{"id":48251,"date":"2024-11-06T21:11:14","date_gmt":"2024-11-07T01:11:14","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=48251"},"modified":"2024-11-06T21:11:16","modified_gmt":"2024-11-07T01:11:16","slug":"the-role-of-managed-security-service-providers-in-modern-cyber-defense","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/","title":{"rendered":"The Role of Managed Security Service Providers in Modern Cyber Defense"},"content":{"rendered":"\n<p>Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure. As a result, they are overtaxed, and many organizations do not have sufficient security measures in place.<\/p>\n\n\n\n<p>To solve this problem, some companies are turning to <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/cyber-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyber security solution providers<\/a>, also known as Managed Security Service Providers. Although this is not the cheapest solution, it often pays for itself when compared to the costs of a data breach or compromised network.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Teams Struggle to Keep Up<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.entrepreneur.com\/science-technology\/heres-how-to-build-a-strong-security-team-to-keep-your\/275226\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"675\" height=\"380\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Heres-How-to-Build-a-Strong-Security-Team-to-Keep-Your-Company-Safe-and-Sound.webp\" alt=\"\" class=\"wp-image-48253 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 675px; --smush-placeholder-aspect-ratio: 675\/380;\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Here&#8217;s How to Build a Strong Security Team to Keep Your Company Safe and Sound<\/em><\/figcaption><\/figure>\n\n\n\n<p>Despite their best efforts, many security teams struggle to keep up with increasingly sophisticated and frequent cyber attacks. There are a number of reasons for this.&nbsp;<\/p>\n\n\n\n<ul>\n<li><strong>Drastic increases in volume<\/strong>. DDoS attacks alone have increased <a href=\"https:\/\/cybermagazine.com\/articles\/companies-across-cyber-sphere-warn-of-surge-in-ddos-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">111%<\/a> over 2023 numbers, and other types of attacks have risen similarly. Data breaches are up <a href=\"https:\/\/www.forbes.com\/advisor\/education\/it-and-tech\/cybersecurity-statistics\/#:~:text=Cybersecurity%20Fast%20Facts&amp;text=2023%20saw%20a%2072%25%20increase,the%20previous%20all%2Dtime%20record.&amp;text=Around%20the%20world%2C%20a%20data,million%20on%20average%20in%202024\" target=\"_blank\" rel=\"noreferrer noopener\">72%<\/a> and cost an average of almost $5 million. Bots are growing more evasive, and the rise of AI has made it easier and cheaper to attack websites and applications.\u00a0<\/li>\n\n\n\n<li><strong>Increasingly complex infrastructure.<\/strong>&nbsp; IT infrastructures are growing more complex. Many organizations use hybrid environments that combine local hardware infrastructure with cloud-based infrastructure and software.&nbsp;<\/li>\n\n\n\n<li><strong>Cloud environment complexity<\/strong>. Security environments have a large attack surface due to the cloud, and some organizations with multi-cloud or hybrid environments find themselves struggling to secure all of the platforms and devices effectively.<\/li>\n\n\n\n<li><strong>Talent shortages. <\/strong>Companies struggle to find and keep the talent needed to defend themselves against attack. When they\u2019re able to find talent, the costs of hiring that person are often high, especially if they\u2019re competing with other companies for that person.<\/li>\n<\/ul>\n\n\n\n<p>These issues put an unmanageable amount of work on security professionals. Without adequate support, handling growing numbers of security threats is overwhelming, and high-risk vulnerabilities are at risk of neglect.&nbsp;<\/p>\n\n\n\n<p>Poorly securing these vulnerabilities and failing to implement protective measures can have devastating consequences to your organization, from periods of unexpected downtime to compliance violations. Long-term consequences, like legal action and revenue losses, are also likely. Keeping up with threats is both more difficult and more critical than ever before.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Managed Solutions Can Help<\/h2>\n\n\n\n<p>The amount of time and resources it takes to prioritize and address vulnerabilities in code alone is substantial. When you also consider attack mitigation, activity monitoring, access control, and other essential components of a security strategy, it\u2019s easy to see how your team may be underequipped.&nbsp;<\/p>\n\n\n\n<p>While your security team is likely doing the best they can with the resources available, that may not be enough to secure your applications. To free up the team\u2019s time and provide more resources, consider implementing solutions configured and operated by experts. This can close security gaps and enhance security scalability while enabling your team to tackle other projects.<\/p>\n\n\n\n<p>Managed Security Service Providers (MSSPs) have access to more sophisticated and effective tools than the average non-specialist organization. Leveraging those resources may be what your team needs to reduce your vulnerabilities, protect applications from bad bots and other attackers, and block insider threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Choosing the Right Tools for the Job<\/h2>\n\n\n\n<p>Outsourcing some of your team\u2019s tasks to an MSSP can help your organization get on top of security, but it\u2019s important to choose the right MSSP. When considering organizations, one of the most important factors in your decision should be the tools the MSSP has available. To defend your company from threats most effectively, you need the best tools for the job.<\/p>\n\n\n\n<p>Make sure that the MSSP you choose offers the following tools or services:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.entrepreneur.com\/starting-a-business\/job-security-is-an-illusion-heres-how-to-leave-your\/477046\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1024\" height=\"682\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It-1024x682.webp\" alt=\"\" class=\"wp-image-48254 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It-1024x682.webp 1024w, https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It-768x512.webp 768w, https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It-1536x1024.webp 1536w, https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp 2000w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/682;\" \/><\/a><figcaption class=\"wp-element-caption\"><em>Job Security Is an Illusion \u2014 Here&#8217;s How to Leave Your 9-5 and Be More Successful, From 4 People Who Did It<\/em><\/figcaption><\/figure>\n\n\n\n<ul>\n<li><strong>Vulnerability testing<\/strong>. To ensure application security, the MSSP should regularly test the application\u2019s code for vulnerabilities. It should also stay abreast of new exploits and patch your app as needed. Application security testing is also an important tool to look for.&nbsp;<\/li>\n\n\n\n<li><strong>Cloud security<\/strong>. With the growing complexity of infrastructure and environments, MSSPs should be able to find and fix misconfigurations and other issues.&nbsp;<\/li>\n\n\n\n<li><strong>Endpoint security.<\/strong> Managing all of the devices that connect to your network is a big task, especially with a growing number of employees using their own devices or working remotely. Authentication solutions and malware protection are important components of securing endpoints.<\/li>\n\n\n\n<li><strong>Application security.<\/strong> Solutions like web application firewalls (WAFs) are important for protecting your network from malicious traffic. A WAF will filter and block unusual activity, preventing attackers and unwanted bots from accessing the network. Given the rapidly growing frequency of DDoS attacks, ensure that the MSSP also offers DDoS protection.&nbsp;<\/li>\n\n\n\n<li><strong>Enterprise Security Management (ESM) and Governance (ESG).<\/strong> ESM and ESG solutions are important for maintaining compliance with data privacy and security regulations. ESG focuses on strategizing how you will handle your data, and ESM focuses on controlling and securing data.&nbsp;<\/li>\n\n\n\n<li><strong>Network security.<\/strong> Automated traffic monitoring and alerts should be a top priority. With constant monitoring and detailed logs, you can catch attacks early and better predict others in the future.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Choosing an MSSP isn\u2019t easy. There are many options available, and they all have a wide variety of tools available. Even so, when you prioritize these essential tools and hire the right provider, you can vastly improve your security. You can also ensure that your security team has the time and resources to address projects beyond the scope of immediate danger.<\/p>\n\n\n\n<p>Ultimately, this is important for continued business success. To grow, you need to be proactive and strategic about your next moves. A component of this is your security team\u2019s ability to tackle larger, long-term projects that will set up your company for success down the line. Covering your defensive bases by collaborating with an MSSP means you\u2019ll be able to focus on better serving your customers and building your organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure. As a result, they are overtaxed, and many organizations<\/p>\n","protected":false},"author":1,"featured_media":48254,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,5695,1],"tags":[5891,7846,4491,16222,6557,6020,9389,988,118,177,182,4488,5879,21,115,16573,5890],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Role of Managed Security Service Providers in Modern Cyber Defense<\/title>\n<meta name=\"description\" content=\"Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Role of Managed Security Service Providers in Modern Cyber Defense\" \/>\n<meta property=\"og:description\" content=\"Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-07T01:11:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T01:11:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/\",\"name\":\"The Role of Managed Security Service Providers in Modern Cyber Defense\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp\",\"datePublished\":\"2024-11-07T01:11:14+00:00\",\"dateModified\":\"2024-11-07T01:11:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp\",\"width\":2000,\"height\":1333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Role of Managed Security Service Providers in Modern Cyber Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Role of Managed Security Service Providers in Modern Cyber Defense","description":"Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/","og_locale":"en_US","og_type":"article","og_title":"The Role of Managed Security Service Providers in Modern Cyber Defense","og_description":"Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure.","og_url":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2024-11-07T01:11:14+00:00","article_modified_time":"2024-11-07T01:11:16+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp","type":"image\/webp"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/","url":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/","name":"The Role of Managed Security Service Providers in Modern Cyber Defense","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp","datePublished":"2024-11-07T01:11:14+00:00","dateModified":"2024-11-07T01:11:16+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Keeping up with growing numbers of cyberattacks is no easy task. Many security teams are understaffed, dealing with increasingly complex infrastructure.","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/Job-Security-Is-an-Illusion-\u2014-Heres-How-to-Leave-Your-9-5-and-Be-More-Successful-From-4-People-Who-Did-It.webp","width":2000,"height":1333},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2024\/the-role-of-managed-security-service-providers-in-modern-cyber-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Role of Managed Security Service Providers in Modern Cyber Defense"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/48251"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=48251"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/48251\/revisions"}],"predecessor-version":[{"id":48255,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/48251\/revisions\/48255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/48254"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=48251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=48251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=48251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}