{"id":13445,"date":"2020-08-06T11:25:53","date_gmt":"2020-08-06T15:25:53","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13445"},"modified":"2021-07-16T04:43:52","modified_gmt":"2021-07-16T08:43:52","slug":"managing-the-risks-of-the-new-remote-workforce","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/","title":{"rendered":"Managing the Risks of the New Remote Workforce"},"content":{"rendered":"<p>In the aftermath of the recent COVID-19 outbreak, millions of workers are staying home and continuing to test the remote work infrastructure of businesses around the globe. Although this new way of working provides attractive benefits like flexible work hours and better work-life balance for employees, remote work, even under the best of situations, can present its own set of security challenges.<\/p>\n<p>During the current COVID-19 crisis, working from home is quickly becoming a business necessity and no longer just a temporary fix for productivity loss. During the pre-COVID period, only 5% of information workers primarily work from home, but since March 2020, 47% of respondents to a <a href=\"https:\/\/go.forrester.com\/blogs\/the-5-billion-funding-frenzy-theres-never-been-a-better-time-to-rethink-your-hcm-investments\/\">Forrester survey<\/a> say their organization has moved at least half of their workforce to remote work.<\/p>\n<p style=\"text-align: center\"><style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/cloudapper.com\/wp-content\/uploads\/2020\/05\/CloudDesk_BlogDisplayAd-1.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudDesk\u00ae<\/span><\/h2>\r\n\t\t\t<h3>Employee Monitoring Software<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Feature<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p> - Time Tracking <\/p>\r\n\t\t\t\t<p>- Face ID Verification<\/p>\r\n\t\t\t\t<p>- PC &amp; Web Activity Monitoring<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/web.cloudapper.com\/login?templaterefid=5f9a52bd-5427-4c43-b5b7-b193db20b70b&amp;issignup=true\">Try Free Trial Now<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div><\/p>\n<p>It is too early to predict whether this trend is confined to the current crisis or whether the pandemic will aid in a future with more acceptability for remote work. But whichever is the case, as teams are getting decentralized, there will be more risks&nbsp;of the new remote workforce both in terms of information technology and human resources.<\/p>\n<h2><strong>Key measures to minimize the risks of the new remote workforce:<\/strong><\/h2>\n<p><strong>Eliminate internal threats with web and app usage monitoring.<\/strong> When it comes to eliminating security threats, you need to start inside your organization. And it&#8217;s not always malicious actors; employees can also unwillingly put systems at risk through sheer ignorance. Simple mistakes such as clicking rigged links in emails, messaging apps, and advertisements invite hackers to surveil companies and organizations with massive consequences. So, <a href=\"https:\/\/www.m2sys.com\/clouddesk-remote-employee-monitoring-software\/?utm_campaign=Managing%20the%20Risks%20of%20the%20New%20Remote%20Workforce&amp;utm_medium=blog%20post&amp;utm_source=blog\">monitoring your employee&#8217;s app and web usage<\/a> can give you an opportunity to warn or educate them about any safety concerns.<\/p>\n<p><iframe loading=\"lazy\" title=\"CloudDesk - Remote Employee Monitoring &amp; Analytics Software\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/sen4_C1t2uE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><strong>Promoting app-centric security<\/strong>. While working from home, many employees have been forced to use their personal device. To protect company assets that are being accessed from these personal devices, invest in app-based solutions such as app virtualization, app containers, and app security. These can help security professionals to minimize device-centric security risks.<\/p>\n<p><strong>Setup automatic threat detection system<\/strong>. An ever-increasing remote workforce has created new burdens for security professionals. Automated security tools such as threat prevention, detection, response, and data encryption help take some of those burdens off the admins, allowing them to focus their energy on adapting to new security challenges caused by <a href=\"https:\/\/www.techcrackblog.com\/2020\/07\/remote-threat-of-covid-for-businesses.html\">remote work<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13447 aligncenter\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/08\/key-measures-to-minimize-risk-with-remote-workforce.jpg\" alt=\"key-measures-to-minimize-risk-with-remote-workforce\" width=\"750\" height=\"409\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/08\/key-measures-to-minimize-risk-with-remote-workforce.jpg 750w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/08\/key-measures-to-minimize-risk-with-remote-workforce-600x327.jpg 600w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p><strong>Employing unified endpoint management (UEM) platforms<\/strong>. UEM platforms can simplify the process of releasing new security updates and patching assets across various operating systems. Invaluable for a remote workforce, these tools also allow the security team to manage native security capabilities, gain greater visibility across devices, and enforce encryption standards across OSes.<\/p>\n<p><strong>Keeping employees engaged for higher productivity. <\/strong>Remote employees stay at their desks for hours without going outside. This may not only damage their health but also make them feel alone and isolated. Try the <a href=\"https:\/\/www.mycirclecare.com\/corporate-wellness-app\/?utm_campaign=Managing%20the%20Risks%20of%20the%20New%20Remote%20Workforce&amp;utm_medium=blog%20post&amp;utm_source=m2sys%20blog\">CircleCare employee engagement app<\/a> to help them solve these issues. It encourages employees and helps them to achieve health goals. With this app, you can keep employees motivated and keep them engaged to work. Try this app to increase the productivity of your remote teams.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the aftermath of the recent COVID-19 outbreak, millions of workers are staying home and continuing to test the remote<\/p>\n","protected":false},"author":383,"featured_media":15370,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[67],"tags":[],"class_list":["post-13445","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-hardware"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managing the Risks of the New Remote Workforce - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing the Risks of the New Remote Workforce - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"In the aftermath of the recent COVID-19 outbreak, millions of workers are staying home and continuing to test the remote\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-06T15:25:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-16T08:43:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/08\/managing-the-risk-of-the-new-remote-workforce-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\"},\"headline\":\"Managing the Risks of the New Remote Workforce\",\"datePublished\":\"2020-08-06T15:25:53+00:00\",\"dateModified\":\"2021-07-16T08:43:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\"},\"wordCount\":591,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Hardware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\",\"name\":\"Managing the Risks of the New Remote Workforce - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-08-06T15:25:53+00:00\",\"dateModified\":\"2021-07-16T08:43:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Managing the Risks of the New Remote Workforce\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing the Risks of the New Remote Workforce - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/","og_locale":"en_US","og_type":"article","og_title":"Managing the Risks of the New Remote Workforce - Digital Transformation of Government Services","og_description":"In the aftermath of the recent COVID-19 outbreak, millions of workers are staying home and continuing to test the remote","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-08-06T15:25:53+00:00","article_modified_time":"2021-07-16T08:43:52+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/08\/managing-the-risk-of-the-new-remote-workforce-1.jpg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792"},"headline":"Managing the Risks of the New Remote Workforce","datePublished":"2020-08-06T15:25:53+00:00","dateModified":"2021-07-16T08:43:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/"},"wordCount":591,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Hardware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/","name":"Managing the Risks of the New Remote Workforce - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-08-06T15:25:53+00:00","dateModified":"2021-07-16T08:43:52+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/managing-the-risks-of-the-new-remote-workforce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Managing the Risks of the New Remote Workforce"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4ee8a06d75140a7a10ac2b0f02c5e792","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Robert Brown","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13445"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13445"}],"version-history":[{"count":7,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13445\/revisions"}],"predecessor-version":[{"id":15371,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13445\/revisions\/15371"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15370"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}