{"id":64591,"date":"2023-03-20T11:40:43","date_gmt":"2023-03-20T03:40:43","guid":{"rendered":"https:\/\/version-2.com\/?p=64591"},"modified":"2024-09-13T16:31:25","modified_gmt":"2024-09-13T08:31:25","slug":"how-cmha-protected-sensitive-client-data-in-dynamic-team-environments","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/03\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\/","title":{"rendered":"How CMHA protected sensitive client data in dynamic team environments"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"64591\" class=\"elementor elementor-64591\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/lethbridge.cmha.ca\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Canadian Mental Health Association (CMHA), Alberta South Region (CMHA, ASR<u>)<\/u><\/a>, is a mental health non-profit, charitable organization in Canada. CMHA, ASR serves the Southwestern Alberta Region. As part of a nationwide mental health organization, it delivers a wide range of services that contribute to all people\u2019s well-being. Dedicated teams support people in need through housing, crisis services, case management, peer support, Wellness Recovery, information and referral, service navigation, education, and advocacy. From a rapid response operation to providing information to an emergency helpline, CMHA, ASR is here to help people walk through the most challenging moments of their lives.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1CtiKZytohM3wbKQZFsmDO\/0171aa9835cc93bbd6fb21f69c0a159f\/Profile_of_CMHA_web_1400x696.png?w=1400&amp;h=696&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"696\" \/>\n\n<picture>The CMHA Alberta South Region operates in an area of approximately 200,000 people. It is located next door to two large indigenous communities with over 16,000 people living on and off the reserve. The organization\u2019s nature and a team of 50 specialists working on several projects mean a dynamic and fast-paced workplace. Managing employee attrition and onboarding, working between program sites or at the regional hospital emergency department, and protecting sensitive client data require watertight and responsive security measures to support the daily CMHA operations. <\/picture><strong>Wesley Chenery<\/strong><picture>, the IT Specialist at the CMHA Alberta South Region, reveals the technological backstage of handling these challenges.\u00a0<\/picture>\n\n<\/div>\n<h2 id=\"the-challenge\" class=\"Heading Heading-h2 text-dark-blue\">The challenge<\/h2>\n<h3 class=\"Heading Heading-h3 text-dark-blue\">One-man army to initiate and contain sensitive data controls<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">CMHA\u2019s case is unique to the nature of the service model and its place in the health care system in Alberta. Although the organization does not fall under all the regulatory conditions within the public health care system, it is contractually mandated to follow compliance standards like HIPAA and other general data protection regulatory requirements. Yet, most of the security measures are applied by a proactive approach to avoid any potential negative outcomes of client data loss.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Our work culture requires a specific set of skills to be on board with what we do and offer to people. Unlike many more complex government organizations with layers of staff to support departmental needs, I am alone responsible for IT, statistics, and centrally administrating the CMHA\u2019s client-data registry.<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Our%2520work%2520culture%2520requires%2520a%2520specific%2520set%2520of%2520skills%2520to%2520be%2520on%2520board%2520with%2520what%2520we%2520do%2520and%2520offer%2520to%2520people.%2520Unlike%2520many%2520more%2520complex%2520government%2520organizations%2520with%2520layers%2520of%2520staff%2520to%2520support%2520departmental%2520needs,%2520I%2520am%2520alone%2520responsible%2520for%2520IT,%2520statistics,%2520and%2520centrally%2520administrating%2520the%2520CMHA%25E2%2580%2599s%2520client-data%2520registry.&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">CMHA uses a client management system called \u2018Efforts and Outcomes (ETO),\u2019 where all client data is stored. The organization must follow government standards to keep data solely in Canada \u2014 it cannot bounce between servers in different countries.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThe information has to be stored in the local data centers, and transfers must find a route that stays within Canada \u2014 other restrictions and policies regarding data are designed and implemented at our own discretion.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThe%2520information%2520has%2520to%2520be%2520stored%2520in%2520the%2520local%2520data%2520centers,%2520and%2520transfers%2520must%2520find%2520a%2520route%2520that%2520stays%2520within%2520Canada%2520%25E2%2580%2594%2520other%2520restrictions%2520and%2520policies%2520regarding%2520data%2520are%2520designed%2520and%2520implemented%2520at%2520our%2520own%2520discretion.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Contractual requirements and government regulations clearly outline data collection security standards. The organization is committed to maintaining high standards of compliance.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Another challenge CMHA faces is ongoing staff change. In a relatively short time, five employees tend to leave the organization, and another five join. A high rate of employee attrition and onboarding creates underlying security issues. Thus, access controls must be carefully managed to disconnect former employees and add new joiners in order to mitigate security risks.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">So how does a company with limited resources can streamline its security policies and get ahead of security risks in one of the most cyber-targeted sectors?<\/p>\n\n<h2 id=\"the-solution\" class=\"Heading Heading-h2 text-dark-blue\">The solution<\/h2>\n<h3 class=\"Heading Heading-h3 text-dark-blue\">A helping hand for defending data from cyberattacks<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">A service provider that provides an extensive range of services from hospital presentation aftercare to housing vulnerable individuals, from completing taxes to the monitoring of prescribed medication or guidance on reintegration into society &#8211; must represent and maintain trust. Strict internal policies and different tools help to achieve this goal.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Every computer and phone had to run security software that was controlled centrally by the network administrator. Every endpoint had its cookies and internet data wiped out every half-hour or when a browser was closed. Moreover, the browser was running an internet protection tool, and for a VPN, CMHA used an in-house server which was getting old and expensive to maintain. It is also worth mentioning that the internet in Canada is not that fast.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThere were many issues with in-house maintenance as hardware downgrades over time. You have to renew your licenses non-stop and buy accounts for new users \u2014 it\u2019s just ridiculously expensive.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThere%2520were%2520many%2520issues%2520with%2520in-house%2520maintenance%2520as%2520hardware%2520downgrades%2520over%2520time.%2520You%2520have%2520to%2520renew%2520your%2520licenses%2520non-stop%2520and%2520buy%2520accounts%2520for%2520new%2520users%2520%25E2%2580%2594%2520it%25E2%2580%2599s%2520just%2520ridiculously%2520expensive.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Besides, there was no option for backup with the on-site server \u2014 you lose power, and everyone loses connection. Upgrading the legacy infrastructure for better efficiency and getting more features demonstrated a need for a new solution that is well-developed and affordable.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The solution had to support the IT manager\u2019s daily operations, not burden them. It also had to be simple and intuitive for fast user onboarding, turning money and time to value.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cWe used a really old and non-automated system to connect people from the VPN. I\u2019d have to log into the server manually, unplug employees, change over their IP addresses, and afterward get them all set up again. It was extremely time-consuming.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CWe%2520used%2520a%2520really%2520old%2520and%2520non-automated%2520system%2520to%2520connect%2520people%2520from%2520the%2520VPN.%2520I%25E2%2580%2599d%2520have%2520to%2520log%2520into%2520the%2520server%2520manually,%2520unplug%2520employees,%2520change%2520over%2520their%2520IP%2520addresses,%2520and%2520afterward%2520get%2520them%2520all%2520set%2520up%2520again.%2520It%2520was%2520extremely%2520time-consuming.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees are not allowed to connect to public networks. However, they must be mobile as the staff\u2019s workplace might transform into hospitals or encampments. Thus, the tool must be running on their devices.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">To eliminate as many risks as possible, CMHA performs cybersecurity awareness training for its employees. There\u2019s a strict work-only device usage policy not to mix business and personal activities on provided laptops and cellphones. Company policies allow user activity monitoring to ensure top-level compliance and client data security.<\/p>\n\n<h2 id=\"why-choose-nordlayer\" class=\"Heading Heading-h2 text-dark-blue\">Why choose NordLayer<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer provides Control Panel with visibility on user activity and controls, with features like Always On VPN, KillSwitch, or ThreatBlock managed centrally. Automation and simple controls allow for saving IT manager\u2019s time and monitoring network safety on a unified scale.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThe biggest feature that I\u2019m really liking is the KillSwitch\u00a0\u2014 it has saved us a couple of times.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThe%2520biggest%2520feature%2520that%2520I%25E2%2580%2599m%2520really%2520liking%2520is%2520the%2520KillSwitch%25C2%25A0%25E2%2580%2594%2520it%2520has%2520saved%2520us%2520a%2520couple%2520of%2520times.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Once somebody got into CMHA\u2019s network and started changing their setting static IP address. The threat actor was overriding the computer and trying to re-direct our outgoing traffic. But when they hit <i>Implement<\/i>, all organization computers lost internet, stopping them from getting onto the company\u2019s computers.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cThe malware virus was designed to sit underneath our programs and slowly transfer data. I\u2019m guessing it would have probably taken about a month to realize there was an attack before anything started acting funny.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CThe%2520malware%2520virus%2520was%2520designed%2520to%2520sit%2520underneath%2520our%2520programs%2520and%2520slowly%2520transfer%2520data.%2520I%25E2%2580%2599m%2520guessing%2520it%2520would%2520have%2520probably%2520taken%2520about%2520a%2520month%2520to%2520realize%2520there%2520was%2520an%2520attack%2520before%2520anything%2520started%2520acting%2520funny.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Because of the feature, computers went down instead of connecting to the router, where the attacker left a malicious program to transfer all organization information to them. Instead, it hinted to the IT manager that someone was on the network \u2014 therefore, data was secured, and the router went into the garbage.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Malicious activity and software can stay undetected on the network for months until the damage is done irreversibly. Threat actors collect or lock away sensitive data for ransomware &#8211; one of the most destructive types of cyberattacks &#8211; exposing client personal information and making businesses face risks and losses.<\/p>\n\n<h2 id=\"the-outcome\" class=\"Heading Heading-h2 text-dark-blue\">The outcome<\/h2>\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Effectively-used time to take care of organization security<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Sensitive client data in the mental health sector, dynamic teamwork arrangements, and only one person to make it work technically and securely poses a major challenge to anyone.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Therefore, even support-oriented organizations need assistance to make their work easy and effective. A solution like NordLayer is focused on eliminating the complexity and inconvenience outdated hardware brings to security administrators.<\/p>\n\n<div class=\"bg-grey-athens Quote px-4 pb-4 pt-3 rounded-2 text-dark-blue\">\n<div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">\u201cWith NordLayer, I receive so few calls about network issues. Unless you are connecting to the right network, you won\u2019t be able to use our systems \u2014 an immediate reminder to employees that they need to change the network instead of contacting me to troubleshoot via phone.\u201d<\/p>\n\n<\/div>\n<a class=\"flex justify-end items-center text-still-dark-blue Link Link--slate-grey font-medium\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%25E2%2580%259CWith%2520NordLayer,%2520I%2520receive%2520so%2520few%2520calls%2520about%2520network%2520issues.%2520Unless%2520you%2520are%2520connecting%2520to%2520the%2520right%2520network,%2520you%2520won%25E2%2580%2599t%2520be%2520able%2520to%2520use%2520our%2520systems%2520%25E2%2580%2594%2520an%2520immediate%2520reminder%2520to%2520employees%2520that%2520they%2520need%2520to%2520change%2520the%2520network%2520instead%2520of%2520contacting%2520me%2520to%2520troubleshoot%2520via%2520phone.%25E2%2580%259D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fhow-cmha-protected-sensitive-client-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-testid=\"twitter-share-btn\"><span class=\"Quote__Tweet font-medium ml-2\">Click to tweet<\/span><\/a>\n\n<\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The right tools give more time, flexibility, and visibility to complicated and sometimes even destructive events in the organizational cybersecurity ecosystem. Besides security features, NordLayer enables to extract user activity data, useful for reporting and auditing, ensuring the security approach is compliant.<\/p>\n\n<h2 id=\"pro-cybersecurity-tips\" class=\"Heading Heading-h2 text-dark-blue\">Pro cybersecurity tips<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Despite the background and certificates in cybersecurity, real-life experiences bring the best insights into what methods and processes work best. Therefore, every story matters, it\u2019s just important to hear it and apply it to your own case.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Wesley Chenery, IT Specialist of CMHA, Alberta South Region, shares the points of importance every security manager should consider and share with their organizations:<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7qhJMEOMfkp3K0P0MOWhWN\/6d97f24fe50bef04df88e6a880af6ba4\/Quotes_of_CMHA_web_1400x704.png?w=1400&amp;h=704&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"704\" \/>\n\n<picture>Using the right tools, you have better chances to be ahead of unfortunate events that threaten your organization\u2019s network security. A proactive and safety-first mindset in evaluating risks and possible attack scenarios can become a vital element in business continuity. Make sure to upgrade to effective and efficient solutions \u2014 <\/picture><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/contact-sales\/\">contact us<\/a><picture> to discover your options to improve the way the security of your company.<\/picture>\n\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Canadian Mental Health Association (CMHA), Alberta Sout [&hellip;]<\/p>","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,973,1075,61],"tags":[1132,974,1076],"class_list":["post-64591","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-nord-security","category-year2023","category-press-release","tag-nordlayer","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How CMHA protected sensitive client data in dynamic team environments - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How CMHA protected sensitive client data in dynamic team environments - Version 2\" \/>\n<meta property=\"og:description\" content=\"Canadian Mental Health Association (CMHA), Alberta Sout [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T03:40:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"How CMHA protected sensitive client data in dynamic team environments\",\"datePublished\":\"2023-03-20T03:40:43+00:00\",\"dateModified\":\"2024-09-13T08:31:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\\\/\"},\"wordCount\":1450,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/gufEIC3g0LByoKG3R4GN1\\\/bb1dd0912ddbd4e687cb25c219ea376e\\\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"Nord Security\",\"2023\"],\"articleSection\":[\"NordLayer\",\"Nord Security\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/\",\"name\":\"How CMHA protected sensitive client data in dynamic team environments - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/gufEIC3g0LByoKG3R4GN1\\\/bb1dd0912ddbd4e687cb25c219ea376e\\\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-03-20T03:40:43+00:00\",\"dateModified\":\"2024-09-13T08:31:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/gufEIC3g0LByoKG3R4GN1\\\/bb1dd0912ddbd4e687cb25c219ea376e\\\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/gufEIC3g0LByoKG3R4GN1\\\/bb1dd0912ddbd4e687cb25c219ea376e\\\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/how-cmha-protected-sensitive-client-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How CMHA protected sensitive client data in dynamic team environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How CMHA protected sensitive client data in dynamic team environments - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/","og_locale":"en_US","og_type":"article","og_title":"How CMHA protected sensitive client data in dynamic team environments - Version 2","og_description":"Canadian Mental Health Association (CMHA), Alberta Sout [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/","og_site_name":"Version 2","article_published_time":"2023-03-20T03:40:43+00:00","article_modified_time":"2024-09-13T08:31:25+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"versionpan","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/03\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"How CMHA protected sensitive client data in dynamic team environments","datePublished":"2023-03-20T03:40:43+00:00","dateModified":"2024-09-13T08:31:25+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/03\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\/"},"wordCount":1450,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["NordLayer","Nord Security","2023"],"articleSection":["NordLayer","Nord Security","2023","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/03\/how-cmha-protected-sensitive-client-data-in-dynamic-team-environments\/","url":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/","name":"How CMHA protected sensitive client data in dynamic team environments - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-03-20T03:40:43+00:00","dateModified":"2024-09-13T08:31:25+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/gufEIC3g0LByoKG3R4GN1\/bb1dd0912ddbd4e687cb25c219ea376e\/Case_Study_CMHA_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/how-cmha-protected-sensitive-client-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How CMHA protected sensitive client data in dynamic team environments"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/en\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gNN","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/64591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=64591"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/64591\/revisions"}],"predecessor-version":[{"id":64595,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/64591\/revisions\/64595"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=64591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=64591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=64591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}