{"id":19622,"date":"2023-02-22T22:14:44","date_gmt":"2023-02-23T03:14:44","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=19622"},"modified":"2025-04-23T04:48:51","modified_gmt":"2025-04-23T08:48:51","slug":"how-to-secure-microsoft-365-in-2023","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/","title":{"rendered":"How to Secure Microsoft 365 in 2023"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">By a wide margin, Microsoft 365 is the world\u2019s most popular productivity software with over <\/span><span style=\"font-weight: 400;\">180 million users globally<\/span><span style=\"font-weight: 400;\">. Updating familiar applications such as Excel, Word, and PowerPoint for the cloud computing era has enabled Microsoft to once again transform the way that small and medium-sized businesses work and collaborate.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, as with any complex technology platform, deploying Microsoft 365 in your network can also present cybersecurity challenges. Based on recent announcements by Microsoft, we see a few key steps and strategies that all businesses will need to take to keep their business data secure in 2023 beyond what was necessary in 2022.\u00a0\u00a0\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">BYOD Device Security Shifts Toward Conditional Access<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many smaller businesses give employees leeway to use their personal devices for work functions. Sometimes they do so because it\u2019s more convenient for staff to just use the devices they\u2019re familiar with, while other times, the cost savings on the business side drive this decision.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These \u201cbring your own device\u201d (BYOD) arrangements also have some serious downsides, particularly with how businesses manage their Microsoft 365 data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a worst-case scenario, a business will have no visibility or control over the devices they\u2019re allowing to connect to company resources, which means that company data could be sitting on an employee\u2019s personal device unsecured, where it\u2019s highly vulnerable to hackers and exfiltration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More commonly, a business will have deployed some basic mobile device management (MDM) solution to help keep devices updated and build a rudimentary barrier between the company and personal data.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Improving Data Security with Conditional Access<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Mobile device management can help secure employee-owned phones and tablets; it\u2019s an intrusive option that requires a business install software on each of their employees\u2019 personal devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft 365 has a feature that allows businesses to keep information on BYOD devices secure without having to implement an MDM solution. It\u2019s called \u201cconditional access,\u201d and it\u2019s one of the least appreciated features in the software suite.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Conditional access is a set of controls within Microsoft Azure Active Directory that protects sensitive content by requiring users to meet a set of criteria before they\u2019re granted access to it. The flexible conditional access system allows you to create and automate granular security rules that govern users, devices, and their locations without needing a 3<\/span><span style=\"font-weight: 400;\">rd<\/span><span style=\"font-weight: 400;\"> party solution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the ways that using conditional access helps secure your mobile data:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrate authentication factors like passwords, facial recognition, and voice recognition into your overall security plan.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforce security standards to deny unverified user access to your sensitive information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate monitoring and security rule adjustments after the system notices an irregularity, such as an unrecognized location.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Safeguard your network against security credentials like username and password being stolen.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduce risk and improve compliance by allowing your staff to audit applications while reducing the need for third-party solutions.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To implement conditional access, you should start by auditing your technology to locate valuable data assets in your organization\u2019s systems. Next, clarify which protections are appropriate for each of the systems in your network, and document those controls so they can be adjusted as your systems evolve.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Prepare Your Business for \u201cModern Authentication.\u201d<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A critical change that Microsoft 365 users will face in 2023 is the removal of basic authentication for commonly used services, such as POP, IMAP, and PowerShell.\u00a0 Going forward, all systems will need to be transitioned to what Microsoft is calling \u201cmodern authentication,\u201d which verifies each user\u2019s identity according to stricter rules than in the past.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reason is that the older basic authentication sends a user\u2019s unencrypted name and password with every access request in plain text, leaving this important information exposed to interception and theft.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the number of password-based attacks soaring to one <\/span><span style=\"font-weight: 400;\">every 921 seconds<\/span><span style=\"font-weight: 400;\">, basic authentication is not loner enough for today\u2019s digital business. Skilled hackers can even bypass multi-factor authentication (MFA) systems, undermining one of the most important security controls in the SMB cybersecurity toolkit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft announced that 2023 basic authentication would be removed for all protocols starting in January 2023, meaning that all businesses should have a plan for dealing with this new reality.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Proactively Approaching Modern Authentication\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">To ensure your network remains stable during the upgrade, you can use Microsoft 365 sign-in logs to determine what services\/users are using these legacy methods and migrate them to supported methods.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We recommend that companies coordinate with their <\/span><span style=\"font-weight: 400;\">IT support firm<\/span><span style=\"font-weight: 400;\"> to determine which APIs are dependent on M365 and how best to upgrade those services to modern authentication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You should also have your IT team contact your technology vendors and determine which of their services or APIs support modern authentication and which of them don\u2019t. Once this thorough audit of your applications and services is finished, you can proactively either upgrade or replace whichever ones don\u2019t meet the new modern authentication standards.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Prepare for the Possibility of Network Instability<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Businesses should be aware that migrating away from basic authentication could have a negative impact on their networks. For example, companies using Exchange ActiSync (EAS) to connect their company email to mobile phones will likely experience problems with modern authentication. Similarly, the scan-to-email functions that printers have may also be affected.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By a wide margin, Microsoft 365 is the world\u2019s most popular productivity software with over 180 million users globally. Updating<\/p>\n","protected":false},"author":398,"featured_media":19623,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-19622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Secure Microsoft 365 in 2023 - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure Microsoft 365 in 2023 - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"By a wide margin, Microsoft 365 is the world\u2019s most popular productivity software with over 180 million users globally. Updating\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-23T03:14:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T08:48:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/concept-computer-keyboard-with-red-key-that-says-2022-11-14-04-16-43-utc-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"How to Secure Microsoft 365 in 2023\",\"datePublished\":\"2023-02-23T03:14:44+00:00\",\"dateModified\":\"2025-04-23T08:48:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\"},\"wordCount\":868,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\",\"name\":\"How to Secure Microsoft 365 in 2023 - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2023-02-23T03:14:44+00:00\",\"dateModified\":\"2025-04-23T08:48:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How to Secure Microsoft 365 in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Secure Microsoft 365 in 2023 - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/","og_locale":"en_US","og_type":"article","og_title":"How to Secure Microsoft 365 in 2023 - Digital Transformation of Government Services","og_description":"By a wide margin, Microsoft 365 is the world\u2019s most popular productivity software with over 180 million users globally. Updating","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2023-02-23T03:14:44+00:00","article_modified_time":"2025-04-23T08:48:51+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/concept-computer-keyboard-with-red-key-that-says-2022-11-14-04-16-43-utc-1024x683.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"How to Secure Microsoft 365 in 2023","datePublished":"2023-02-23T03:14:44+00:00","dateModified":"2025-04-23T08:48:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/"},"wordCount":868,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/","name":"How to Secure Microsoft 365 in 2023 - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2023-02-23T03:14:44+00:00","dateModified":"2025-04-23T08:48:51+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/how-to-secure-microsoft-365-in-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How to Secure Microsoft 365 in 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19622"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=19622"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19622\/revisions"}],"predecessor-version":[{"id":21742,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19622\/revisions\/21742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/19623"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=19622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=19622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=19622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}