{"id":3208,"date":"2021-12-20T09:30:49","date_gmt":"2021-12-20T14:30:49","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=3208"},"modified":"2022-10-24T15:50:18","modified_gmt":"2022-10-24T19:50:18","slug":"the-5-levels-of-cmmc-explained","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/","title":{"rendered":"The 5 Levels Of CMMC Explained"},"content":{"rendered":"<p>Defense contractors that work with the U.S. Department of Defense (DoD) will soon be required to meet CMMC requirements to bid on contracts.<br \/>\nThe <a href=\"\/cmmc-compliance\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Maturity Model Certification (CMMC)<\/a> refers to a unified framework that enforces cybersecurity standards within the defense industrial base (DIB). There are currently more than 300,000 contractors within the supply chain that have access to confidential defense information in their information systems.<br \/>\nThe CMMC was developed by the DoD in response to increasing cybersecurity concerns. Five certification levels make up the CMMC and reflect the reliability and maturity of a company\u2019s cybersecurity infrastructure and ability to safeguard sensitive government information.<br \/>\n<img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-3211\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/a-federal-employee-woring-in-a-cyber-security-office-.jpg\" alt=\"a federal employee woring in a cyber security office \" width=\"300\" height=\"200\" \/><\/p>\n<h2>What Are The 5 CMMC Levels?<\/h2>\n<p>The CMMC model consists of five defined levels, each with its own set of supporting processes and practices. The practices range from basic cyber hygiene (Level 1) to advanced\/progressive (Level 5). Processes are optimized across the organization from Level 1 to Level 5 and built upon one another, meaning a <a href=\"\/what-cmmc-level-does-my-organization-need\/\" target=\"_blank\" rel=\"noopener\">company must meet the processes within the target level<\/a>, as well as practices and processes below that level.<br \/>\nHere is a more detailed look at each of the five levels of CMMC:<\/p>\n<h3>Level 1<\/h3>\n<p>Level 1 of CMMC is known as <a href=\"\/cmmc-compliance-services\/level-1\/\" target=\"_blank\" rel=\"noopener\">\u201cBasic Cybersecurity Hygiene\u201d<\/a> and is the lowest level of security controls that government contractors must meet to earn CMMC. Defense contractors must have basic security controls in place to qualify for this maturity level. The main goal of Level 1 is to safeguard federal contract information (FCI).<br \/>\nCMMC Level 1 is the foundation upon which all other levels are built. When contractors have basic security controls in place, they have the capability to protect FCI, meaning they are eligible for certain government contracts. Level 1 consists of 17 practices.<\/p>\n<h3>Level 2<\/h3>\n<p>Level 2, or <a href=\"\/cmmc-compliance-services\/level-2\/\" target=\"_blank\" rel=\"noopener\">\u201cIntermediate Cyber Hygiene,\u201d<\/a> is considered a transitional phase between Level 1\u2019s basic security measures and Level 3\u2019s sound protection of controlled unclassified information (CUI). Defense contractors that reach this level have documented their processes and shown that users can repeat these processes.<br \/>\nTo reach Level 2 compliance, contractors must show that they have a total of 72 specific security practices and 34 processes in place. As Level 2 is a transitional stage, a subset of the CMMC practices refers to the protection of CUI as specified by NIST SP 800-171.<br \/>\n<img decoding=\"async\" class=\"alignright size-full wp-image-3212\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/women-unable-to-login-due-to-not-having-the-proper-security-level.jpg\" alt=\"women unable to login due to not having the proper security level\" width=\"300\" height=\"200\" \/><\/p>\n<h3>Level 3<\/h3>\n<p><a href=\"\/cmmc-compliance-services\/level-3\/\" target=\"_blank\" rel=\"noopener\">Level 3 of CMMC<\/a> requires defense contractors to establish, resource, and maintain a plan for managing activities required to implement cybersecurity practices. The plan may include details regarding a variety of topics, such as projects, missions, training, resourcing, and the involvement of stakeholders.<br \/>\nAlso called \u201cGood Cyber Hygiene,\u201d Level 3 builds upon the security requirements in Levels 1 and 2 and means that the company has 130 cybersecurity practices and 51 processes in place. Practices include those outlined in Federal Acquisition Regulation (FAR), all practices in NIST SP 800-171, as well as 20 additional practices required for maintaining good cyber hygiene.<\/p>\n<h3>Level 4<\/h3>\n<p>CMMC Level 4 is the \u201cProactive\u201d stage for government contractors that have demonstrated that they have properly established cybersecurity best practices. To reach this level, companies must show that they have 156 practices in place, in addition to the practices required for Level 3 and a subset of 11 practices from NIST SP 800-171B.<br \/>\nLevel 4 requires defense contractors to periodically review the effectiveness of their security practices. Companies must also take corrective action when necessary and inform management of their security status on a regular basis. Practices under Level 4 focus heavily on detection and response to security threats.<br \/>\n<img decoding=\"async\" class=\"alignright size-full wp-image-3213\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/two-federal-employees-learning-the-cmmc-security-process.jpg\" alt=\"two federal employees learning the cmmc security process\" width=\"300\" height=\"200\" \/><\/p>\n<h3>Level 5<\/h3>\n<p><a href=\"\/cmmc-compliance-services\/level-5\/\" target=\"_blank\" rel=\"noopener\">Level 5 is the \u201cAdvanced\/Progressive\u201d<\/a> stage and the highest level of CMMC. This advanced level requires government contractors to meet 171 practices, including practices from FAR, NIST SP 800-171 r1, and a specific subset of four practices from NIST SP 800-171B. An additional 11 practices help demonstrate that the business has established an advanced cybersecurity program.<br \/>\nPractices at Level 5 focus on the protection of CUI from advanced persistent threats (APTs), thus increasing the depth and sophistication of the company\u2019s cybersecurity capabilities. CMMC Level 5 organizations are expected to standardize process implementation across the organization to meet process maturity.<\/p>\n<p>Defense contractors are responsible for improving the cybersecurity posture of the DIB and protecting <a href=\"https:\/\/www.cybernc.us\/fci-cui\/#:~:text=Federal%20Contract%20Information%20(FCI)%20and,deliver%20a%20product%20or%20service.\" target=\"_blank\" rel=\"noopener\">FCI and CUI<\/a>. The CMMC has been created to ensure that DoD contractors have the appropriate cybersecurity practices and processes in place. The program has already begun to roll out; therefore, all defense contractors should begin to familiarize themselves with the CMMC as soon as possible.<\/p>\n<h2>Schedule A Consultation With SeaGlass<\/h2>\n<p>The CMMC framework can be complex and meeting any of the five cybersecurity maturity models requires an extensive understanding of its practices and processes. To learn more about the five levels of CMMC or to speak with an expert NYC IT service provider, <a href=\"\/contact\/\" target=\"_blank\" rel=\"noopener\">contact SeaGlass Technology<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defense contractors that work with the U.S. Department of Defense (DoD) will soon be required to meet CMMC requirements to bid on contracts. The Cybersecurity Maturity Model Certification (CMMC) refers to a unified framework that enforces cybersecurity standards within the defense industrial base (DIB). There are currently more than 300,000 contractors within the supply chain [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":3210,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"content_types":[63],"class_list":{"0":"post-3208","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-managed-it-services","8":"content_types-article","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 5 Levels Of CMMC Explained - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"Cybersecurity Maturity Model Certification will soon be a requirement with government contractors. Learn what the 5 levels of CMMC are.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 5 Levels Of CMMC Explained - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity Maturity Model Certification will soon be a requirement with government contractors. Learn what the 5 levels of CMMC are.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-20T14:30:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-24T19:50:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"The 5 Levels Of CMMC Explained\",\"datePublished\":\"2021-12-20T14:30:49+00:00\",\"dateModified\":\"2022-10-24T19:50:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/\"},\"wordCount\":775,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/a-graphic-demonstrating-the-cyber-security-concept.jpg\",\"articleSection\":[\"Managed IT Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/\",\"name\":\"The 5 Levels Of CMMC Explained - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/a-graphic-demonstrating-the-cyber-security-concept.jpg\",\"datePublished\":\"2021-12-20T14:30:49+00:00\",\"dateModified\":\"2022-10-24T19:50:18+00:00\",\"description\":\"Cybersecurity Maturity Model Certification will soon be a requirement with government contractors. Learn what the 5 levels of CMMC are.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/a-graphic-demonstrating-the-cyber-security-concept.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/a-graphic-demonstrating-the-cyber-security-concept.jpg\",\"width\":1600,\"height\":800,\"caption\":\"a graphic demonstrating the cyber security concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/the-5-levels-of-cmmc-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 5 Levels Of CMMC Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 5 Levels Of CMMC Explained - SeaGlass Technology","description":"Cybersecurity Maturity Model Certification will soon be a requirement with government contractors. Learn what the 5 levels of CMMC are.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/","og_locale":"en_US","og_type":"article","og_title":"The 5 Levels Of CMMC Explained - SeaGlass Technology","og_description":"Cybersecurity Maturity Model Certification will soon be a requirement with government contractors. Learn what the 5 levels of CMMC are.","og_url":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/","og_site_name":"SeaGlass Technology","article_published_time":"2021-12-20T14:30:49+00:00","article_modified_time":"2022-10-24T19:50:18+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"The 5 Levels Of CMMC Explained","datePublished":"2021-12-20T14:30:49+00:00","dateModified":"2022-10-24T19:50:18+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/"},"wordCount":775,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","articleSection":["Managed IT Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/","url":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/","name":"The 5 Levels Of CMMC Explained - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","datePublished":"2021-12-20T14:30:49+00:00","dateModified":"2022-10-24T19:50:18+00:00","description":"Cybersecurity Maturity Model Certification will soon be a requirement with government contractors. Learn what the 5 levels of CMMC are.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","width":1600,"height":800,"caption":"a graphic demonstrating the cyber security concept"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/the-5-levels-of-cmmc-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"The 5 Levels Of CMMC Explained"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/a-graphic-demonstrating-the-cyber-security-concept.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=3208"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3208\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/3210"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=3208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=3208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=3208"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=3208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}