{"id":2990,"date":"2018-02-08T09:00:29","date_gmt":"2018-02-08T17:00:29","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/industry\/blog\/uncategorized\/cybersecurity-in-healthcare-enabling-the-future\/"},"modified":"2023-05-31T16:39:49","modified_gmt":"2023-05-31T23:39:49","slug":"cybersecurity-in-healthcare-enabling-the-future","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/","title":{"rendered":"Cybersecurity in Healthcare: Enabling the Future"},"content":{"rendered":"<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"middle\"><a href=\"\/\/info.microsoft.com\/DigitalTransformationinHealth-Registration.html\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/01\/mag_icon_right_0078d7_40x39.png\" width=\"40\" height=\"39\" \/><\/a><\/td>\n<td valign=\"middle\"><a href=\"https:\/\/info.microsoft.com\/CybersecurityinHealth-Registration.html?wt.mc_id=AID619861_QSG_BLOG_172451\" target=\"_blank\" rel=\"noopener noreferrer\">Focus on: Cybersecurity in Healthcare<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>This year at HIMSS, the industry-leading event for healthcare professionals, Microsoft will bring healthcare partners from around the world to demonstrate innovative solutions currently empowering the digital transformation of the health industry. This blog post focuses on Microsoft\u2019s approach to cybersecurity in healthcare and the company\u2019s continued leadership as a trusted cloud data steward. Join Microsoft and its partners at <\/em><a href=\"https:\/\/enterprise.microsoft.com\/en-us\/ms-events\/industries\/health\/microsoft-himss-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\"><u>HIMSS18<\/u><\/a><em>.<\/em><\/p>\n<p>Last year, we explored Microsoft\u2019s approach to health security, privacy, and compliance in the cloud as we experienced an increased demand for public cloud and hybrid cloud services.\u00a0 Given Microsoft\u2019s leadership in supporting the required services coupled with the required levels of security, privacy, and compliance we posited that not all health clouds are created equal.\u00a0 Since that time, we have also experienced an increased number of threats to cybersecurity in healthcare; cyberattacks with ransomware such as Wannacry being a prime example.\u00a0 Moreover, while the health organization is transforming there is an increased demand to transmit, store, and process protected health information in the cloud.\u00a0 This demand for increased cybersecurity in healthcare is really a requirement if we are truly going to enable the future of healthcare as a data-driven industry that will improve health outcomes, improve patient and provider experiences, and lower the per capita cost of care.<\/p>\n<p>In 2018, we see an increased focus on precision medicine and overall data driven health transformation. Data coupled with artificial intelligence and machine learning will drive a number of processes and solutions that extend across both the clinical setting and operations (think supply chain and labor management).\u00a0 In the clinical setting, the future of health and life sciences\u2019 new solutions, services and research will combine data from multiple sources including genomic, environmental, and life style.\u00a0 This drive towards personalized care and precision medicine demands and requires increased computational power, data aggregation, artificial intelligence, virtual collaboration, and security, privacy, and compliance.\u00a0 While regulations such as HIPAA and HITECH in the United States will continue to govern our health industry we also must support global regulations such as the European Union\u2019s General Data Protection Regulations (GDPR) and evolving cybersecurity in healthcare regulations in China and other countries.<\/p>\n<p>It\u2019s with these requirements in mind that Microsoft continues to lead as a trusted cloud data steward.\u00a0 We continue to build our global security, privacy, and compliance portfolio and now certify and or attest to over 71 defined regulations and their associated technical, physical, and administrative control frameworks.\u00a0 This is more than any other hyper-scale cloud provider.\u00a0 In September 2017, we announced our contractual support for GDPR as part of our <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/licensing\/product-licensing\/products.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Online Services Terms<\/a>.\u00a0 We have re-tooled and re-engineered our organization and solutions to support the privacy compliance requirements that our customers will require around the world.\u00a0 As part of our GDPR readiness programs we\u2019ve also created education content, guidance and assessment tools for our customers and partners that will accelerate their journey to meet or exceed these expanded privacy requirements.\u00a0 See Microsoft\u2019s \u201c<a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/trustcenter\/privacy\/gdpr\/resources\" target=\"_blank\" rel=\"noopener noreferrer\">GDPR Readiness Resources<\/a>\u201d portal for more.\u00a0 It is critical to remember that GDPR is not just about the European Union \u2013 these regulations have the potential to affect US and other global healthcare organizations.<\/p>\n<p>And lastly, Microsoft has launched our online <a href=\"https:\/\/servicetrust.microsoft.com\/ComplianceManager\" target=\"_blank\" rel=\"noopener noreferrer\">Compliance Manager<\/a>.\u00a0 The Microsoft Compliance Manager is designed to connect security and compliance features with regulatory requirements.\u00a0 As posted in <a href=\"https:\/\/blogs.office.com\/en-us\/2017\/11\/16\/microsoft-365-helps-businesses-increase-trust-and-innovation-through-compliance-with-compliance-manager-preview\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s Office 365 blog<\/a> &#8211; \u201cCompliance Manager is a cross\u2013Microsoft Cloud services solution designed to help organizations meet complex compliance obligations like the GDPR. It performs a real-time risk assessment that reflects your compliance posture against data protection regulations when using Microsoft Cloud services, along with recommended actions and step-by-step guidance.\u201d\u00a0 It should be noted that while platforms such as Microsoft 365 and Compliance Manager can help organizations meet their deadline for GDPR compliance (May 25, 2018) they also support compliance across other regulations and guidelines. For more information please use these additional resources.<\/p>\n<p><a href=\"http:\/\/cm-edgetun.pages.dev\/en-us\/download\/details.aspx?id=55240\" target=\"_blank\" rel=\"noopener noreferrer\">Beginning your GDPR Journey e-book<\/a><\/p>\n<p><a href=\"https:\/\/info.microsoft.com\/CybersecurityinHealth-Registration.html?wt.mc_id=AID619861_QSG_BLOG_172451\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity in Healthcare e-book<\/a><\/p>\n<p><a href=\"https:\/\/servicetrust.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Service Trust Portal<\/a><\/p>\n<p><a href=\"https:\/\/servicetrust.microsoft.com\/ComplianceManager\">Microsoft Compliance Manager<\/a><\/p>\n<p>We hope the above helps you begin to check the facts as you take advantage of the cloud to help you improve care quality and efficiency, while reducing costs. To learn more, visit the <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/trustcenter\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Trust Center<\/a>. It offers detailed security, privacy, and compliance information and resources for all Microsoft cloud services.<\/p>\n<p>And if you have any questions or comments, please reach out to us via <a href=\"mailto:healthdigital@microsoft.com\" target=\"_blank\" rel=\"noopener noreferrer\">email<\/a>, <a href=\"http:\/\/www.facebook.com\/MicrosoftHealth\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, or <a href=\"http:\/\/www.twitter.com\/health_it\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog outlines how Microsoft continues to lead as a trusted cloud data steward as demand has increased for protection against the latest cyberattacks.<\/p>\n","protected":false},"author":138,"featured_media":10821,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1507],"post_tag":[],"content-type":[1483],"coauthors":[2017],"class_list":["post-2990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-healthcare","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in Healthcare: Enabling the Future - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in Healthcare: Enabling the Future - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"This blog outlines how Microsoft continues to lead as a trusted cloud data steward as demand has increased for protection against the latest cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-08T17:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T23:39:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Houlding MSc CISSP CIPP\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/david-houlding-msc-cissp-cipp\/\",\"@type\":\"Person\",\"@name\":\"David Houlding MSc CISSP CIPP\"}],\"headline\":\"Cybersecurity in Healthcare: Enabling the Future\",\"datePublished\":\"2018-02-08T17:00:29+00:00\",\"dateModified\":\"2023-05-31T23:39:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\"},\"wordCount\":742,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png\",\"articleSection\":[\"Healthcare\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\",\"name\":\"Cybersecurity in Healthcare: Enabling the Future - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png\",\"datePublished\":\"2018-02-08T17:00:29+00:00\",\"dateModified\":\"2023-05-31T23:39:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in Healthcare: Enabling the Future\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in Healthcare: Enabling the Future - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in Healthcare: Enabling the Future - Microsoft Industry Blogs","og_description":"This blog outlines how Microsoft continues to lead as a trusted cloud data steward as demand has increased for protection against the latest cyberattacks.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2018-02-08T17:00:29+00:00","article_modified_time":"2023-05-31T23:39:49+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Houlding MSc CISSP CIPP","Est. reading time":"3 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/david-houlding-msc-cissp-cipp\/","@type":"Person","@name":"David Houlding MSc CISSP CIPP"}],"headline":"Cybersecurity in Healthcare: Enabling the Future","datePublished":"2018-02-08T17:00:29+00:00","dateModified":"2023-05-31T23:39:49+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/"},"wordCount":742,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png","articleSection":["Healthcare"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/","name":"Cybersecurity in Healthcare: Enabling the Future - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png","datePublished":"2018-02-08T17:00:29+00:00","dateModified":"2023-05-31T23:39:49+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/02\/458_banner.png","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/healthcare\/2018\/02\/08\/cybersecurity-in-healthcare-enabling-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in Healthcare: Enabling the Future"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/138"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=2990"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2990\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/10821"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=2990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=2990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=2990"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=2990"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=2990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}