{"id":22005,"date":"2020-10-02T20:27:02","date_gmt":"2020-10-03T00:27:02","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=22005"},"modified":"2024-06-03T11:05:42","modified_gmt":"2024-06-03T15:05:42","slug":"what-is-baseline-security","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/","title":{"rendered":"What is baseline security?"},"content":{"rendered":"<p>It\u2019s by no means an understatement to posit that cybersecurity is now a key component of any modern business plan. From the threat of cyberattacks, to adhering to government-regulated compliance requirements to password management, every business should have at least baseline security protections: a minimum standard of processes and procedures for keeping their operations safe.<\/p>\n<p>For managed service providers (MSPs) wanting to become managed security service providers (MSSPs), or even just for those IT providers observing the <a href=\"https:\/\/www.prnewswire.com\/news-releases\/global-cybersecurity-market-report-2020-to-2030---covid-19-growth-and-change-301082992.html\" target=\"_blank\" rel=\"noopener noreferrer\">growing demand for security services<\/a>, the stakes are rising. You must protect your clients\u2019 business from security threats in addition to your own. But you also need to be focused on your bottom line; while it\u2019s nice to think of yourself as your clients\u2019 protector, you\u2019re still running a business and need to generate revenue.<\/p>\n<p>As with all new ventures, you have to start somewhere. But you won\u2019t be serving your clients adequately with sub-par or incomplete cybersecurity solutions.<\/p>\n<p>This is where the concept of baseline security measures comes in. There are a few key areas to watch out for to ensure your security offering is worthwhile for customers. Covering these key areas can also be considered a baseline of minimum provisions to protect both yours and your clients\u2019 businesses from malicious attacks and unintentional security breaches alike.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>All about that base(line security controls)<\/strong><\/h2>\n<p>There are a few different ways to interpret what defines baseline security. According to the <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology (NIST)<\/a>, a \u201c<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/security_control_baseline\" target=\"_blank\" rel=\"noopener noreferrer\">security control baseline<\/a>\u201d refers to \u00a0\u201cthe set of minimum security controls defined for a low-impact, moderate-impact, or high-impact information system. A set of information security controls that has been established through information security strategic planning activities to address one or more specified security categorizations.\u201d<\/p>\n<p>Meanwhile, the <a href=\"https:\/\/cyber.gc.ca\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Canadian Centre for Cyber Security<\/a> defines its <a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/baseline-cyber-security-controls-small-and-medium-organizations\" target=\"_blank\" rel=\"noopener noreferrer\">Baseline Cyber Security Controls<\/a> as \u201ca condensed set of advice, guidance, and security controls on how organizations can get the most out of their cyber security investments.\u201d<\/p>\n<p>Microsoft, on the other hand, identifies <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-baselines\" target=\"_blank\" rel=\"noopener noreferrer\">security baselines<\/a> simply as standards defined by individual organizations that apps and devices must be compliant with. Microsoft\u2019s own security baselines are groups of recommended configuration settings for different levels of impact, informed by feedback from various stakeholders.<\/p>\n<p>Cutting through all the jargon\u2014think of baseline security as the bare minimum of what a business needs to sufficiently protect itself from vulnerabilities and threats while still being able to work efficiently and effectively. For MSPs, this extends to the bare minimum of security solutions that should be offered to deploy and maintain that protection.<\/p>\n<p>Unfortunately for us all, cybersecurity isn\u2019t a one-size-fits-all, one-and-done type of thing. There\u2019s not some magic cybersecurity easy button we can press to suddenly prevent and deflect all the bad behaviours that can compromise our business data. Good cybersecurity requires vigilance, awareness, training and monitoring. We all need it, no matter how small our business or uninteresting we think we might be as potential targets.<\/p>\n<p>On the bright side, however, it\u2019s not difficult to organize a standard set of policies, procedures and solutions to implement solid baseline security. General areas to focus on include security assessments, security for major productivity suites such as Microsoft 365, endpoint protection, email security and backup and disaster recovery.<\/p>\n<h3><strong>Security assessments<\/strong><\/h3>\n<p>You\u2019re only as good as the information you have, and administering cybersecurity assessments is one way MSPs can gather pertinent data about their clients\u2019 environments and current security measures. Conducting thorough, regular assessments can help identify what security measures clients have put in place (if any), and where resources should be allocated to bolster defenses.<\/p>\n<p>There are options out there for building and delivering quality security assessments. However, many are part of expensive packages and services that could be considered overkill when assessing simpler SMB customers. Some of these suites might also tap into areas of cybersecurity that your business isn\u2019t yet ready to tackle.<\/p>\n<p>Deploying a security assessment of any kind should be a key component of your baseline security measures, and we highly suggest you start including such a resource in your toolkit.<\/p>\n<p><a href=\"http:\/\/assessment.sherweb.com\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-22006\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Security-Assessment-Blog-CTA.png\" alt=\"\" width=\"1700\" height=\"500\" srcset=\"\/blog\/wp-content\/uploads\/Security-Assessment-Blog-CTA.png 1700w, \/blog\/wp-content\/uploads\/Security-Assessment-Blog-CTA-300x88.png 300w, \/blog\/wp-content\/uploads\/Security-Assessment-Blog-CTA-1024x301.png 1024w, \/blog\/wp-content\/uploads\/Security-Assessment-Blog-CTA-768x226.png 768w, \/blog\/wp-content\/uploads\/Security-Assessment-Blog-CTA-1536x452.png 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a><\/p>\n<h3><strong>Security for Microsoft 365<\/strong><\/h3>\n<p>Of course Microsoft 365 is secure. But many SMBs don\u2019t have the resources to properly educate or monitor staff about every security setting or best practice to follow\u2014they rely on IT providers for that.<\/p>\n<p>Taking a multi-layered approach to cybersecurity is widely recognized as an industry best practice. Deploying third-party security solutions to help safeguard critical business applications like Microsoft 365 is therefore a good plan of action for protecting client systems. Solutions like <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">Office Protect<\/a> can also greatly simplify cybersecurity management for both you as the service provider, and clients with multiple Microsoft 365 tenants that need to be protected.<\/p>\n<p>Another thing about popular tools like Microsoft 365 is that they also make for popular attack targets. By taking care to include security measures for such tools in your baseline offer, you show value for clients by demonstrating that you\u2019ve taken action to protect what matters most.<\/p>\n<h3><strong>Endpoint protection<\/strong><\/h3>\n<p>People expect to be able to use their own devices at work. Sure it\u2019s convenient, but it\u2019s also usually not secure. Because of this, <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-endpoint-protection-and-why-do-you-need-it\/\">endpoint protection<\/a> has become an essential inclusion in baseline security controls.<\/p>\n<p>Antivirus and antimalware solutions (<a href=\"https:\/\/www.sherweb.com\/security\/bitdefender\/\">Bitdefender<\/a>, for example) help keep malicious threats from assaulting client systems. Enabling <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-enable-multi-factor-authentication\/\">multi-factor authentication<\/a> is also recommended to prevent unauthorized access to accounts, files and networks.<\/p>\n<p>Generally speaking, adopting the <a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-security-model\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust Security Model<\/a> is recommend both for sufficient baseline security measures and proactive endpoint protection.<\/p>\n<h3><strong>Email security<\/strong><\/h3>\n<p>Email is a business\u2019s <a href=\"https:\/\/www.techradar.com\/news\/email-is-still-the-biggest-security-risk-around-today\" target=\"_blank\" rel=\"noopener noreferrer\">greatest security threat<\/a>. It\u2019s a primary vector for malicious activity, which is why it should definitely factor into a service provider\u2019s baseline security stack.<\/p>\n<p>Monitoring, alerts and threat prevention against risks like spam, suspicious links and addresses needs to be the norm to ensure adequate security. Again, a multi-layered approach is recommended. Although Microsoft 365 has many security controls in place to protect mailboxes, additional solutions such as <a href=\"https:\/\/www.sherweb.com\/blog\/security\/microsoft-365-flag-phishing-emails\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office Protect<\/a> and <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-use-proofpoint-email-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Proofpoint email protection<\/a> provide extra layers of security to make sure business email compromise is avoided at all costs.<\/p>\n<h3><strong>Backup and disaster recovery<\/strong><\/h3>\n<p>Just like how there\u2019s no cybersecurity easy button, there\u2019s also no special shield against unforeseen disasters. Sometimes, <a href=\"https:\/\/www.sherweb.com\/blog\/security\/traditional-backup-not-enough-sherweb-with-acronis\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure backups<\/a> and an effective <a href=\"https:\/\/www.sherweb.com\/blog\/security\/5-reasons-need-disaster-recovery-plan-small-business-online-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">disaster recovery plan<\/a> are the only things that can save businesses from total catastrophe.<\/p>\n<p><a href=\"https:\/\/www.sherweb.com\/blog\/security\/the-importance-of-online-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">Acronis Online Backup<\/a> and <a href=\"https:\/\/www.sherweb.com\/blog\/online-backup\/why-msps-need-veeam-disaster-recovery\/\" target=\"_blank\" rel=\"noopener noreferrer\">Veeam Cloud Connect<\/a> are staple solutions for business continuity and disaster recovery. By educating and encouraging clients to regularly back up files and data, while simultaneously providing failsafe measures to keep networks up and running in case of an outage, service providers can become essential to their customers by managing the solutions that ultimately keep the lights on.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Develop your baseline and build a quality managed security offer<\/strong><\/h2>\n<p>By at the very least covering the basics described above, MSPs and other cloud resellers can build a baseline security offering that equips clients with a multi-layered defense system that protects against modern threats.<\/p>\n<p>Granted, the above suggestions for baseline security measures are our own recommendations. But Sherweb\u2019s <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/sherwebs-value-added-services-cloud-expertise\/\" target=\"_blank\" rel=\"noopener noreferrer\">expertise as a value-added cloud solutions provider<\/a> has been proven to help partners succeed. Check out our <a href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\" target=\"_blank\" rel=\"noopener noreferrer\">Partner Guide<\/a> for more information about how Sherweb can support your managed services business, including products and solutions for comprehensive cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s by no means an understatement to posit that cybersecurity is now a key component of any mo","protected":false},"author":177,"featured_media":22008,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,942],"class_list":["post-22005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-managed-service-providers-msps"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is baseline security? | Sherweb<\/title>\n<meta name=\"description\" content=\"Think of baseline security as the bare minimum requirements to sufficiently protect against vulnerabilities and threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is baseline security? | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Think of baseline security as the bare minimum requirements to sufficiently protect against vulnerabilities and threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-03T00:27:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T15:05:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/MinimumBaselineSecurity-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"What is baseline security?\",\"datePublished\":\"2020-10-03T00:27:02+00:00\",\"dateModified\":\"2024-06-03T15:05:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/\"},\"wordCount\":1229,\"commentCount\":6,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/MinimumBaselineSecurity-1200x480@2x.png\",\"keywords\":[\"Cybersecurity\",\"Managed Service Providers (MSPs)\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/\",\"name\":\"What is baseline security? | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/MinimumBaselineSecurity-1200x480@2x.png\",\"datePublished\":\"2020-10-03T00:27:02+00:00\",\"dateModified\":\"2024-06-03T15:05:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Think of baseline security as the bare minimum requirements to sufficiently protect against vulnerabilities and threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/MinimumBaselineSecurity-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/MinimumBaselineSecurity-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/what-is-baseline-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is baseline security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is baseline security? | Sherweb","description":"Think of baseline security as the bare minimum requirements to sufficiently protect against vulnerabilities and threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/","og_locale":"en_US","og_type":"article","og_title":"What is baseline security? | Sherweb","og_description":"Think of baseline security as the bare minimum requirements to sufficiently protect against vulnerabilities and threats.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-10-03T00:27:02+00:00","article_modified_time":"2024-06-03T15:05:42+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/MinimumBaselineSecurity-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"What is baseline security?","datePublished":"2020-10-03T00:27:02+00:00","dateModified":"2024-06-03T15:05:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/"},"wordCount":1229,"commentCount":6,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/MinimumBaselineSecurity-1200x480@2x.png","keywords":["Cybersecurity","Managed Service Providers (MSPs)"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/","url":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/","name":"What is baseline security? | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/MinimumBaselineSecurity-1200x480@2x.png","datePublished":"2020-10-03T00:27:02+00:00","dateModified":"2024-06-03T15:05:42+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Think of baseline security as the bare minimum requirements to sufficiently protect against vulnerabilities and threats.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#primaryimage","url":"\/blog\/wp-content\/uploads\/MinimumBaselineSecurity-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/MinimumBaselineSecurity-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What is baseline security?"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Cybersecurity","Managed Service Providers (MSPs)"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=22005"}],"version-history":[{"count":9,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22005\/revisions"}],"predecessor-version":[{"id":24766,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22005\/revisions\/24766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/22008"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=22005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=22005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=22005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}