking to get started with Zero Trust, no matter where they stand. Download the Zero Trust Demystified whitepaper<\/a> to start making progress on your Zero Trust implementation quickly, strategically, and effectively.  <\/p>\n","protected":false},"excerpt":{"rendered":"

Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.<\/p>\n","protected":false},"author":144,"featured_media":48644,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2337],"tags":[2373,2374],"collection":[2775],"platform":[],"funnel_stage":[3015],"coauthors":[2532],"acf":[],"yoast_head":"\nBenefits of Zero Trust Security to SMEs - JumpCloud<\/title>\n<meta name=\"description\" content=\"Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Benefits of Zero Trust Security to Small and Medium Enterprises\" \/>\n<meta property=\"og:description\" content=\"Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-22T19:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-14T17:23:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"841\" \/>\n\t<meta property=\"og:image:height\" content=\"746\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kate Lake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Lake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\"},\"author\":{\"name\":\"Kate Lake\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\"},\"headline\":\"The Benefits of Zero Trust Security to Small and Medium Enterprises\",\"datePublished\":\"2022-02-22T19:53:00+00:00\",\"dateModified\":\"2024-11-14T17:23:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\"},\"wordCount\":1162,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg\",\"keywords\":[\"security\",\"zero trust\"],\"articleSection\":[\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\",\"url\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\",\"name\":\"Benefits of Zero Trust Security to SMEs - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg\",\"datePublished\":\"2022-02-22T19:53:00+00:00\",\"dateModified\":\"2024-11-14T17:23:42+00:00\",\"description\":\"Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg\",\"width\":841,\"height\":746},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Benefits of Zero Trust Security to Small and Medium Enterprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78\",\"name\":\"Kate Lake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g\",\"caption\":\"Kate Lake\"},\"description\":\"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Benefits of Zero Trust Security to SMEs - JumpCloud","description":"Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes","og_locale":"en_US","og_type":"article","og_title":"The Benefits of Zero Trust Security to Small and Medium Enterprises","og_description":"Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.","og_url":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes","og_site_name":"JumpCloud","article_published_time":"2022-02-22T19:53:00+00:00","article_modified_time":"2024-11-14T17:23:42+00:00","og_image":[{"width":841,"height":746,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg","type":"image\/jpeg"}],"author":"Kate Lake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kate Lake","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes"},"author":{"name":"Kate Lake","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78"},"headline":"The Benefits of Zero Trust Security to Small and Medium Enterprises","datePublished":"2022-02-22T19:53:00+00:00","dateModified":"2024-11-14T17:23:42+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes"},"wordCount":1162,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg","keywords":["security","zero trust"],"articleSection":["Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes","url":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes","name":"Benefits of Zero Trust Security to SMEs - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg","datePublished":"2022-02-22T19:53:00+00:00","dateModified":"2024-11-14T17:23:42+00:00","description":"Learn why Zero Trust security is necessary and beneficial to small and medium enterprises. Find all your Zero Trust resources from JumpCloud.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/12\/Zero-Trust-Security.jpg","width":841,"height":746},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/zero-trust-benefits-smes#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"The Benefits of Zero Trust Security to Small and Medium Enterprises"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/f8e192cbcdde7ffa4bc2f96c48ceda78","name":"Kate Lake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/46cab796831a4f3fb686940689408879","url":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49d664ae369f57340f0165a652ddb04b?s=96&d=mm&r=g","caption":"Kate Lake"},"description":"Kate Lake is a Senior Content Writer at JumpCloud, where she writes about JumpCloud\u2019s cloud directory platform and trends in IT, technology, and security. She holds a Bachelors in Linguistics from the University of Virginia and is driven by a lifelong passion for writing and learning. When she isn't writing for JumpCloud, Kate can be found traveling, exploring the outdoors, or quoting a sci-fi movie (often all at once).","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/59532"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=59532"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/59532\/revisions"}],"predecessor-version":[{"id":117441,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/59532\/revisions\/117441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/48644"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=59532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=59532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=59532"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=59532"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=59532"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=59532"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=59532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}