{"id":25625,"date":"2025-07-18T13:13:12","date_gmt":"2025-07-18T17:13:12","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25625"},"modified":"2025-09-29T02:14:32","modified_gmt":"2025-09-29T06:14:32","slug":"security-stack-for-msps","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/security\/security-stack-for-msps\/","title":{"rendered":"What defines a good security stack? It\u2019s not what you\u2019re buying"},"content":{"rendered":"<p><em>Most MSPs treat their security stack like a product catalog, but that approach breaks the moment a real threat hits. In this piece, Cybersecurity Technical Fellow <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/author-roddy-bergeron\/\">Roddy Bergeron<\/a> breaks down what a security stack for MSPs should actually look like. <a href=\"https:\/\/www.sherweb.com\/blog\/security\/operational-cybersecurity-for-msps\/\">Read Part 2: how to make your stack move \u203a<\/a><\/em><\/p>\n<p>Ask any MSP about their security stack, and the answer usually sounds the same: a list of tools. EDR, MFA, DNS filtering. Maybe they\u2019ve added SASE or email protection. On paper, it sounds solid.<\/p>\n<p>But ask one simple follow-up, <em>what happens after your next critical alert?<\/em> And that\u2019s when things get quiet.<\/p>\n<p>Because here\u2019s the truth: A stack is a system designed to move, adapt and protect, without relying on your people to stitch every alert to every response. It isn\u2019t a product lineup. It\u2019s not a budget line item. And having security tools is not the same as having a security stack. If your people are the only glue holding your stack together, you don\u2019t have a stack. You have a liability.<\/p>\n<p>Most MSPs build a stack like they\u2019re assembling IKEA furniture\u2014follow the instructions, bolt on the tools, and hope it holds. The ones who figure out why that\u2019s not enough? They\u2019re the ones not waking up at 2 AM.<\/p>\n<h2>Why you\u2019re building the wrong stack<\/h2>\n<p>I\u2019m going to be honest, most MSPs think stacking is about protection. Build layers. Block threats. Add another tool when something slips through. Stack it high enough and maybe nothing gets through, right? Except that\u2019s not how security works. And it\u2019s definitely not how operations scale.<\/p>\n<h4>What most MSPs miss is simple: their stack isn\u2019t built to move. It\u2019s built to pause.<\/h4>\n<p>Your endpoint flags ransomware behavior. What happens next? Does your system isolate the device? Lock the account? Shut down lateral movement? Or does the tool fire an alert, drop it in someone\u2019s inbox, and wait?<\/p>\n<p>That pause\u2014the time between detection and action\u2014is where most MSPs lose control. The tools didn\u2019t fail. The system wasn\u2019t there. Your stack detected something. But it didn\u2019t respond. You did.<\/p>\n<p>This isn\u2019t a product issue. It\u2019s a workflow issue. You\u2019re buying detection and calling it security. But detection without action isn\u2019t security. It\u2019s overhead.<\/p>\n<p>Every tool in your stack should be reducing that pause. When your endpoint detects ransomware, it should isolate itself without waiting. When your identity system spots a breach, conditional access should lock down the account immediately. If a phishing email gets reported, your monitoring system should hunt down every copy and remove it across all mailboxes.<\/p>\n<h4>That\u2019s operational security. It\u2019s the difference between a pile of disconnected tools and a real stack.<\/h4>\n<p>But building that kind of system isn\u2019t simple. It requires more than just tools\u2014it demands integration, automation, and workflows designed to move at the speed of business. Most MSPs haven\u2019t figured out how to get there. That\u2019s why stacks stay stuck.<\/p>\n<p>Most MSPs aren\u2019t running a security stack. They\u2019re running a notification system&#8230;poorly.<\/p>\n<p>And you only notice it when the system waits, and your client pays for it.<\/p>\n<h2>The core layers that make your stack move<\/h2>\n<p>A real security stack is a set of operational layers designed to act fast, without waiting for human input. The core domains every MSP must cover are:<\/p>\n<ul>\n<li><strong>Identity:<\/strong> Not just MFA (though you should). Every login gets vetted continuously. Conditional access and role-based access controls don\u2019t wait for compromise; they block exposure before it happens.<\/li>\n<li><strong>Endpoints:<\/strong> Not just deploying EDR. When threat actors hit, the infected device isolates itself automatically, \u00a0often before your team\u2019s first cup of coffee.<\/li>\n<li><strong>Network:<\/strong> Beyond firewalls. Modern networks verify every connection, micro-segmentation and zero-trust models stop attackers from roaming freely inside, limiting the blast radius of an incident.<\/li>\n<li><strong>Data:<\/strong> It\u2019s not backups alone. Knowing where sensitive data lives, building data flow diagrams, controlling access tightly and preventing leaks through DLP and cloud posture management is critical. Knowing how to recover your data in a timely manner is critical.<\/li>\n<li><strong>Email &amp; Collaboration:<\/strong> More than spam filters. Behavioral analysis and automated playbooks catch phishing and pull malicious payloads before users even see them.<\/li>\n<li><strong>Monitoring &amp; Response:<\/strong> It\u2019s not about logs piling up. Automated correlation, response, and escalation move incidents fast, so your team focuses only on what needs a human touch.<\/li>\n<\/ul>\n<p>If your stack can\u2019t answer \u201cwhat happens next?\u201d for each of these, you have disconnected tools waiting for someone to notice.<\/p>\n<p>For mature MSPs and MSSPs, the story continues. Once these basics are in place, you layer on additional controls that aren\u2019t must-haves, but game-changers:<\/p>\n<ul>\n<li><strong>Human Risk Management platforms:<\/strong> Targeting the weakest link\u2014your users\u2014through ongoing training and behavioral reinforcement.<\/li>\n<li><strong>Advanced browser protections:<\/strong> Securing cloud-first workflows where traditional network perimeters no longer apply.<\/li>\n<\/ul>\n<p>These are enhancements that turn a solid security foundation into a competitive edge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most MSPs treat their security stack like a product catalog, but that approach breaks the moment ","protected":false},"author":188,"featured_media":25626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[1121,919,1141,1142,1140,1132],"class_list":["post-25625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-author-roddy-bergeron","tag-cybersecurity","tag-cybersecurity-foundations","tag-detection-response","tag-msp-security-stack","tag-msp-security-strategy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Makes a Good Security Stack for MSPs | Sherweb<\/title>\n<meta name=\"description\" content=\"Think your MSP has a solid security stack? If it can\u2019t respond on its own, it\u2019s a liability. Learn what makes a real security stack for MSPs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Makes a Good Security Stack for MSPs | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Think your MSP has a solid security stack? If it can\u2019t respond on its own, it\u2019s a liability. Learn what makes a real security stack for MSPs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-18T17:13:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:14:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"What defines a good security stack? It\u2019s not what you\u2019re buying\",\"datePublished\":\"2025-07-18T17:13:12+00:00\",\"dateModified\":\"2025-09-29T06:14:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\"},\"wordCount\":849,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg\",\"keywords\":[\"Author: Roddy Bergeron\",\"Cybersecurity\",\"Cybersecurity Foundations\",\"Detection &amp; Response\",\"MSP Security Stack\",\"MSP Security Strategy\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\",\"url\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\",\"name\":\"What Makes a Good Security Stack for MSPs | Sherweb\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg\",\"datePublished\":\"2025-07-18T17:13:12+00:00\",\"dateModified\":\"2025-09-29T06:14:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"Think your MSP has a solid security stack? If it can\u2019t respond on its own, it\u2019s a liability. Learn what makes a real security stack for MSPs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage\",\"url\":\"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg\",\"contentUrl\":\"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"security stack for MSPs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sherweb.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What defines a good security stack? It\u2019s not what you\u2019re buying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\",\"url\":\"https:\/\/www.sherweb.com\/blog\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/\"],\"url\":\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/roddy-bergeron\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Makes a Good Security Stack for MSPs | Sherweb","description":"Think your MSP has a solid security stack? If it can\u2019t respond on its own, it\u2019s a liability. Learn what makes a real security stack for MSPs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/","og_locale":"en_US","og_type":"article","og_title":"What Makes a Good Security Stack for MSPs | Sherweb","og_description":"Think your MSP has a solid security stack? If it can\u2019t respond on its own, it\u2019s a liability. Learn what makes a real security stack for MSPs.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-07-18T17:13:12+00:00","article_modified_time":"2025-09-29T06:14:32+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"What defines a good security stack? It\u2019s not what you\u2019re buying","datePublished":"2025-07-18T17:13:12+00:00","dateModified":"2025-09-29T06:14:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/"},"wordCount":849,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg","keywords":["Author: Roddy Bergeron","Cybersecurity","Cybersecurity Foundations","Detection &amp; Response","MSP Security Stack","MSP Security Strategy"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/","url":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/","name":"What Makes a Good Security Stack for MSPs | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg","datePublished":"2025-07-18T17:13:12+00:00","dateModified":"2025-09-29T06:14:32+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"Think your MSP has a solid security stack? If it can\u2019t respond on its own, it\u2019s a liability. Learn what makes a real security stack for MSPs.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#primaryimage","url":"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/What-defines-a-good-security-stack-1200x480-1.jpg","width":2400,"height":920,"caption":"security stack for MSPs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/security-stack-for-msps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What defines a good security stack? It\u2019s not what you\u2019re buying"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Author: Roddy Bergeron","Cybersecurity","Cybersecurity Foundations","Detection &amp; Response","MSP Security Stack","MSP Security Strategy"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=25625"}],"version-history":[{"count":2,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25625\/revisions"}],"predecessor-version":[{"id":25632,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25625\/revisions\/25632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/25626"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=25625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=25625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=25625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}