{"id":2459,"date":"2025-11-13T12:29:54","date_gmt":"2025-11-13T12:29:54","guid":{"rendered":"https:\/\/clouddirect.net\/learning-hub\/?p=2459"},"modified":"2026-04-10T16:45:18","modified_gmt":"2026-04-10T15:45:18","slug":"enhanced-device-management-data-breach-prevention","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/","title":{"rendered":"Device management: limiting data breach risks in the age of AI"},"content":{"rendered":"\n<p>In 2025, the UK\u2019s cyber resilience has been tested like never before. Major brands have made headlines after suffering disruptive cyberattacks, forcing them to halt operations and exposing sensitive customer data.<\/p>\n\n<p>These incidents are not isolated. The UK government\u2019s latest <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security Breaches Survey<\/a> reveals that 43 per cent of UK businesses experienced a cyber breach or attack in the past year, rising to 74 per cent among large organisations. Phishing remains the most prevalent and disruptive threat, and the financial and reputational costs are mounting.&nbsp;<\/p>\n\n<p>For IT decision makers, the message is clear: robust device management is no longer optional, it\u2019s a strategic imperative.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-the-evolving-threat-landscape\"><strong>The evolving threat landscape<\/strong><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>Identity is the new perimeter<\/strong>: With traditional network boundaries dissolving, user identities have become the frontline of defence. Almost all (<a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\">97 per cent) identity hacks are password spray or brute force attacks<\/a>. Despite headlines proclaiming more sophisticated attacks, the majority of identity-based attacks still target weak or reused passwords.<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware on the rise<\/strong>: Human-operated ransomware attacks have surged, with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/threat-landscape\/microsoft-digital-defense-report-2024\">90 per cent of successful breaches originating from unmanaged devices<\/a> outside the visibility and control of IT.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>The AI impact<\/strong>: <a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\">AI-driven phishing is now three times more effective than traditional methods<\/a>. The increasing use of AI by attackers poses new challenges for detection and response, although AI can equally be used to defend against attacks such as by detecting anomalous sign-in patterns.<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-why-traditional-approaches-fall-short-nbsp\"><strong>Why Traditional Approaches Fall Short<\/strong>&nbsp;<\/h3>\n\n<p>Legacy Mobile Device Management (MDM) is no longer sufficient. The modern enterprise requires <strong>Unified Endpoint Management (UEM)<\/strong> and <strong>Unified Endpoint Security (UES)<\/strong> \u2013 these integrate antivirus, encryption, detection, and response into a single platform, ensuring consistent security across all devices and operating systems.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-how-enhanced-device-management-protects-your-organisation-nbsp\">How enhanced device management protects your organisation&nbsp;<\/h2>\n\n<p><strong>1. Limit identity breaches by adopting&#8230;&nbsp;<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Mandatory Multi-Factor Authentication (MFA)<\/strong>: Enforce phishing resistant MFA across all devices to drastically reduce the risk of unauthorised access, even if passwords are compromised.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Adaptive Access Policies<\/strong>: Integrate with Identity and Access Management (IAM) systems to trigger additional authentication or restrict access based on risk factors like device health, location, or user behaviour.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Continuous Monitoring &amp; Zero Trust<\/strong>: Leverage AI and machine learning to monitor for anomalies, enforce \u201cnever trust, always verify\u201d principles, and detect compromised credentials before they\u2019re exploited.&nbsp;<\/li>\n<\/ul>\n\n<p><strong>2. Prevent data breaches with&#8230;<\/strong>&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Robust Encryption<\/strong>: Ensure data is encrypted both in transit and at rest, including full-disk encryption and protection for removable media.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Loss Prevention (DLP)<\/strong>: Flag, track, and control sensitive data to prevent unauthorised sharing or exposure.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Remote Device Control<\/strong>: Instantly lock or wipe lost or stolen devices to prevent data leaks.&nbsp;<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"h-turning-theory-into-practice-nbsp\"><strong>Turning theory into practice<\/strong>&nbsp;<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"h-addressing-unmanaged-devices-nbsp\"><strong>Addressing Unmanaged Devices<\/strong>&nbsp;<\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>Device Discovery<\/strong>: Use tools like Microsoft Defender for Endpoint to identify all devices (managed and unmanaged) on your network.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Onboarding<\/strong>: Bring unmanaged endpoints under management to close visibility gaps and reduce vulnerabilities.&nbsp;<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-leveraging-microsoft-s-ecosystem-nbsp\"><strong>Leveraging Microsoft\u2019s Ecosystem<\/strong>&nbsp;<\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>Microsoft 365 &amp; Defender Suite<\/strong>: Deploy built-in MDM, DLP, and Conditional Access Policies for consistent, integrated security.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>Intune Security Baselines<\/strong>: Rapidly deploy recommended security configurations to all managed devices, addressing the root cause of most breaches &#8211; poor configuration.&nbsp;<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-navigating-the-age-of-ai-nbsp\"><strong>Navigating the Age of AI<\/strong>&nbsp;<\/h3>\n\n<ul class=\"wp-block-list\">\n<li><strong>BYOAI Risks<\/strong>: With four in five AI users bringing their own tools to work, device management is essential for controlling application use and preventing data leakage using tools like Microsoft Defender for Cloud Apps. &nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li><strong>AI-Driven Security<\/strong>: Modern device management platforms use AI to predict threats, automate policy updates, and shift security from reactive to proactive.&nbsp;<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"h-what-next\">What next?<\/h2>\n\n<ol class=\"wp-block-list\">\n<li><strong>Assess your current device management posture<\/strong>: Identify unmanaged devices, poor configurations, and BYOAI risks.&nbsp;<\/li>\n\n\n\n<li><strong>Adopt a unified, AI-powered device management strategy<\/strong>: Leverage Microsoft\u2019s ecosystem and you\u2019re existing M365 investment for comprehensive protection.&nbsp;<\/li>\n\n\n\n<li><strong>Don\u2019t wait for a breach<\/strong>: Proactive action today is the best defence for tomorrow\u2019s threats.&nbsp;<\/li>\n<\/ol>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>In 2025, the UK\u2019s cyber resilience has been tested like never before. Major brands have made headlines after suffering disruptive cyberattacks, forcing them to halt operations and exposing sensitive customer data. These incidents are not isolated. The UK government\u2019s latest Cyber Security Breaches Survey reveals that 43 per cent of UK businesses experienced a cyber [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":2461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[31],"tags":[66],"post_media_type":[24],"class_list":["post-2459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-security","tag-microsoft-security","post_media_type-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Device management: limiting data breach risks in the age of AI - Learning Hub<\/title>\n<meta name=\"description\" content=\"Discover how enhanced device management and Microsoft&#039;s security solutions can protect your organisation from AI-driven data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Device management: limiting data breach risks in the age of AI\" \/>\n<meta property=\"og:description\" content=\"Discover how enhanced device management and Microsoft&#039;s security solutions can protect your organisation from AI-driven data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-13T12:29:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T15:45:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Enhanced-Device-Management-Header-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"abbieantoine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"abbieantoine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/\"},\"author\":{\"name\":\"abbieantoine\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"headline\":\"Device management: limiting data breach risks in the age of AI\",\"datePublished\":\"2025-11-13T12:29:54+00:00\",\"dateModified\":\"2026-04-10T15:45:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/\"},\"wordCount\":655,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Enhanced-Device-Management-Header-Image.png\",\"keywords\":[\"Microsoft Security\"],\"articleSection\":[\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/\",\"name\":\"Device management: limiting data breach risks in the age of AI - Learning Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Enhanced-Device-Management-Header-Image.png\",\"datePublished\":\"2025-11-13T12:29:54+00:00\",\"dateModified\":\"2026-04-10T15:45:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"description\":\"Discover how enhanced device management and Microsoft's security solutions can protect your organisation from AI-driven data breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Enhanced-Device-Management-Header-Image.png\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/11\\\/Enhanced-Device-Management-Header-Image.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/enhanced-device-management-data-breach-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Device management: limiting data breach risks in the age of AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\",\"name\":\"abbieantoine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"caption\":\"abbieantoine\"},\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/abbiefawcett\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Device management: limiting data breach risks in the age of AI - Learning Hub","description":"Discover how enhanced device management and Microsoft's security solutions can protect your organisation from AI-driven data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/","og_locale":"en_GB","og_type":"article","og_title":"Device management: limiting data breach risks in the age of AI","og_description":"Discover how enhanced device management and Microsoft's security solutions can protect your organisation from AI-driven data breaches.","og_url":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/","og_site_name":"Learning Hub","article_published_time":"2025-11-13T12:29:54+00:00","article_modified_time":"2026-04-10T15:45:18+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Enhanced-Device-Management-Header-Image.png","type":"image\/png"}],"author":"abbieantoine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"abbieantoine","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/"},"author":{"name":"abbieantoine","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"headline":"Device management: limiting data breach risks in the age of AI","datePublished":"2025-11-13T12:29:54+00:00","dateModified":"2026-04-10T15:45:18+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/"},"wordCount":655,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Enhanced-Device-Management-Header-Image.png","keywords":["Microsoft Security"],"articleSection":["Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/","url":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/","name":"Device management: limiting data breach risks in the age of AI - Learning Hub","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Enhanced-Device-Management-Header-Image.png","datePublished":"2025-11-13T12:29:54+00:00","dateModified":"2026-04-10T15:45:18+00:00","author":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"description":"Discover how enhanced device management and Microsoft's security solutions can protect your organisation from AI-driven data breaches.","breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Enhanced-Device-Management-Header-Image.png","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2025\/11\/Enhanced-Device-Management-Header-Image.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/enhanced-device-management-data-breach-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Device management: limiting data breach risks in the age of AI"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28","name":"abbieantoine","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","caption":"abbieantoine"},"url":"https:\/\/clouddirect.net\/learning-hub\/author\/abbiefawcett\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=2459"}],"version-history":[{"count":7,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2459\/revisions"}],"predecessor-version":[{"id":2744,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2459\/revisions\/2744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/2461"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=2459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=2459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=2459"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=2459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}