{"id":2610,"date":"2021-06-16T14:18:43","date_gmt":"2021-06-16T13:18:43","guid":{"rendered":"https:\/\/10.81.104.155\/int\/?post_type=article&#038;p=2610"},"modified":"2021-06-23T13:12:02","modified_gmt":"2021-06-23T12:12:02","slug":"how-to-balance-remote-work-and-it-security","status":"publish","type":"article","link":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/","title":{"rendered":"How to Balance Remote Work and IT Security"},"content":{"rendered":"\n  <style>\n    @media (min-width: 980px) {\n      .wp-block-hero__heading { font-size: 82px !important}\n      .wp-block-hero__sub-heading { font-size: 28px !important}\n    }\n  <\/style>\n\n<article class=\"wp-block-hero break-out\">\n\n      <div class=\"wp-block-hero__background\">\n                        <img data-src=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg\" alt=\"\" class=\"wp-block-hero__background__image wp-block-hero__background__image--desktop lazy\">\n              \n          <\/div>\n  \n  <i class=\"wp-block-hero__overlay\" aria-hidden=\"true\"><\/i>\n\n  \n      <i\n    aria-hidden=\"true\"\n    class=\"wp-block-hero__custom-overlay\"\n    style=\"background-color:#000000;opacity:0.3\"><\/i>\n  \n  \n  <div class=\"wp-block-hero__intro-wrap container\">\n    <h1 class=\"wp-block-hero__heading\">How to Balance Remote Work and IT Security<\/h1>\n  \n      <\/div>\n\n\n  \n    <div class=\"wp-block-hero__content-by wp-block-hero__content-by--wrap container\">      \n      <ul class=\"wp-block-hero__logos\">\n                  <li class=\"wp-block-hero__item\">\n\n                          <a href=\"https:\/\/www.microsoft.com\/mea\/newcultureofwork\/\" target=\"_blank\" rel=\"sponsored noopener\">\n            \n                          <img data-src=https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2020\/12\/Microsoft-logo_rgb_c-wht-e1623853847801-300x66.png alt=\"\" class=\"wp-block-hero__icon lazy\">\n            \n                          <\/a>\n            \n          <\/li>\n              <\/ul>\n    <\/div>\n    \n  <\/article>\n\n\n\n<p class=\"has-large-font-size\">Defending against cyber-threats is harder than ever when staff are scattered<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>We\u2019ve all done it. Everyone is guilty of sending a file to our personal inbox so we can use it on our personal device. Or forwarded a document to a freelancer outside of the organization, rather than sending a password-protected link on the company cloud. But when deadlines are tight, people tend to take the path of least resistance. Perhaps, instead of recrimination, IT teams could potentially learn why people act a certain way and find a solution that makes unofficial shortcuts and behaviors part of the managed service.<\/p>\n\n\n\n<p>It\u2019s easy to understand why remote working has always been a headache for businesses. When people work from home, they stray from the supervision of IT, often slipping into habits they might have for their personal devices.<\/p>\n\n\n\n<p>Getting people up and running as quickly as possible was the priority when much of the world migrated to home working in 2020 \u2013 often at the expense of security. But while many workers are anticipating a return to the office, the majority also expect to spend at least some of their week working from home.<\/p>\n\n\n\n<p>At the same time, data breaches are getting both more frequent and more costly. How can businesses protect their data, reputation, and operations from cyber-threats, while simultaneously embracing flexible working?<\/p>\n\n\n<figure class=\"wp-block-image wp-block-image--large \"><img data-src=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-100x67.jpg\" data-srcset=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022.jpg 1920w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-300x200.jpg 300w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-1024x683.jpg 1024w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-768x512.jpg 768w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-1536x1025.jpg 1536w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-1247x832.jpg 1247w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-826x551.jpg 826w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-600x400.jpg 600w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-100x67.jpg 100w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-520x347.jpg 520w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_022-260x173.jpg 260w\" width=\"1920\" height=\"1281\" alt=\"\" class=\"wp-block-image__image lazy\"><\/figure>\n\n\n<div class=\"wp-block-cnn-heading\"><h2 id=\"protect-the-endpoints\" class=\"wp-block-cnn-heading__heading\">Protect the endpoints<\/h2><div class=\"wp-block-cnn-heading__content\"><p>The first side of the equation is defending the devices themselves. Networks are like chains \u2013 only as strong as their weakest link. If even one smartphone, tablet, or laptop is compromised, it can open a door to the entire network.<\/p><p>Maintaining a firewall around an office of desktop computers funnelled through a company server is relatively simple. It\u2019s more difficult when employees are at home, and you lose control of how they connect to company servers and organizational data.<\/p><p>Issuing work-specific devices can at least ensure the correct security software is installed and configured correctly. They can also be set up to enforce best practices like using Multi-Factor Authentication (MFA) \u2013 which means your password is supplemented with a second or even third form of identification.<\/p><p>With measures like these in place, company data should be protected, even if accessed via unsecured, unmonitored connections. The problem comes when employees start using their own devices, or public services, to handle organizational data, without IT even knowing about it.<\/p><p>And that\u2019s a sizable problem: <a href=\"https:\/\/info.microsoft.com\/ww-landing-Identify-Weak-Links-in-your-Security.html?wt.mc_id=AID3024549_QSG_514868\" target=\"_blank\" rel=\"sponsored\">67% of IT security practitioners<\/a> are unable to detect which employees use insecure mobile devices.<\/p><\/div><\/div>\n\n\n<figure class=\"wp-block-image wp-block-image--large \"><img data-src=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-100x67.jpg\" data-srcset=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590.jpg 1920w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-300x200.jpg 300w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-1024x683.jpg 1024w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-768x512.jpg 768w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-1536x1024.jpg 1536w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-1247x831.jpg 1247w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-826x551.jpg 826w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-600x400.jpg 600w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-100x67.jpg 100w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-520x347.jpg 520w, https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_2590-260x173.jpg 260w\" width=\"1920\" height=\"1280\" alt=\"\" class=\"wp-block-image__image lazy\"><\/figure>\n\n\n<div class=\"wp-block-cnn-heading\"><h2 id=\"the-human-element\" class=\"wp-block-cnn-heading__heading\">The human element<\/h2><div class=\"wp-block-cnn-heading__content\"><p>The other side of the equation is arguably trickier: <a href=\"https:\/\/info.microsoft.com\/ww-landing-Identify-Weak-Links-in-your-Security.html?wt.mc_id=AID3024549_QSG_514868\" target=\"_blank\" rel=\"sponsored\">58% of inadvertent data breaches<\/a> are caused by human error. <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"sponsored\">The FBI\u2019s latest internet crime report<\/a> recorded double the number of phishing incidents in 2020 vs 2019 \u2013 and 11 times the number of complaints. All it takes is one person to click one malicious link and suddenly an entire organization is compromised. That\u2019s why it\u2019s so important to have software which automatically prevents users from making these mistakes \u2013 Microsoft blocked <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=101738\" target=\"_blank\" rel=\"sponsored\">13 billion phishing attempts<\/a> in 2019.<\/p><p>It\u2019s undeniable that there is a need for education, alongside upgraded technology. Cyber-criminals are getting more sophisticated, adopting new techniques that make phishing harder to detect, such as posing as CEOs, or spoofing well-known companies. Even tech-savvy eyes can be fooled by this new breed of attacks.<\/p><p>But there is also a balance to be struck between security and usability. When staff are simply trying to do their job, it\u2019s easy to see why they might circumvent carefully planned secure file sharing in favor of a free file transfer site when deadlines are tight, and the system isn\u2019t cooperating. If corporate devices, servers, and protocols are getting in the way of getting things done, they can\u2019t be blamed for finding an easier path.<\/p><p>But doing so could put sensitive data at risk \u2013 all without IT having the chance to act before it\u2019s too late.<\/p><p><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-cnn-heading\"><h2 id=\"holistic-security\" class=\"wp-block-cnn-heading__heading\">Holistic security<\/h2><div class=\"wp-block-cnn-heading__content\"><p>Securing a hybrid network \u2013 part on-premises IT, and part remote employees \u2013 requires a holistic approach. Businesses can no longer confine employees to physical computers in physical premises, but they can create an analog in the cloud.<\/p><p>All-encompassing platforms like Microsoft Enterprise 365 provide every application office workers need \u2013 and are likely already familiar with \u2013 curtailing the chance they\u2019ll want to circumvent them. Running on Microsoft Azure, they\u2019re all protected with class-leading cloud security.<\/p><p>Integrated in the solution are advanced security tools for IT to take a proactive prevent, detect, and respond approach \u2013 with detailed analytics to understand how users are approaching security, and where vulnerabilities lie; including potential knowledge gaps.<\/p><p>Businesses cannot keep their staff in one place. But by keeping them in the same virtual workplace, they can still protect the network.<\/p><p><em>Find out more about how to create a new culture of work in your organization <a href=\"https:\/\/www.microsoft.com\/mea\/newcultureofwork\/\" target=\"_blank\" rel=\"sponsored\">with Microsoft<\/a>.<\/em><\/p><\/div><\/div>\n\n\n\n<article class=\"wp-block-related-content break-out\">\n  <div class=\"container\">\n\n          <h2 class=\"wp-block-related-content__heading\">Related Articles<\/h2>\n    \n          <div class=\"wp-block-related-content__grid\">\n\n                  <article class=\"wp-block-related-content__item\">\n            <a\n            href=\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/what-weve-learned-about-remote-work\/\"\n            class=\"wp-block-related-content__link\"\n            target=\"_self\"\n                        >\n\n                              <div class=\"wp-block-related-content__media\">\n                  <img data-src=https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_HPElite_008_TeamsUI_8personCall-1024x683.jpg alt=\"\" class=\"wp-block-related-content__image lazy\">\n                <\/div>\n              \n                              <h3 class=\"wp-block-related-content__title\">What we\u2019ve Learned About Remote Work<\/h3>\n              \n            <\/a>\n          <\/article>\n                  <article class=\"wp-block-related-content__item\">\n            <a\n            href=\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/creating-watercooler-moments-for-a-remote-team\/\"\n            class=\"wp-block-related-content__link\"\n            target=\"_self\"\n                        >\n\n                              <div class=\"wp-block-related-content__media\">\n                  <img data-src=https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_Dell3390_539-1024x683.jpg alt=\"\" class=\"wp-block-related-content__image lazy\">\n                <\/div>\n              \n                              <h3 class=\"wp-block-related-content__title\">Creating Watercooler Moments for a Remote Team<\/h3>\n              \n            <\/a>\n          <\/article>\n                  <article class=\"wp-block-related-content__item\">\n            <a\n            href=\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/it-is-an-ongoing-balancing-act-between-cyber-threats-regulation-and-business-as-usual\/\"\n            class=\"wp-block-related-content__link\"\n            target=\"_self\"\n                        >\n\n                              <div class=\"wp-block-related-content__media\">\n                  <img data-src=https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_lenovoThinkPad_6820-1024x683.jpg alt=\"\" class=\"wp-block-related-content__image lazy\">\n                <\/div>\n              \n                              <h3 class=\"wp-block-related-content__title\">How IT balances Cyber-Threats, Regulation, and Business as Usual<\/h3>\n              \n            <\/a>\n          <\/article>\n                  <article class=\"wp-block-related-content__item\">\n            <a\n            href=\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-tech-enables-focus-in-a-world-of-distractions\/\"\n            class=\"wp-block-related-content__link\"\n            target=\"_self\"\n                        >\n\n                              <div class=\"wp-block-related-content__media\">\n                  <img data-src=https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_HPEliteBook_198-1024x683.jpg alt=\"\" class=\"wp-block-related-content__image lazy\">\n                <\/div>\n              \n                              <h3 class=\"wp-block-related-content__title\">How Tech Enables Focus in a World of Distractions<\/h3>\n              \n            <\/a>\n          <\/article>\n        \n      <\/div>\n    \n  <\/div>\n<\/article>\n\n\n<article class=\"wp-block-cta break-out\">\n\n\n      <div class=\"wp-block-cta__background\">\n                        <img data-src=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_SMB_HPElite_008_TeamsUI_8personCall.jpg\" alt=\"\" class=\"wp-block-cta__background__image wp-block-cta__background__image--desktop lazy\">\n                        <\/div>\n  \n      <i\n    aria-hidden=\"true\"\n    class=\"wp-block-cta__custom-overlay\"\n    style=\"background-color:#000000;opacity:0.3\"><\/i>\n  \n  <div class=\"container\">\n\n          <h3 class=\"wp-block-cta__heading\">Discover more about the new culture of work with Microsoft Viva.<\/h3>\n    \n    \n    <div class=\"wp-block-cta__buttons\">\n              <a\n        rel=\"sponsored\" rel=\"sponsored\" href=\"https:\/\/www.microsoft.com\/mea\/newcultureofwork\/%20\"\n        target=\"_self\"\n                class=\"button wp-block-cta__cta\">\n          Discover More        <\/a>\n      \n      \n    <\/div>\n  <\/div>\n<\/article>","protected":false},"featured_media":2598,"template":"","class_list":["post-2610","article","type-article","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Balance Remote Work and IT Security - Microsoft 365 - CNN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Balance Remote Work and IT Security - Microsoft 365 - CNN\" \/>\n<meta property=\"og:description\" content=\"Defending against cyber-threats is harder than ever when staff are scattered We\u2019ve all done it. Everyone is guilty of sending a file to our personal inbox so we can use it on our personal device. Or forwarded a document to a freelancer outside of the organization, rather than sending a password-protected link on the company [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CNN\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-23T12:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/\",\"url\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/\",\"name\":\"How to Balance Remote Work and IT Security - Microsoft 365 - CNN\",\"isPartOf\":{\"@id\":\"https:\/\/10.81.104.155\/int\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg\",\"datePublished\":\"2021-06-16T13:18:43+00:00\",\"dateModified\":\"2021-06-23T12:12:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#primaryimage\",\"url\":\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg\",\"contentUrl\":\"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg\",\"width\":1920,\"height\":1281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/10.81.104.155\/int\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Balance Remote Work and IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/10.81.104.155\/int\/#website\",\"url\":\"https:\/\/10.81.104.155\/int\/\",\"name\":\"CNN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/10.81.104.155\/int\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Balance Remote Work and IT Security - Microsoft 365 - CNN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/","og_locale":"en_US","og_type":"article","og_title":"How to Balance Remote Work and IT Security - Microsoft 365 - CNN","og_description":"Defending against cyber-threats is harder than ever when staff are scattered We\u2019ve all done it. Everyone is guilty of sending a file to our personal inbox so we can use it on our personal device. Or forwarded a document to a freelancer outside of the organization, rather than sending a password-protected link on the company [&hellip;]","og_url":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/","og_site_name":"CNN","article_modified_time":"2021-06-23T12:12:02+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/","url":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/","name":"How to Balance Remote Work and IT Security - Microsoft 365 - CNN","isPartOf":{"@id":"https:\/\/10.81.104.155\/int\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#primaryimage"},"image":{"@id":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg","datePublished":"2021-06-16T13:18:43+00:00","dateModified":"2021-06-23T12:12:02+00:00","breadcrumb":{"@id":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#primaryimage","url":"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg","contentUrl":"https:\/\/sponsorcontent.cnn.com\/int\/wp-content\/uploads\/2021\/06\/M365CO19_ENT_SurfaceBook_085.jpg","width":1920,"height":1281},{"@type":"BreadcrumbList","@id":"https:\/\/sponsorcontent.cnn.com\/int\/microsoft-modern-workplace\/how-to-balance-remote-work-and-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/10.81.104.155\/int\/"},{"@type":"ListItem","position":2,"name":"How to Balance Remote Work and IT Security"}]},{"@type":"WebSite","@id":"https:\/\/10.81.104.155\/int\/#website","url":"https:\/\/10.81.104.155\/int\/","name":"CNN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/10.81.104.155\/int\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/sponsorcontent.cnn.com\/int\/wp-json\/wp\/v2\/article\/2610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sponsorcontent.cnn.com\/int\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/sponsorcontent.cnn.com\/int\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sponsorcontent.cnn.com\/int\/wp-json\/wp\/v2\/media\/2598"}],"wp:attachment":[{"href":"https:\/\/sponsorcontent.cnn.com\/int\/wp-json\/wp\/v2\/media?parent=2610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}