{"id":8704,"date":"2018-05-08T07:44:28","date_gmt":"2018-05-08T11:44:28","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=8704"},"modified":"2022-06-21T04:27:35","modified_gmt":"2022-06-21T08:27:35","slug":"next-level-security-should-you-be-using-biometric-technology","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/","title":{"rendered":"Next Level Security: Should You Be Using Biometric Technology"},"content":{"rendered":"<p><strong><em>The following guest post on next level security: should you be using biometric technology was submitted by Nika Goggard<\/em><\/strong><\/p>\n<p>In a world such as ours where digital technology is incredibly dominant, safeguarding confidential information is not only desirable but necessary. Unfortunately, ensuring a strong and reliable security network in any organization is not without its challenges.<\/p>\n<p>For a long time, passwords have been used to protect data from hackers and other third parties. Although they are still relevant today, a lot of loopholes in the system has made it quite inadequate to meet the growing security requirements of the digital world. This need is what has given rise to ironclad security systems like the biometric technology.<\/p>\n<p>In recent years, biometric technology has become one of the most reliable and attractive security solutions used by organizations. It does not only offer a more rigid security but also easily overcomes the timekeeping challenge frequently experienced by various establishments with password authentication.<\/p>\n<div class=\"caseWrapper\">\n<h6 style=\"text-align: center; font-size: 18px; padding-bottom: 0; font-weight: 600; background: #f2f2f2; padding: 5px 0;\">Free Case Study<\/h6>\n<div class=\"caseLogo\"><a href=\"https:\/\/blog.m2sys.com\/case-study-finger-vein-biometrics-for-accurate-time-and-attendance\/?utm_source=blog&amp;utm_medium=case%20study&amp;utm_campaign=vein%20biometrics\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/08\/shannon-power-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><\/div>\n<div class=\"caseInfo\">\n<h3>Finger Vein Biometrics for Accurate Time and Attendance<\/h3>\n<p><a class=\"caseLink\" href=\"https:\/\/blog.m2sys.com\/case-study-finger-vein-biometrics-for-accurate-time-and-attendance\/?utm_source=blog&amp;utm_medium=case%20study&amp;utm_campaign=vein%20biometrics\">Download<\/a><\/p>\n<\/div>\n<\/div>\n<p>Biometric security is usually accomplished with devices that capture and record several human traits such as voice and <a href=\"https:\/\/www.m2sys.com\/easyscan-pro-fingerprint-device\/?utm_source=Blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=M2-EasyScan%20Pro\">fingerprints<\/a> for use in subsequent personal identification. In other words, users must be authenticated through anyone of traits above before they can be granted access to electronic assets. This method is more reliable because the information it stores for each user is unique and so identification and access is complicated enough to prevent <a href=\"https:\/\/sizzling-hot-play.com\/\">the<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Third-party_access\"> third party access<\/a>.<\/p>\n<p>Although not as popular like other tech trends like cloud computing, biometric authentication is fast becoming the most preferred security measure in work environments to control access to offices and structures. And while it is more effective and faster, it is not without its critics.<\/p>\n<p>Several employees have expressed privacy concerns in using the technology while others completely objects to it to their religious beliefs. As a result the major problem of biometric technology has been that of implementation in various organizations.<\/p>\n<p>However, even with these milestones, biometric has been reckoned as the future of electronic security and there are many reasons you should be using it in your organizations.<\/p>\n<p><strong>A timely intervention for an ever changing IoT Landscape<\/strong><\/p>\n<p>As the IoT landscape gets more complex, addressing security challenges also become sophisticated. Considering recent events, it&#8217;s obvious passwords and physical tokens are no longer sufficient to stop hackers and other unauthorized access to user information.<\/p>\n<p>However with biometric, access is difficult (if not impossible) even for sophisticated hackers. And access to devices is less clumsy compared to when using traditional passwords.<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web API For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\"><\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/Finger-Vein\/Iris Recognition.<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Next+Level+Security:+Should+You+Be+Using+Biometric+Technology&amp;utm_medium=CloudABIS&amp;utm_campaign=blog+displayAds\">Learn More <\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p><strong>Greater Efficiency<\/strong><\/p>\n<p>No matter how strong a password is, it can be replicated. However, for biometrics, this is not possible since authentication is based on the physical traits of an individual which is unique. In other words, biometric technology is a more effective security solution than the use of passwords.<\/p>\n<p>And it&#8217;s not only large organization that are benefiting from it, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Biometric_device\">on-device biometrics<\/a> is also available to mobile users.<\/p>\n<p><strong>An End to Buddy Punching<\/strong><\/p>\n<p><a href=\"https:\/\/blog.m2sys.com\/workforce-management\/ems-fire-departments-reduce-buddy-punching-with-biometric-finger-scanners\/?utm_source=blog&amp;utm_medium=guest%20blog%20post&amp;utm_campaign=emschedule%20wfm\">Buddy punching<\/a> is a common abuse in many organizations; a situation where one employee clocks in for another worker even when the worker hasn&#8217;t really started doing any work. Sometimes the worker may not even be around.<\/p>\n<p>With biometric security, such thing cannot happen since access to computer systems are personal and unique. Also, once an employee clocks off, it is possible to automatically prevent further access.<\/p>\n<p>This easily solves the wage problem where an employee may claim to have worked for more hours than he actually did.<\/p>\n<p>Additionally, biometric screening of workers for health programs has been discovered to be more effective and less expensive.<\/p>\n<p><strong>Now your turn<\/strong><\/p>\n<p>We could go on and on highlighting the benefits of biometric tech. While implementation may not be easy due to employee complaints and objections, it is clear that when executed it can provide a lasting solution to the security challenges in your workplace.<\/p>\n<p>Biometrics is already taking over the world; don&#8217;t get left behind!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following guest post on next level security: should you be using biometric technology was submitted by Nika Goggard In<\/p>\n","protected":false},"author":398,"featured_media":16463,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"Next Level Security: Should You Be Using Biometric Technology","_yoast_wpseo_metadesc":"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[516,29,14],"class_list":["post-8704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-biometric-security","tag-biometric-technology","tag-buddy-punching"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Next Level Security: Should You Be Using Biometric Technology<\/title>\n<meta name=\"description\" content=\"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Next Level Security: Should You Be Using Biometric Technology\" \/>\n<meta property=\"og:description\" content=\"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-08T11:44:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T08:27:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/05\/next-level-security-should-you-be-using-biometric-technology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\"},\"headline\":\"Next Level Security: Should You Be Using Biometric Technology\",\"datePublished\":\"2018-05-08T11:44:28+00:00\",\"dateModified\":\"2022-06-21T08:27:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\"},\"wordCount\":744,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric security\",\"biometric technology\",\"buddy punching\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\",\"name\":\"Next Level Security: Should You Be Using Biometric Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2018-05-08T11:44:28+00:00\",\"dateModified\":\"2022-06-21T08:27:35+00:00\",\"description\":\"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Next Level Security: Should You Be Using Biometric Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Next Level Security: Should You Be Using Biometric Technology","description":"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/","og_locale":"en_US","og_type":"article","og_title":"Next Level Security: Should You Be Using Biometric Technology","og_description":"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2018-05-08T11:44:28+00:00","article_modified_time":"2022-06-21T08:27:35+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/05\/next-level-security-should-you-be-using-biometric-technology.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c"},"headline":"Next Level Security: Should You Be Using Biometric Technology","datePublished":"2018-05-08T11:44:28+00:00","dateModified":"2022-06-21T08:27:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/"},"wordCount":744,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric security","biometric technology","buddy punching"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/","name":"Next Level Security: Should You Be Using Biometric Technology","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2018-05-08T11:44:28+00:00","dateModified":"2022-06-21T08:27:35+00:00","description":"Recently biometric technology becomes one of the most reliable and attractive security solutions used by government programs, healthcare organizations, educational institutes, and many more.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/next-level-security-should-you-be-using-biometric-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Next Level Security: Should You Be Using Biometric Technology"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Adam Willsey","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8704"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=8704"}],"version-history":[{"count":11,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8704\/revisions"}],"predecessor-version":[{"id":16464,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8704\/revisions\/16464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16463"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=8704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=8704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=8704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}