{"id":57556,"date":"2026-05-14T09:51:30","date_gmt":"2026-05-13T23:51:30","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/"},"modified":"2026-05-14T09:51:30","modified_gmt":"2026-05-13T23:51:30","slug":"how-to-reduce-phishing-risk-with-microsoft-365-defender","status":"publish","type":"post","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/","title":{"rendered":"How to Reduce Phishing Risk with Microsoft 365 Defender"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-57556","post","type-post","status-publish","format-standard","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Reduce Phishing Risk with Microsoft 365 Defender - CPI Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Reduce Phishing Risk with Microsoft 365 Defender\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-13T23:51:30+00:00\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"How to Reduce Phishing Risk with Microsoft 365 Defender\",\"datePublished\":\"2026-05-13T23:51:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/\"},\"wordCount\":8,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/\",\"name\":\"How to Reduce Phishing Risk with Microsoft 365 Defender - CPI Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\"},\"datePublished\":\"2026-05-13T23:51:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/05\\\/14\\\/how-to-reduce-phishing-risk-with-microsoft-365-defender\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Reduce Phishing Risk with Microsoft 365 Defender\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Reduce Phishing Risk with Microsoft 365 Defender - CPI Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/","og_locale":"en_US","og_type":"article","og_title":"How to Reduce Phishing Risk with Microsoft 365 Defender","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/","og_site_name":"CPI Consulting","article_published_time":"2026-05-13T23:51:30+00:00","author":"CPI Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CPI Staff"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/"},"author":{"name":"CPI Staff","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"How to Reduce Phishing Risk with Microsoft 365 Defender","datePublished":"2026-05-13T23:51:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/"},"wordCount":8,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/","name":"How to Reduce Phishing Risk with Microsoft 365 Defender - CPI Consulting","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/#website"},"datePublished":"2026-05-13T23:51:30+00:00","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"How to Reduce Phishing Risk with Microsoft 365 Defender"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudproinc.com.au\/#website","url":"https:\/\/www.cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/www.cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":57557,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/05\/14\/how-to-reduce-phishing-risk-with-microsoft-365-defender-2\/","url_meta":{"origin":57556,"position":0},"title":"How to Reduce Phishing Risk with Microsoft 365 Defender","author":"CPI Staff","date":"May 14, 2026","format":false,"excerpt":"Most phishing discussions still focus on user awareness. That matters, but it is not enough. The real issue for most Australian businesses is that phishing is no longer just a bad email with poor spelling. It is impersonation, credential theft, malicious links that change after delivery, weaponised attachments, business email\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/05\/how-to-reduce-phishing-risk-with-microsoft-365-defender-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/05\/how-to-reduce-phishing-risk-with-microsoft-365-defender-cover.png 1x, \/wp-content\/uploads\/2026\/05\/how-to-reduce-phishing-risk-with-microsoft-365-defender-cover.png 1.5x, \/wp-content\/uploads\/2026\/05\/how-to-reduce-phishing-risk-with-microsoft-365-defender-cover.png 2x, \/wp-content\/uploads\/2026\/05\/how-to-reduce-phishing-risk-with-microsoft-365-defender-cover.png 3x, \/wp-content\/uploads\/2026\/05\/how-to-reduce-phishing-risk-with-microsoft-365-defender-cover.png 4x"},"classes":[]},{"id":57523,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/05\/01\/why-microsoft-365-security-is-more-than-just-turning-on-mfa\/","url_meta":{"origin":57556,"position":1},"title":"Why Microsoft 365 Security Is More Than Just Turning on MFA","author":"CPI Staff","date":"May 1, 2026","format":false,"excerpt":"When a business enables Multi-Factor Authentication and calls it \"done,\" they've taken one important step \u2014 but left the door wide open in a dozen other places. MFA blocks a significant portion of credential-based attacks. Microsoft's own data shows it stops over 99% of automated password-based attacks. That's meaningful. But\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/05\/why-microsoft-365-security-is-more-than-just-turning-on-mfa-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/05\/why-microsoft-365-security-is-more-than-just-turning-on-mfa-cover.png 1x, \/wp-content\/uploads\/2026\/05\/why-microsoft-365-security-is-more-than-just-turning-on-mfa-cover.png 1.5x, \/wp-content\/uploads\/2026\/05\/why-microsoft-365-security-is-more-than-just-turning-on-mfa-cover.png 2x, \/wp-content\/uploads\/2026\/05\/why-microsoft-365-security-is-more-than-just-turning-on-mfa-cover.png 3x, \/wp-content\/uploads\/2026\/05\/why-microsoft-365-security-is-more-than-just-turning-on-mfa-cover.png 4x"},"classes":[]},{"id":57552,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/05\/13\/how-microsoft-defender-can-help-detect-risk-before-it-becomes-a-breach\/","url_meta":{"origin":57556,"position":2},"title":"How Microsoft Defender Can Help Detect Risk Before It Becomes a Breach","author":"CPI Staff","date":"May 13, 2026","format":false,"excerpt":"Most breaches do not begin with a sudden, dramatic attack. They begin with a series of signals that were already visible \u2014 sitting in a security platform, waiting for someone to act on them. For Australian businesses running Microsoft 365, those signals are already there. Microsoft Defender generates them every\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/05\/how-microsoft-defender-can-detect-risk-before-a-breach-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/05\/how-microsoft-defender-can-detect-risk-before-a-breach-cover.png 1x, \/wp-content\/uploads\/2026\/05\/how-microsoft-defender-can-detect-risk-before-a-breach-cover.png 1.5x, \/wp-content\/uploads\/2026\/05\/how-microsoft-defender-can-detect-risk-before-a-breach-cover.png 2x, \/wp-content\/uploads\/2026\/05\/how-microsoft-defender-can-detect-risk-before-a-breach-cover.png 3x, \/wp-content\/uploads\/2026\/05\/how-microsoft-defender-can-detect-risk-before-a-breach-cover.png 4x"},"classes":[]},{"id":57534,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/05\/05\/how-to-move-from-basic-microsoft-365-setup-to-a-proper-secure-workplace\/","url_meta":{"origin":57556,"position":3},"title":"How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace","author":"CPI Staff","date":"May 5, 2026","format":false,"excerpt":"Most Microsoft 365 environments are deployed for productivity first and secured later, if at all. That is how many Australian businesses end up with the appearance of control without the substance of it. Email works. Teams works. Files sync. Staff can work from anywhere. But the tenant still has weak\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/05\/move-from-basic-microsoft-365-to-secure-workplace-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/05\/move-from-basic-microsoft-365-to-secure-workplace-cover.png 1x, \/wp-content\/uploads\/2026\/05\/move-from-basic-microsoft-365-to-secure-workplace-cover.png 1.5x, \/wp-content\/uploads\/2026\/05\/move-from-basic-microsoft-365-to-secure-workplace-cover.png 2x, \/wp-content\/uploads\/2026\/05\/move-from-basic-microsoft-365-to-secure-workplace-cover.png 3x, \/wp-content\/uploads\/2026\/05\/move-from-basic-microsoft-365-to-secure-workplace-cover.png 4x"},"classes":[]},{"id":57505,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/04\/29\/the-first-10-things-we-check-in-a-microsoft-365-security-review\/","url_meta":{"origin":57556,"position":4},"title":"The First 10 Things We Check in a Microsoft 365 Security Review","author":"CPI Staff","date":"April 29, 2026","format":false,"excerpt":"When our team starts a Microsoft 365 security review, we focus on the areas that quickly tell us whether an environment is well controlled, loosely managed, or quietly carrying avoidable risk. For many Australian organisations, Microsoft 365 has become the centre of daily work. Email, files, Teams, devices, identities, and\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 1x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 2x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 3x, \/wp-content\/uploads\/2026\/04\/the-first-10-things-we-check-in-a-microsoft-365-security-review-cover.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/57556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/comments?post=57556"}],"version-history":[{"count":0,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/57556\/revisions"}],"wp:attachment":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/media?parent=57556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/categories?post=57556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/tags?post=57556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}