{"id":68734,"date":"2023-07-27T10:14:52","date_gmt":"2023-07-27T17:14:52","guid":{"rendered":""},"modified":"2023-07-27T10:14:53","modified_gmt":"2023-07-27T17:14:53","slug":"how-cybersecurity-is-evolving-to-protect-essential-services","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/","title":{"rendered":"How cybersecurity is evolving to protect essential services"},"content":{"rendered":"\n<p>There is no doubt that the cybersecurity systems of 2050 will be far more sophisticated than the solutions in use today. In an era when cyber threats continue to evolve, it\u2019s difficult to imagine what new innovations will arise in the next decades.&nbsp;<\/p>\n\n\n\n<p>Yet, while the year 2050 might seem like a long way off, the time to create the security systems of the future is now. In recent years, <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/blog\/?p=119453&amp;culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware attacks have risen by 92 percent<\/a> and <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/04\/19\/cybersecurity-skills-initiative-expansion-nonprofits\/\" target=\"_blank\" rel=\"noreferrer noopener\">password attacks have jumped by 74 percent<\/a>. The good news is that public-sector and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/11\/prioritizing-cybersecurity-to-better-serve-customers\/\" target=\"_blank\" rel=\"noreferrer noopener\">commercial organizations are already finding ways to prevent attacks before they happen<\/a>.<\/p>\n\n\n\n<p>In my role, I have the opportunity to meet with healthcare and public-sector organizations across the United States. Security is always top of mind for these organizations because they recognize that the need to develop advanced protections is more urgent than ever.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber resilience matters for both private and public sectors&nbsp;<\/h2>\n\n\n\n<p>As they embrace digital transformation, state and local governments are facing a slew of new cyber threats. As a former mayor of Hamilton, New Jersey, Glen Gilmore has a unique perspective on cybersecurity. \u201cLocal government services and facilities are largely \u2018essential,\u2019 meaning that they cannot be disrupted for long before there is a serious negative impact on public safety, health, and quality of life,\u201d <a href=\"https:\/\/www.linkedin.com\/pulse\/smart-cities-lead-cybersecurity-glen-d-gilmore\/?trackingId=GbaLRlYxSTK%2BLu6n4oYkCg%3D%3D\" target=\"_blank\" rel=\"noreferrer noopener\">says Gilmore in a recent article<\/a>.&nbsp;<\/p>\n\n\n\n<p>Many local governments are targeting a <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/government\/resources\/smart-cities\" target=\"_blank\" rel=\"noreferrer noopener\">\u201csmart city\u201d model<\/a> to enhance the accessibility of public resources. This move to use more digital technology is streamlining service delivery to help residents, but it also potentially creates new vulnerabilities to cyberattacks. This adds urgency to the need for cyber&nbsp;innovation.&nbsp;<\/p>\n\n\n\n<p>Gilmore emphasizes that cities must prioritize cyber resilience as they shift to digital operations. Policies like <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/business\/zero-trust#:~:text=Microsoft%20has%20adopted%20a%20Zero%20Trust%20strategy%20to,health%2C%20and%20least-privilege%20access%20to%20resources%20and%20services.\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a>, constant monitoring, and explicit user and device verification can be valuable in protecting essential services. However, it\u2019s important that organizations have a security system that is both comprehensive and easy to use. By preventing attacks before they happen, smaller municipalities can reduce their reliance on outside help. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting healthcare information while improving provider&nbsp;collaboration&nbsp;<\/h2>\n\n\n\n<p>When it comes to essential services, healthcare is front and center. Current trends set the sector on pace to spend more than <a href=\"https:\/\/www.thebusinessresearchcompany.com\/report\/healthcare-cyber-security-global-market-report\" target=\"_blank\" rel=\"noreferrer noopener\">$30 billion on cybersecurity by 2027<\/a>. That investment isn\u2019t optional\u2014it\u2019s necessary to protect patient healthcare information. As John Nosta, Founder of the NOSTALAB digital health think tank, writes, \u201cFrom stolen healthcare data that can be used to commit identity theft or fraud to the incapacitation of an entire network, the risks are functionally critical.\u201d&nbsp;<\/p>\n\n\n\n<p>Yet those risks accompany important progress. Providers need to be able to share information with other healthcare professionals, as well as with patients and payors, in an instant. Digitalization helps to accelerate care delivery and save lives, but it also requires heightened vigilance and strong security against&nbsp;vulnerabilities.&nbsp;<\/p>\n\n\n\n<p>To ensure the security of vital healthcare systems, prevention is the best medicine. The goal isn\u2019t to respond effectively once a massive attack happens. Instead, it\u2019s to stop the attack before it penetrates to the level of patient data. AI tools can help organizations detect and repel attacks without a significant increase in employee effort, helping to avoid burnout and keep teams ready for&nbsp;action.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Teaching vigilance in a hyper-digital world&nbsp;<\/h2>\n\n\n\n<p>As education institutions embrace remote and hybrid learning, they are striving to protect personal information while giving students access to important instructional resources. Carl Hooker, a former educator and educational technology leader, emphasizes the role that cultural change can play in aiding this transformation. \u201cOngoing education is the key to staying up to date on best practices and raising awareness around what current threats exist,\u201d says Hooker.&nbsp;<\/p>\n\n\n\n<p>It is not just administrators and teachers who need to be aware of cyber threats\u2014it\u2019s students too. Everyone must be engaged in the mission to prevent accidental internal breaches because education institutions are a primary target for actors trying to gain access to funds or student&nbsp;information.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Innovating the cybersecurity solutions of the future&nbsp;<\/h2>\n\n\n\n<p>The cybersecurity solutions of the future won\u2019t just be technological. They will be cultural, too. Organizations that want to stay ahead of the curve are already developing and teaching the mindsets that promote privacy and security. It will take a combination of a security-focused culture and the right technology to keep essential services secure.&nbsp;<\/p>\n\n\n\n<p>To start your security conversation, reach out to the team: <a href=\"https:\/\/info.microsoft.com\/ww-landing-security-generic-contact-me.html?culture=en-us&amp;country=US\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Contact Me<\/a>.&nbsp;<\/p>\n\n\n\n<p>To learn more about Microsoft security solutions, go here: <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud security services | Microsoft Security<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is no doubt that the cybersecurity systems of 2050 will be far more sophisticated than the solutions in use today. In an era when cyber threats continue to evolve, it\u2019s difficult to imagine what new innovations will arise in the next decades.<\/p>\n","protected":false},"author":771,"featured_media":68735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1542],"post_tag":[1662,75],"content-type":[1079],"coauthors":[1352],"class_list":["post-68734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-ai","tag-cybersecurity","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How cybersecurity is evolving to protect essential services - Microsoft in Business Blogs<\/title>\n<meta name=\"description\" content=\"Learn about the ways that essential organizations are innovating to stop cyberattacks before they happen in this Microsoft in Business blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How cybersecurity is evolving to protect essential services\" \/>\n<meta property=\"og:description\" content=\"How can essential institutions shift to proactive cybersecurity and combat a 92% rise in ransomware attacks? Learn how organizations are evolving a new model of digital citizenship to protect essential services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft in Business Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-27T17:14:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T17:14:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PerspectiveTrendsOnSecurityBlog2_OrganicSocial_1200x630v1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tyler Bryson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How cybersecurity is evolving to protect essential services\" \/>\n<meta name=\"twitter:description\" content=\"How can essential institutions shift to proactive cybersecurity and combat a 92% rise in ransomware attacks? Learn how organizations are evolving a new model of digital citizenship to protect essential services.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PerspectiveTrendsOnSecurityBlog2_OrganicSocial_1200x630v1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tyler Bryson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/author\/tyler-bryson\/\",\"@type\":\"Person\",\"@name\":\"Tyler Bryson\"}],\"headline\":\"How cybersecurity is evolving to protect essential services\",\"datePublished\":\"2023-07-27T17:14:52+00:00\",\"dateModified\":\"2023-07-27T17:14:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp\",\"keywords\":[\"AI\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\",\"name\":\"How cybersecurity is evolving to protect essential services - Microsoft in Business Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp\",\"datePublished\":\"2023-07-27T17:14:52+00:00\",\"dateModified\":\"2023-07-27T17:14:53+00:00\",\"description\":\"Learn about the ways that essential organizations are innovating to stop cyberattacks before they happen in this Microsoft in Business blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp\",\"width\":1200,\"height\":630,\"caption\":\"Chief information security officer presents to the board of executives on security topics in a conference room setting.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How cybersecurity is evolving to protect essential services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/\",\"name\":\"Microsoft in Business Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#organization\",\"name\":\"Microsoft in Business Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"width\":400,\"height\":400,\"caption\":\"Microsoft in Business Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How cybersecurity is evolving to protect essential services - Microsoft in Business Blogs","description":"Learn about the ways that essential organizations are innovating to stop cyberattacks before they happen in this Microsoft in Business blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/","og_locale":"en_US","og_type":"article","og_title":"How cybersecurity is evolving to protect essential services","og_description":"How can essential institutions shift to proactive cybersecurity and combat a 92% rise in ransomware attacks? Learn how organizations are evolving a new model of digital citizenship to protect essential services.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/","og_site_name":"Microsoft in Business Blogs","article_published_time":"2023-07-27T17:14:52+00:00","article_modified_time":"2023-07-27T17:14:53+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PerspectiveTrendsOnSecurityBlog2_OrganicSocial_1200x630v1.png","type":"image\/png"}],"author":"Tyler Bryson","twitter_card":"summary_large_image","twitter_title":"How cybersecurity is evolving to protect essential services","twitter_description":"How can essential institutions shift to proactive cybersecurity and combat a 92% rise in ransomware attacks? Learn how organizations are evolving a new model of digital citizenship to protect essential services.","twitter_image":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PerspectiveTrendsOnSecurityBlog2_OrganicSocial_1200x630v1.png","twitter_misc":{"Written by":"Tyler Bryson","Est. reading time":"3 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/author\/tyler-bryson\/","@type":"Person","@name":"Tyler Bryson"}],"headline":"How cybersecurity is evolving to protect essential services","datePublished":"2023-07-27T17:14:52+00:00","dateModified":"2023-07-27T17:14:53+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/"},"wordCount":777,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp","keywords":["AI","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/","name":"How cybersecurity is evolving to protect essential services - Microsoft in Business Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp","datePublished":"2023-07-27T17:14:52+00:00","dateModified":"2023-07-27T17:14:53+00:00","description":"Learn about the ways that essential organizations are innovating to stop cyberattacks before they happen in this Microsoft in Business blog.","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2023\/07\/PersepectiveTrendsonSecurityBlog2_OrganicSocial_ImageOnly_1200x630v1.webp","width":1200,"height":630,"caption":"Chief information security officer presents to the board of executives on security topics in a conference room setting."},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/security\/2023\/07\/27\/how-cybersecurity-is-evolving-to-protect-essential-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/"},{"@type":"ListItem","position":2,"name":"How cybersecurity is evolving to protect essential services"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/","name":"Microsoft in Business Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#organization","name":"Microsoft in Business Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","width":400,"height":400,"caption":"Microsoft in Business Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/"}}]}},"msxcm_animated_featured_image":null,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/68734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/users\/771"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/comments?post=68734"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/68734\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media\/68735"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media?parent=68734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/categories?post=68734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/post_tag?post=68734"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/content-type?post=68734"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/coauthors?post=68734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}