{"id":7459,"date":"2023-01-19T15:12:55","date_gmt":"2023-01-19T15:12:55","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=7459"},"modified":"2023-01-19T15:12:55","modified_gmt":"2023-01-19T15:12:55","slug":"from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/","title":{"rendered":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/VnXAtUnNmlU\u202f\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    Check out this video to learn about out-of-box Microsoft Surface security settings that can safeguard your endpoints and simplify the work that IT pros do. If you have additional questions, feel free to reach out to us today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ready to learn with #Microsoft Surface? \ud83d\udc69\u200d\ud83c\udfeb\ud83e\uddd1\u200d\ud83c\udfeb Watch this video and join Microsoft security experts to learn about out-of-box security settings on Surface devices. You can use these settings to reduce security risks and make life easier for IT professionals. Abrahams Consulting LLC is ready to make sure you are protected with the latest, most secure Surface devices.<\/p>\n","protected":false},"author":2,"featured_media":7458,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,1139,1136],"tags":[],"class_list":["post-7459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-microsoft","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Ready to learn with #Microsoft Surface? \ud83d\udc69\u200d\ud83c\udfeb\ud83e\uddd1\u200d\ud83c\udfeb Watch this video and join Microsoft security experts to learn about out-of-box security settings on Surface devices. You can use these settings to reduce security risks and make life easier for IT professionals. Abrahams Consulting LLC is ready to make sure you are protected with the latest, most secure Surface devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-19T15:12:55+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer\",\"datePublished\":\"2023-01-19T15:12:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\"},\"wordCount\":49,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg\",\"articleSection\":[\"Cloud\",\"Microsoft\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\",\"name\":\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg\",\"datePublished\":\"2023-01-19T15:12:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/","og_locale":"en_US","og_type":"article","og_title":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times","og_description":"Ready to learn with #Microsoft Surface? \ud83d\udc69\u200d\ud83c\udfeb\ud83e\uddd1\u200d\ud83c\udfeb Watch this video and join Microsoft security experts to learn about out-of-box security settings on Surface devices. You can use these settings to reduce security risks and make life easier for IT professionals. Abrahams Consulting LLC is ready to make sure you are protected with the latest, most secure Surface devices.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/","og_site_name":"TechTonic Times","article_published_time":"2023-01-19T15:12:55+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer","datePublished":"2023-01-19T15:12:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/"},"wordCount":49,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg","articleSection":["Cloud","Microsoft","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/","name":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg","datePublished":"2023-01-19T15:12:55+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/01\/maxresdefault-7.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/from-chip-to-cloud-endpoint-security-for-the-modern-workplace-flyer-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"From Chip to Cloud: Endpoint Security for the Modern Workplace Flyer"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=7459"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7459\/revisions"}],"predecessor-version":[{"id":7460,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7459\/revisions\/7460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/7458"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=7459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=7459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=7459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}