{"id":1177,"date":"2022-07-28T19:45:00","date_gmt":"2023-06-06T19:45:54","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=1177"},"modified":"2023-07-11T04:27:35","modified_gmt":"2023-07-11T04:27:35","slug":"data-security-in-hybrid-workplace","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/","title":{"rendered":"Data Security is Every Employee&#8217;s Responsibility in the Hybrid Workplace"},"content":{"rendered":"\n<p>Perimeter-based security has often served as the first line of defence against cyberattacks. This \u2018castle and moat\u2019 approach treats the organisation\u2019s network as a trusted space and places firewalls and other defences at the edges.&nbsp;<\/p>\n\n\n\n<p>The challenge with this approach is that the network perimeter is eroding. In our new hybrid workplace, employees access and share data from anywhere, using multiple devices.&nbsp;<\/p>\n\n\n\n<p>That\u2019s why many businesses are moving to a zero trust approach. Zero trust includes the use of technologies like multi-factor authentication to secure individual data assets, as opposed to the perimeter they sit behind. Therefore, even if someone accesses one part of a network, they will not be able to move freely inside it.<\/p>\n\n\n\n<p>Many businesses are also realising the need to strengthen all their defences and make security the responsibility of every employee.&nbsp;<\/p>\n\n\n\n<p>The question is how can businesses elevate employees\u2019 understanding of data security and equip them to play a more proactive role?&nbsp;<\/p>\n\n\n\n<p>Here are top tips and practical examples on how to embed trust and security into company culture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"educate-and-empower-employees-to-keep-data-secure\"> <span> Educate and empower employees to keep data secure <\/span> <\/h2>\n\n\n\n<p>The rise of remote working has made businesses more vulnerable to phishing, malware attacks,&nbsp;<\/p>\n\n\n\n<p>rogue network access, and other cybersecurity threats. According to a <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\">2021 report from IBM<\/a>, phishing attempts alone rose 600%.<\/p>\n\n\n\n<p>Advancements in security technology can help businesses protect against these threats and <a href=\"https:\/\/www.salesforce.com\/ap\/blog\/2021\/12\/cybersecurity-secure-business-data.html\" target=\"_blank\" rel=\"noopener\">secure data at every touchpoint<\/a>. However, many successful data breaches are the result of human error.&nbsp;<\/p>\n\n\n\n<p>This issue was raised during a recent fireside chat with our customers on <a href=\"https:\/\/www.salesforce.com\/ap\/form\/events\/webinars\/form-rss\/3598627?d=7013y000002R87SAAS&amp;nc=7013y000002R87NAAS\" target=\"_blank\" rel=\"noopener\">navigating the security frontier in 2022<\/a>.&nbsp;<\/p>\n\n\n\n<p>\u201cEveryone in IT is aware there are seven layers of cybersecurity. One of these is the human layer and it is always the weakest point,\u201d said Hasniza Binti Mohamed, Director, Digital &amp; Incubation at UEM Sunrise Berhad, one of Malaysia\u2019s leading property developers.&nbsp;<\/p>\n\n\n\n<p>With this in mind, UEM Sunrise Berhad launched a new cybersecurity training program last year. The program included a series of online modules as well as a phishing simulation to test key learnings. A number of employees fell victim to the simulated attack, which reinforced the need for continual training.&nbsp;<\/p>\n\n\n\n<p>\u201cSecurity depends not only on process and technology, but also on people. In the current environment, we need to strengthen all three,\u201d said Hasniza.&nbsp;<\/p>\n\n\n\n<p>To ensure the success of awareness and training activities, it\u2019s important to tailor content to business context and incentivise participation. In the case of UEM Sunrise Berhad, a leaderboard and prizes gamified learning and kept employees engaged.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"engage-employees-to-stay-productive-and-secure\"> <span> Engage employees to stay productive and secure <\/span> <\/h2>\n\n\n\n<p>Salesforce research into the role of technology in employee engagement confirmed that <a href=\"https:\/\/www.salesforce.com\/ap\/form\/pdf\/employee-engagement-it-handbook\/\" target=\"_blank\" rel=\"noopener\">the quality of an<\/a>&nbsp;<a href=\"https:\/\/www.salesforce.com\/ap\/form\/conf\/employee-engagement-it-handbook\/\" target=\"_blank\" rel=\"noopener\">organisation\u2019s technology directly affects the quality of employees\u2019 work<\/a>. What\u2019s more, 93% of office workers in Singapore say their experiences as consumers are increasing their expectations of workplace technology.<\/p>\n\n\n\n<p>Employees want better workplace apps and the pressure is on IT leaders to deliver technology that improves employee engagement. The challenge is that 76% of IT leaders say their teams are not aligned with the rest of the business.&nbsp;<\/p>\n\n\n\n<p>This misalignment can be heightened in the security space. For example, while every employee should have a vested interest in security, not everyone understands the language of cybersecurity. They might also not understand the impact threats can have on revenue, customer experience, and trust.<\/p>\n\n\n\n<p>To engage with the business, IT and security leaders should start by translating security concerns into the language of risk. They then need to balance the risks with the business\u2019 priorities.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"equip-employees-to-build-on-a-trusted-platform\"> <span> Equip employees to build on a trusted platform <\/span> <\/h2>\n\n\n\n<p>The relationship between security and business teams can be contentious. For example, the business may blame data security and privacy controls for slowing down innovation. However, data has become a critical asset and securing that asset should be at the foundation of any business goal.&nbsp;<\/p>\n\n\n\n<p>The good news is that technology has evolved substantially. Today\u2019s security solutions can actually help rather than hinder innovation. For starters, enabling teams to build on a <a href=\"https:\/\/www.salesforce.com\/ap\/products\/platform\/services\/how-you-secure\/\" target=\"_blank\" rel=\"noopener\">trusted platform<\/a> reduces risk, complexity, and the cost of compliance.&nbsp;<\/p>\n\n\n\n<p>Teams can also embed security and privacy controls into the application development process using solutions like <a href=\"https:\/\/www.salesforce.com\/products\/platform\/features\/data-mask\/\" target=\"_blank\" rel=\"noopener\">Salesforce Data Mask<\/a>. This can help to accelerate innovation while protecting regulated data.&nbsp;<\/p>\n\n\n\n<p>The bottom line is that businesses must prioritise security. Not only to protect their data, but also to earn the trust of their customers. A secure and trusted platform can help IT, security, and business teams to align on this goal and enable continuous innovation.&nbsp;<\/p>\n\n\n\n<p><i><a href=\"https:\/\/www.salesforce.com\/ap\/resources\/guides\/data-security-governance-it-guide\/?d=7013y000002lc2cAAA&amp;nc=7013y000002RBUnAAO\" target=\"_blank\" rel=\"noopener\">Download the IT Leader\u2019s Guide to Data Security and Governance<\/a> for more tips on how to simultaneously empower your teams and protect your data.&nbsp;&nbsp;<\/i><\/p>\n\n\n\n<p> <span id=\"authorRoot\" path=\"\/content\/blogs\/sg\/en\/authors\/\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to engage and empower all your employees to take ownership of data security.<\/p>\n","protected":false},"author":1,"featured_media":1176,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"11be27688cdd4f3eaa9b4a337a3a30f1","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[122,7,39],"sf_content_type":[],"coauthors":[3],"class_list":["post-1177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-customer-story","sf_topic-data-management","sf_topic-trailblazer-story"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How To Embed Security and Trust Into Company Culture - Salesforce<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security is Every Employee&#039;s Responsibility in the Hybrid Workplace\" \/>\n<meta property=\"og:description\" content=\"Learn how to engage and empower all your employees to take ownership of data security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T19:45:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-11T04:27:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1\"}],\"headline\":\"Data Security is Every Employee&#8217;s Responsibility in the Hybrid Workplace\",\"datePublished\":\"2023-06-06T19:45:54+00:00\",\"dateModified\":\"2023-07-11T04:27:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\"},\"wordCount\":803,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg\",\"inLanguage\":\"en-SG\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\",\"name\":\"How To Embed Security and Trust Into Company Culture - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg\",\"datePublished\":\"2023-06-06T19:45:54+00:00\",\"dateModified\":\"2023-07-11T04:27:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#breadcrumb\"},\"inLanguage\":\"en-SG\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-SG\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg\",\"width\":500,\"height\":281,\"caption\":\"Data Security is Every Employee's Responsibility in the Hybrid Workplace\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/ap\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security is Every Employee&#8217;s Responsibility in the Hybrid Workplace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/ap\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-SG\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1\",\"name\":\"Salesforce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-SG\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/e6bed802dbc774e7364f59f5f076fd2a\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"Salesforce\"},\"description\":\"Salesforce is the #1 AI CRM, bringing companies and customers together in the digital age. We're immersed in the world of customer relationship management, helping businesses unlock the full potential of their data and connect with their customers in more meaningful ways. Whether it\u2019s using AI to improve service or streamlining sales processes, we're passionate about the tools and strategies that help our customers succeed in the digital age.\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/author\/salesforce\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How To Embed Security and Trust Into Company Culture - Salesforce","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/","og_type":"article","og_title":"Data Security is Every Employee's Responsibility in the Hybrid Workplace","og_description":"Learn how to engage and empower all your employees to take ownership of data security.","og_url":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/","og_site_name":"Salesforce","article_published_time":"2023-06-06T19:45:54+00:00","article_modified_time":"2023-07-11T04:27:35+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg","type":"image\/jpeg"}],"author":"Salesforce","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Salesforce","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1"}],"headline":"Data Security is Every Employee&#8217;s Responsibility in the Hybrid Workplace","datePublished":"2023-06-06T19:45:54+00:00","dateModified":"2023-07-11T04:27:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/"},"wordCount":803,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg","inLanguage":"en-SG","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/","url":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/","name":"How To Embed Security and Trust Into Company Culture - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg","datePublished":"2023-06-06T19:45:54+00:00","dateModified":"2023-07-11T04:27:35+00:00","author":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3"},"breadcrumb":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#breadcrumb"},"inLanguage":"en-SG","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/"]}]},{"@type":"ImageObject","inLanguage":"en-SG","@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#primaryimage","url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg","contentUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg","width":500,"height":281,"caption":"Data Security is Every Employee's Responsibility in the Hybrid Workplace"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/ap\/blog\/data-security-in-hybrid-workplace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/ap\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Security is Every Employee&#8217;s Responsibility in the Hybrid Workplace"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#website","url":"https:\/\/www.salesforce.com\/ap\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/ap\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-SG"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1","name":"Salesforce","image":{"@type":"ImageObject","inLanguage":"en-SG","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/e6bed802dbc774e7364f59f5f076fd2a","url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1","contentUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1","width":"150","height":"150","caption":"Salesforce"},"description":"Salesforce is the #1 AI CRM, bringing companies and customers together in the digital age. We're immersed in the world of customer relationship management, helping businesses unlock the full potential of their data and connect with their customers in more meaningful ways. Whether it\u2019s using AI to improve service or streamlining sales processes, we're passionate about the tools and strategies that help our customers succeed in the digital age.","url":"https:\/\/www.salesforce.com\/ap\/blog\/author\/salesforce\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/data-security-in-hybrid-workplace.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/ap\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/1177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/comments?post=1177"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/1177\/revisions"}],"predecessor-version":[{"id":3267,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/1177\/revisions\/3267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/media\/1176"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/media?parent=1177"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/sf_topic?post=1177"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/sf_content_type?post=1177"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/coauthors?post=1177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}