{"id":3624,"date":"2022-10-10T09:30:38","date_gmt":"2022-10-10T13:30:38","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=3624"},"modified":"2022-10-11T16:36:19","modified_gmt":"2022-10-11T20:36:19","slug":"designing-your-cmmc-compliance-program-around-your-it-infrastructure","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/","title":{"rendered":"Designing Your CMMC Compliance Program Around Your IT Infrastructure"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/10\/cyber-security-concept.jpg\" alt=\"cyber security concept\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-3626\" \/>Customized cybersecurity protocols are an essential aspect of protecting sensitive corporate and personal data. As businesses depend on technology no more than ever, the <a href=\"\/reduced-risk\/\" rel=\"noopener\" target=\"_blank\">risk of cyberattacks has also increased<\/a>. In order to mitigate these risks, businesses need to build a comprehensive cybersecurity infrastructure that is tailored to their specific needs. <\/p>\n<p>Too often, businesses try to use a &#8220;one size fits all&#8221; approach to cybersecurity, which can lead to vulnerabilities.<\/p>\n<p>Your IT infrastructure should be the foundation of your cybersecurity program. By designing your cybersecurity infrastructure around your unique IT design, you can create a more secure environment while also reducing costs and improving efficiency. <\/p>\n<p>After all, your IT infrastructure is the backbone of your organization&#8217;s cybersecurity. It&#8217;s responsible for managing and protecting your networks, systems and data. If your IT infrastructure isn&#8217;t coordinating with your cybersecurity protocol properly, it can leave your organization vulnerable to targeted attacks.<\/p>\n<p>This is why it&#8217;s very important to <a href=\"\/cybersecurity-consulting\/\" rel=\"noopener\" target=\"_blank\">base your cybersecurity infrastructure on your IT<\/a> design. When they are aligned, they can work together to provide a stronger defense against the most pressing cyber threats.<\/p>\n<p>Here are five reasons why you should base <a href=\"\/cmmc-compliance\/\" rel=\"noopener\" target=\"_blank\">your CMMC compliance program<\/a> around your IT infrastructure:<\/p>\n<h2>A Targeted Approach To Cybersecurity <\/h2>\n<h3>1. Systems-Oriented Approach<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/05\/cmmc-compliance-professional-holding-digital-lock.jpg\" alt=\"CMMC compliance professional holding digital lock\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-3377\" \/>Having a CMMC compliance program that is based on your IT infrastructure will ensure that your organization is using the same systems and processes for both cybersecurity and compliance purposes. This will minimize confusion and help ensure that all systems are operating as intended. <\/p>\n<p>In addition, this will also ensure that your cybersecurity suite is designed specifically to <a href=\"\/the-rise-of-ransomware-protect-your-network-with-cmmc\/\" rel=\"noopener\" target=\"_blank\">protect your business from unique vulnerabilities<\/a> that your IT infrastructure may expose you to. <\/p>\n<h3>2. Identify Gaps<\/h3>\n<p>You will be able to more easily identify and address any gaps between your cybersecurity and compliance programs. This will help you to quickly fix any issues and minimize the risk of data breaches.<\/p>\n<h3>3. Achieve Compliance<\/h3>\n<p>Understanding the unique vulnerabilities you face is a key step toward cultivating a cybersecurity system that achieves CMMC compliance. Having a CMMC compliance program that is based on your IT infrastructure will help you to more easily track compliance with <a href=\"\/cmmc-requirements-for-small-businesses\/\" rel=\"noopener\" target=\"_blank\">CMMC requirements<\/a>. This will make it easier to demonstrate compliance to auditors and regulators.<\/p>\n<h3>4. Mitigate Risks  <\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2020\/03\/two-employees-analyzing-a-security-risk-report.jpg\" alt=\"two employees analyzing a security risk report\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-1924\" \/>Your business will be able to more effectively manage cybersecurity risks. Properly configuring your systems and networks can make them more resilient to attack and help you quickly identify and respond to threats. <\/p>\n<p>This will help you to protect your organization\u2019s data and systems from cyberattacks by taking a proactive approach to defense and ensuring that you stay on top of all of the most relevant risks your organization faces. <\/p>\n<h3>5. Efficiently manage resources<\/h3>\n<p>A well-designed IT infrastructure can help you more efficiently manage your resources. This can include reducing costs by optimizing system performance, as well as improving staff productivity by automating tasks.<\/p>\n<h2>What is the CMMC?<\/h2>\n<p>The <a href=\"\/ultimate-guide-to-the-cmmc-2-0\/\" rel=\"noopener\" target=\"_blank\">CMMC is a cybersecurity framework<\/a> mandated by the United States Department of Defense. It is important because it provides a baseline for organizations to secure their networks and data. Organizations that comply with the CMMC can be assured that they meet a minimum level of cybersecurity protection.<\/p>\n<p>The CMMC is designed to treat different types of organizations uniquely in order to accommodate their varying needs and ensure they are aware of and implement cybersecurity protocols that take into account their unique vulnerabilities. For example, a <a href=\"\/how-cmmc-update-benefits-small-businesses\/\" rel=\"noopener\" target=\"_blank\">small business<\/a> may not need the same level of security as a large government organization. The CMMC takes into account the size and type of the organization, as well as the sensitivity of the data they are protecting.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/05\/businesswoman-in-formal-wear-signing-the-contract-to-prevent-probability-of-risks-in-cyber-security.jpg\" alt=\"businesswoman in formal wear signing the contract to prevent probability of risks in cyber security\" width=\"300\" height=\"200\" class=\"alignright size-full wp-image-3402\" \/>Different <a href=\"https:\/\/www.cleveroad.com\/blog\/what-is-it-infrastructure\/\" rel=\"noopener\" target=\"_blank\">types of IT infrastructures<\/a> are also treated uniquely in the CMMC when it comes to compliance. Unclassified information systems are at level one, classified systems are at level two and compartmented information systems are at level three. The most stringent level four and five certifications are for protected health information and nuclear weapon design information, respectively.<\/p>\n<p>There are a number of reasons why the CMMC treats different types of IT infrastructures uniquely. One reason is that <a href=\"\/how-to-determine-cmmc-level\/\" rel=\"noopener\" target=\"_blank\">different levels<\/a> of classification require different types of approaches to cybersecurity in order to effectively mitigate. Another important reason is that certain types of information are more sensitive than others and need to be protected in a more targeted and strategic manner. <\/p>\n<h2>Focusing on IT Infrastructure To Achieve Compliance<\/h2>\n<p>When it comes to complying with the <a href=\"\/cmmc-compliance-services\/\" rel=\"noopener\" target=\"_blank\">Cybersecurity Maturity Model Certification (CMMC)<\/a>, it is important to have a firm foundation in your IT infrastructure. By basing your cybersecurity strategy around your IT design, you can ensure that your compliance program is tailored to your unique needs.<\/p>\n<p>A good cybersecurity consulting team can help you build this foundation and make sure that your compliance program is effective. For more information, <a href=\"\/contact\/\" rel=\"noopener\" target=\"_blank\">contact the SeaGlass Technology team of experts<\/a> today at <a href=\"tel:+12128860790\">212-886-0790<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Customized cybersecurity protocols are an essential aspect of protecting sensitive corporate and personal data. As businesses depend on technology no more than ever, the risk of cyberattacks has also increased. In order to mitigate these risks, businesses need to build a comprehensive cybersecurity infrastructure that is tailored to their specific needs. Too often, businesses try [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":3625,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[61],"tags":[],"content_types":[63],"class_list":{"0":"post-3624","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cmmc","8":"content_types-article","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Designing Your CMMC Compliance Program Around Your IT Infrastructure - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"Mitigate risks to your cybersecurity with a comprehensive cybersecurity infrastructure that is tailored to specific needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Designing Your CMMC Compliance Program Around Your IT Infrastructure - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"Mitigate risks to your cybersecurity with a comprehensive cybersecurity infrastructure that is tailored to specific needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-10T13:30:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-11T20:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"Designing Your CMMC Compliance Program Around Your IT Infrastructure\",\"datePublished\":\"2022-10-10T13:30:38+00:00\",\"dateModified\":\"2022-10-11T20:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/\"},\"wordCount\":822,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/cybersecurity-and-privacy-concept.jpg\",\"articleSection\":[\"CMMC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/\",\"name\":\"Designing Your CMMC Compliance Program Around Your IT Infrastructure - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/cybersecurity-and-privacy-concept.jpg\",\"datePublished\":\"2022-10-10T13:30:38+00:00\",\"dateModified\":\"2022-10-11T20:36:19+00:00\",\"description\":\"Mitigate risks to your cybersecurity with a comprehensive cybersecurity infrastructure that is tailored to specific needs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/cybersecurity-and-privacy-concept.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/cybersecurity-and-privacy-concept.jpg\",\"width\":1600,\"height\":800,\"caption\":\"cybersecurity and privacy concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Designing Your CMMC Compliance Program Around Your IT Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Designing Your CMMC Compliance Program Around Your IT Infrastructure - SeaGlass Technology","description":"Mitigate risks to your cybersecurity with a comprehensive cybersecurity infrastructure that is tailored to specific needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Designing Your CMMC Compliance Program Around Your IT Infrastructure - SeaGlass Technology","og_description":"Mitigate risks to your cybersecurity with a comprehensive cybersecurity infrastructure that is tailored to specific needs.","og_url":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/","og_site_name":"SeaGlass Technology","article_published_time":"2022-10-10T13:30:38+00:00","article_modified_time":"2022-10-11T20:36:19+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"Designing Your CMMC Compliance Program Around Your IT Infrastructure","datePublished":"2022-10-10T13:30:38+00:00","dateModified":"2022-10-11T20:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/"},"wordCount":822,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","articleSection":["CMMC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/","url":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/","name":"Designing Your CMMC Compliance Program Around Your IT Infrastructure - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","datePublished":"2022-10-10T13:30:38+00:00","dateModified":"2022-10-11T20:36:19+00:00","description":"Mitigate risks to your cybersecurity with a comprehensive cybersecurity infrastructure that is tailored to specific needs.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","width":1600,"height":800,"caption":"cybersecurity and privacy concept"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/designing-your-cmmc-compliance-program-around-your-it-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"Designing Your CMMC Compliance Program Around Your IT Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/10\/cybersecurity-and-privacy-concept.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=3624"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3624\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/3625"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=3624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=3624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=3624"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=3624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}