{"id":7613,"date":"2023-02-06T17:37:52","date_gmt":"2023-02-06T17:37:52","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=7613"},"modified":"2023-02-06T17:37:52","modified_gmt":"2023-02-06T17:37:52","slug":"endpoint-security-in-the-hybrid-era","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/","title":{"rendered":"Endpoint Security in the Hybrid Era"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/yOSwXsK2pMo\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    Just as the exciting hybrid workplace is emerging in today&#8217;s organizations, so is a rise in cybercrime. Watch this engaging video by HP Chief Information Security Officer Joanna Burkey showing how with endpoint security, businesses can keep up with the increased demand for safety and enable their workforce to thrive.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During one quarter in 2021 there was a 238% increase in cyber-attacks across the world. How does that make you feel about your security policy?  Abrahams Consulting LLC wants you to watch this insightful @HP video showing how using an endpoint security solution delivers layers of protection and resilience across the entire threat landscape.<\/p>\n","protected":false},"author":2,"featured_media":7612,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1140,1136],"tags":[],"class_list":["post-7613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hp","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Endpoint Security in the Hybrid Era - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Security in the Hybrid Era - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"During one quarter in 2021 there was a 238% increase in cyber-attacks across the world. How does that make you feel about your security policy? Abrahams Consulting LLC wants you to watch this insightful @HP video showing how using an endpoint security solution delivers layers of protection and resilience across the entire threat landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-06T17:37:52+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Endpoint Security in the Hybrid Era\",\"datePublished\":\"2023-02-06T17:37:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\"},\"wordCount\":57,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg\",\"articleSection\":[\"HP\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\",\"name\":\"Endpoint Security in the Hybrid Era - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg\",\"datePublished\":\"2023-02-06T17:37:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Security in the Hybrid Era\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint Security in the Hybrid Era - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/","og_locale":"en_US","og_type":"article","og_title":"Endpoint Security in the Hybrid Era - TechTonic Times","og_description":"During one quarter in 2021 there was a 238% increase in cyber-attacks across the world. How does that make you feel about your security policy? Abrahams Consulting LLC wants you to watch this insightful @HP video showing how using an endpoint security solution delivers layers of protection and resilience across the entire threat landscape.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/","og_site_name":"TechTonic Times","article_published_time":"2023-02-06T17:37:52+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Endpoint Security in the Hybrid Era","datePublished":"2023-02-06T17:37:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/"},"wordCount":57,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg","articleSection":["HP","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/","name":"Endpoint Security in the Hybrid Era - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg","datePublished":"2023-02-06T17:37:52+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/02\/maxresdefault-3.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/endpoint-security-in-the-hybrid-era\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Endpoint Security in the Hybrid Era"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=7613"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7613\/revisions"}],"predecessor-version":[{"id":7614,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/7613\/revisions\/7614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/7612"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=7613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=7613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=7613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}