{"id":22094,"date":"2020-11-05T09:23:50","date_gmt":"2020-11-05T14:23:50","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=22094"},"modified":"2025-06-06T11:31:27","modified_gmt":"2025-06-06T15:31:27","slug":"protect-clients-where-theyre-most-vulnerable-email","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/","title":{"rendered":"Protect clients where they&#8217;re most vulnerable: email"},"content":{"rendered":"<p>With new communication options popping up monthly, email may look old fashioned to some. But five decades on, email is still the leading form of electronic communication. In fact, its use only continues to grow.<\/p>\n<p>More than <a href=\"https:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2019\/12\/Email-Statistics-Report-2020-2024-Brochure.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">280 billion email messages<\/a> were exchanged globally in 2018, and almost 350 billion are forecast by 2023. However, the way users interact with email is expected to change. Accessing email on <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-endpoint-protection-and-why-do-you-need-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">mobile devices<\/a> will get even more popular, as well as enterprise and consumer IoT devices using email communication.<\/p>\n<p><a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-use-proofpoint-email-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Email security<\/a> was already a complex problem, but the growing diversity of endpoint devices used to interact with email services just makes it more complicated. You probably have questions.<\/p>\n<p>What <a href=\"https:\/\/www.sherweb.com\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">solutions for email security<\/a> best <a href=\"https:\/\/www.sherweb.com\/blog\/security\/security-assessment\/\" target=\"_blank\" rel=\"noopener noreferrer\">protect clients<\/a> from the many different types of email exploits? And how do you even convince skeptical clients that they need more email security in the first place?<\/p>\n<p>Don\u2019t worry, we have answers.<\/p>\n<p>&nbsp;<\/p>\n<h2>Email remains an important target for hackers<\/h2>\n<p>The popularity of an IT service is also a measure of how enticing a target it is for cybercriminals. You can bet that if the IT channel and Managed Service Providers (MSPs) know email will remain an essential service for years to come, hackers know it too.<\/p>\n<p>Even a single <a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/business-email-compromise\" target=\"_blank\" rel=\"noopener noreferrer\">Business Email Compromise<\/a> (BEC), as the FBI calls them, can be devastating. Hackers have spent years finding new, effective attack vectors, in addition to optimizing proven social engineering attacks. Relying mostly on <a href=\"https:\/\/www.sherweb.com\/blog\/security\/upgrade-endpoint-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">endpoint security<\/a> will not remain an effective strategy against a growing, diverse range of email compromises. MSPs will need to take up a more direct defense of their clients\u2019 email.<\/p>\n<p>&nbsp;<\/p>\n<h2>Prevent email attacks at the source<\/h2>\n<p>Managing email security at the service level is the best way to protect your clients from spam, <a href=\"https:\/\/www.sherweb.com\/blog\/security\/online-backup-role-phishing-email-ransomware-paradigm\/\" target=\"_blank\" rel=\"noopener noreferrer\">spear phishing<\/a>, and other email security threats. Two solutions that <a href=\"https:\/\/www.sherweb.com\/partners\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sherweb partners<\/a> can access on this front include <a href=\"https:\/\/www.sherweb.com\/security\/proofpoint\/\" target=\"_blank\" rel=\"noopener noreferrer\">Proofpoint<\/a> and <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office Protect<\/a>.<\/p>\n<h3>Proofpoint<\/h3>\n<p>Proofpoint is a powerful email security suite. It helps you protect your clients from spam, malware, phishing attacks, as well as outbound data leaks. Proofpoint also generates detailed reports that give you better insight on the threats your clients face, identify emerging threats trends before a compromise occurs and respond proactively. It additionally helps you and\/or your clients meet any required regulatory data security standards necessary for your business.<\/p>\n<h3>Office Protect<\/h3>\n<p>Office Protect is a security add-on tool for <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365<\/a>. It automates and streamlines how you manage Exchange security settings, monitoring features and reporting. The UI was designed to be a simple and intuitive front-end for accessing the complex security ecosystem in Microsoft 365. Office Protect also gives you easy access to even those hard to find, specialized settings a client needs enabled only once every few months.<\/p>\n<p>Office Protect helps you <a href=\"https:\/\/www.sherweb.com\/blog\/security\/how-msps-can-add-value-to-their-offering-with-office-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\">implement powerful security measures<\/a> on your client\u2019s email accounts, including <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-enable-multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication (MFA)<\/a>. It can flag suspicious sender domains and send threat alerts to administrators that allow you to take action on suspicious activity before any damage is done. Reports can be viewed in the dashboard as an easy-to-read summary or exported to various formats, including CSV or PDF.<\/p>\n<h3 class=\"ewa-rteLine\">IRONSCALES<\/h3>\n<div class=\"ewa-rteLine\"><a href=\"https:\/\/www.sherweb.com\/security\/ironscales\/\">IRONSCALES<\/a> brings AI-powered phishing protection and business email compromise defense to your security stack. Designed for MSPs, it helps identify and stop threats before they reach users using real-time detection, automated incident response and built-in phishing simulations. Its multi-tenant platform makes it easy to manage across clients while boosting email security and user awareness.<\/div>\n<h2>How to sell email security services to clients<\/h2>\n<p>Using Proofpoint and Office Protect to secure your clients\u2019 email can help your bottom line as a service provider, but only if your clients understand the value of better email security and say \u201cyes\u201d to new services. Many clients don\u2019t see the need. So how can you best go about explaining the <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">benefits of better email security<\/a> to them?<\/p>\n<h3>Start by better understanding your client<\/h3>\n<p>You can\u2019t market the same way to every single prospect and expect to be successful. You need to <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/buyers-journey\/\" target=\"_blank\" rel=\"noopener noreferrer\">understand who you\u2019re selling to<\/a>. That means understanding the nature of your client&#8217;s or prospect&#8217;s business and the individual concerns of relevant decision-makers.<\/p>\n<p>Are they interested mostly in cost savings? Are they worried about a growing regulatory burden? Has their business been burned by email compromises in the past? Understanding these details will allow you to tune your email security pitch to their pain points.<\/p>\n<h3>Identify how to integrate<\/h3>\n<p>Many clients will feel overwhelmed if you suggest adding a completely new service onto their contract to secure something they already have. It can be much more palatable to present email security as simply an integration or enhancement.<\/p>\n<p>Are they already using Microsoft 365 as their cloud productivity platform? Present Office Protect as an add-on integration that can <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-settings-block-top-spamming-countries\/\" target=\"_blank\" rel=\"noopener noreferrer\">improve their email security<\/a>. They\u2019ll get <a href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-how-to-start-selling-data-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">better insight<\/a> into how staff are sharing corporate data, what information might be leaving their network, and what threats are making their way to user inboxes.<\/p>\n<h3>Presales education is important<\/h3>\n<p>Many clients resist extra email security because they don\u2019t understand the range of threats their businesses face. While Proofpoint and Office Protect are excellent at managing spam, if your clients only think email security is about preventing a few unwanted messages from appearing in their inbox, they\u2019re never going to understand why it\u2019s worth paying for the best. <a href=\"https:\/\/www.sherweb.com\/blog\/security\/security-awareness-training-is-no-longer-optional\/\" target=\"_blank\" rel=\"noopener noreferrer\">Educate them on the threat landscape<\/a> SMBs face today, including everything from spear phishing attacks, to data leaks, to <a href=\"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware attacks<\/a>.<\/p>\n<h3>Focus on outcomes<\/h3>\n<p>Most SMB owners (MSP clients) are not particularly IT-savvy. Cloud-based security tools may be hard for many of them to understand. Instead of trying to explain every bell and whistle to them, try to explain the business outcomes they\u2019ll see implementing better email security controls.<\/p>\n<p>Business data will be safer. They\u2019ll spend less time remediating compromises. They\u2019ll get fewer angry letters from compliance auditors. Those are things any business owner will appreciate.<\/p>\n<h2>Powerful solutions to complex problems<\/h2>\n<p>Email security may be a complex problem, but Sherweb has some powerful solutions for email security readily available to protect your clients. <a href=\"https:\/\/www.sherweb.com\/partners\/partnership-models\/\">Become a Sherweb partner<\/a> to leverage our expertise, strategic planning, and technical support to reach your full MSP potential.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With new communication options popping up monthly, email may look old fashioned to some. But five","protected":false},"author":177,"featured_media":22096,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[826,861,936,946],"class_list":["post-22094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-office-protect","tag-endpoint-protection","tag-email-security","tag-proofpoint"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect clients where they&#039;re most vulnerable: email | Sherweb<\/title>\n<meta name=\"description\" content=\"What solutions for email security best protect clients from the many different types of email exploits? Don&#039;t worry, we have answers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect clients where they&#039;re most vulnerable: email | Sherweb\" \/>\n<meta property=\"og:description\" content=\"What solutions for email security best protect clients from the many different types of email exploits? Don&#039;t worry, we have answers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T14:23:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T15:31:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Email-1200x480@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Protect clients where they&#8217;re most vulnerable: email\",\"datePublished\":\"2020-11-05T14:23:50+00:00\",\"dateModified\":\"2025-06-06T15:31:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/\"},\"wordCount\":1048,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480@2x.png\",\"keywords\":[\"Office Protect\",\"Endpoint Protection\",\"Email Security\",\"Proofpoint\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/\",\"name\":\"Protect clients where they're most vulnerable: email | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480@2x.png\",\"datePublished\":\"2020-11-05T14:23:50+00:00\",\"dateModified\":\"2025-06-06T15:31:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"What solutions for email security best protect clients from the many different types of email exploits? Don't worry, we have answers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Email-1200x480@2x.png\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/protect-clients-where-theyre-most-vulnerable-email\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect clients where they&#8217;re most vulnerable: email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect clients where they're most vulnerable: email | Sherweb","description":"What solutions for email security best protect clients from the many different types of email exploits? Don't worry, we have answers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/","og_locale":"en_US","og_type":"article","og_title":"Protect clients where they're most vulnerable: email | Sherweb","og_description":"What solutions for email security best protect clients from the many different types of email exploits? Don't worry, we have answers.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-11-05T14:23:50+00:00","article_modified_time":"2025-06-06T15:31:27+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Email-1200x480@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Protect clients where they&#8217;re most vulnerable: email","datePublished":"2020-11-05T14:23:50+00:00","dateModified":"2025-06-06T15:31:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/"},"wordCount":1048,"commentCount":1,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Email-1200x480@2x.png","keywords":["Office Protect","Endpoint Protection","Email Security","Proofpoint"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/","url":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/","name":"Protect clients where they're most vulnerable: email | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Email-1200x480@2x.png","datePublished":"2020-11-05T14:23:50+00:00","dateModified":"2025-06-06T15:31:27+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"What solutions for email security best protect clients from the many different types of email exploits? Don't worry, we have answers.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Email-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/Email-1200x480@2x.png","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Protect clients where they&#8217;re most vulnerable: email"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Office Protect","Endpoint Protection","Email Security","Proofpoint"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=22094"}],"version-history":[{"count":2,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22094\/revisions"}],"predecessor-version":[{"id":25525,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/22094\/revisions\/25525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/22096"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=22094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=22094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=22094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}