{"id":99821,"date":"2024-12-15T15:32:32","date_gmt":"2024-12-15T07:32:32","guid":{"rendered":"https:\/\/version-2.com\/?p=99821"},"modified":"2024-12-04T15:35:43","modified_gmt":"2024-12-04T07:35:43","slug":"conditional-access-unplugged-tapping-into-the-power-of-human-experience","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/12\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\/","title":{"rendered":"Conditional Access Unplugged: Tapping into the Power of Human Experience"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"99821\" class=\"elementor elementor-99821\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3f9c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24c3f9c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c6ecd87\" data-id=\"4c6ecd87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-123ce05e elementor-widget elementor-widget-text-editor\" data-id=\"123ce05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"tdb-block-inner td-fix-index\">\n<p>Organizations face unprecedented challenges as cyber threats become increasingly sophisticated, enabling sensitive data protection more critical than ever. Conditional access is at the helm of this security effort, utilizing tailored permissions based on criteria such as user identity, device trust, location trust, and contextual factors.&nbsp;<\/p>\n\n\n\n<p>But what if optimizing conditional access hinges not only on technology but also on understanding human behavior?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full td-caption-align-center\"><img fetchpriority=\"high\" decoding=\"async\" width=\"850\" height=\"550\" src=\"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png\" alt=\"Empowering Teams: Human Factors in Conditional Access Management\" class=\"wp-image-25808 td-animation-stack-type0-2\" style=\"object-fit:cover\" srcset=\"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png 850w, https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1-300x194.png 300w, https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1-768x497.png 768w, https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1-649x420.png 649w, https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1-150x97.png 150w, https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1-696x450.png 696w\" sizes=\"(max-width: 850px) 100vw, 850px\"><figcaption class=\"wp-element-caption\">Empowering Teams: Human Factors in Conditional Access Management<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Establishing a strong human-centric conditional access strategy<\/h2>\n\n\n\n<p><strong>Access management and its purpose<\/strong><\/p>\n\n\n\n<p>Access management encompasses the processes and technologies that allow organizations to control who can access their systems and data. It includes identity management, authentication, authorization, and auditing. The primary goal is to ensure that only authorized users can access sensitive information, reducing the risk of data breaches and ensuring compliance with regulations.<\/p>\n\n\n\n<p>Take solutions like OneIDP as an example to incorporate <a href=\"https:\/\/blog.scalefusion.com\/what-is-access-management\/?utm_source=blog&amp;utm_medium=Empowering%20Teams%3A%20Human%20Factors%20in%20Conditional%20Access%20Management&amp;utm_campaign=Scalefusion%20Blog\" target=\"_blank\" rel=\"noopener\" title=\"\">access management<\/a> frameworks, organizations can achieve more seamless identity verification and robust security protocols, ensuring that only authorized users gain access to sensitive data.<\/p>\n\n\n\n<p><strong>Understanding Conditional Access<\/strong><\/p>\n\n\n\n<p>Conditional access is a security approach that dynamically adjusts access permissions based on conditions like user identity, device status, location, and behavior. Unlike traditional static controls that rely solely on user credentials, this method allows organizations to adapt their security posture to the current context, enhancing protection against unauthorized access while ensuring legitimate users can easily access necessary resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Components of Conditional Access<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>User Identity<\/strong>: Knowing the user is fundamental to any access management strategy, utilizing methods like <a href=\"https:\/\/blog.scalefusion.com\/single-sign-on-sso\/?utm_source=blog&amp;utm_medium=Empowering%20Teams%3A%20Human%20Factors%20in%20Conditional%20Access%20Management&amp;utm_campaign=Scalefusion%20Blog\" target=\"_blank\" rel=\"noopener\" title=\"\">Single Sign-On (SSO)<\/a>, multi-factor authentication (MFA), and biometric scans. Modern solutions such as OneIDP streamline user identity verification by providing a unified platform for managing access across various applications and systems, enhancing security while simplifying the user experience.<\/li>\n\n\n\n<li><strong>Device Trust<\/strong>: Assessing whether a device meets security standards\u2014such as having up-to-date antivirus software and a secure operating system\u2014is critical for establishing trust.<\/li>\n\n\n\n<li><strong>Location<\/strong>: Geographic context, including preferred locations or geofencing, helps determine risk. Accessing sensitive information from a known corporate location may warrant fewer controls than from an unfamiliar area.<\/li>\n\n\n\n<li><strong>Behavioral Context<\/strong>: User behavior analytics (UBA) is vital for shaping effective security practices. Understanding users\u2019 interactions with systems can inform conditional access policies and help eliminate unknown malicious activity.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The Role of Zero Trust in Conditional Access<\/h2>\n\n\n\n<p>Integrating Zero Trust Access with conditional access can phenomenally enhance security by safeguarding sensitive data and enabling organizations to respond effectively to evolving cyber threats. Zero Trust Access is a critical framework that enhances conditional access strategies, providing a protected security posture for organizations.&nbsp;<\/p>\n\n\n\n<p><strong>Here\u2019s how Zero Trust plays a vital role:<\/strong><\/p>\n\n\n\n<p><strong>Never Trust, Always Verify: <\/strong>Challenges the notion of default trust, aligning seamlessly with conditional access policies that continuously verify users and devices before granting access to sensitive resources.<\/p>\n\n\n\n<p><strong>Granular Access Control:<\/strong> Think of Zero Trust like a high-security club where everyone is checked at the door, and conditional access ensures they only enter the areas they\u2019re authorized to, minimizing risk.<\/p>\n\n\n\n<p><strong>Contextual Authentication:<\/strong> Emphasizes using real-time data to evaluate the context of each access attempt, ensuring additional authentication is triggered if a user accesses sensitive data from an unfamiliar device or location.<\/p>\n\n\n\n<p><strong>Continuous Monitoring and Response:<\/strong> It continuously monitors every movement, allowing conditional access to detect and respond to potential security threats in real-time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bridging Technology and Human Behavior<\/h2>\n\n\n\n<p>To create a strong conditional access framework, organizations must align technological capabilities with user behavior and needs. This includes designing user-friendly policies and leveraging data analytics to better understand and adapt to user actions. OneIDP simplifies the authentication process while aligning with user behaviors, making it easier for organizations to implement security policies that are both effective and user-friendly. Regular user feedback helps identify pain points and refine the user experience.<\/p>\n\n\n\n<p><strong>Designing User-Friendly Policies:<\/strong> Focus on simplifying authentication and providing clear guidelines that support productivity while maintaining security. User feedback is essential for identifying issues and improving the process.<\/p>\n\n\n\n<p><strong>Implementing Adaptive Security Measures: <\/strong>Adaptive security protocols adjust based on user behavior and risk levels. For instance, logging in from an unusual location can prompt additional authentication, maintaining security without burdening users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Benefits of a Human-Centric Access Management&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enhanced User Experience<\/strong>: Balancing security with usability minimizes friction, allowing legitimate users to access resources more easily.<\/li>\n\n\n\n<li><strong>Increased Compliance<\/strong>: A user-centric approach aids in meeting regulatory requirements, as informed and engaged users are more likely to adhere to access policies.<\/li>\n\n\n\n<li><strong>Reduced Risk of Insider Threats<\/strong>: Understanding user behavior and establishing clear access policies can help identify unusual patterns that may indicate insider threats.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Building an Ethical and Strong Security-Aware Culture<\/h2>\n\n\n\n<p>Creating a robust security-aware culture goes beyond strong policies and the latest technology. While technology provides essential protection, users remain the weakest link\u2014phishing attacks, poor password hygiene, and careless handling of credentials can still compromise even the best systems. Therefore, prioritizing the human factor is critical for effective conditional access, integrating both technical skills and ethical decision-making into daily operations.<\/p>\n\n\n\n<p>Employees need to understand the impact of their actions on security and feel empowered to make ethical decisions, while leaders set the tone by prioritizing transparency, explaining security measures, and establishing clear, rights-respecting access guidelines. This fosters a shared sense of responsibility, crucial to both the organization\u2019s mission and customer trust.<\/p>\n\n\n\n<p>Inclusivity is essential to an ethical security culture. Conditional access guidelines should provide alternative authentication methods, such as <a href=\"https:\/\/blog.scalefusion.com\/what-is-multi-factor-authentication-mfa\/?utm_source=blog&amp;utm_medium=Empowering%20Teams%3A%20Human%20Factors%20in%20Conditional%20Access%20Management&amp;utm_campaign=Scalefusion%20Blog\" target=\"_blank\" rel=\"noopener\" title=\"\">multifactor authentication (MFA)<\/a>, to accommodate diverse needs. Access policies must be flexible enough to address cultural and geographic differences, offering multiple secure authentication options (e.g., biometrics, PINs, or two-factor authentication) to respect regional preferences without compromising overall security. This ensures that security measures are not perceived as unfair or invasive.<\/p>\n\n\n\n<p>Fairness in access control is critical to prevent discrimination based on location, device, or behavior. Policies must be free of bias to avoid unfairly targeting specific user groups. For instance, a potential issue can arise when an access control system uses behavior analytics to identify suspicious activity. If the system monitors login times and flags accounts with irregular login patterns, a user who occasionally logs in at unusual times\u2014perhaps due to working late or traveling\u2014could be incorrectly marked as a security risk.<\/p>\n\n\n\n<p>To avoid such bias, policies should be designed to assess security risks based on a user\u2019s actual behavior and risk profile, rather than making assumptions based on factors like location or device. Additionally, clear communication regarding the criteria for access decisions, along with an accessible appeals process, is essential for maintaining fairness. This ensures users feel heard and helps preserve trust in the system.<\/p>\n\n\n\n<p>Creating a security-aware culture starts with comprehensive, ongoing training to ensure employees understand their critical role in access management and data protection. An informed workforce is more likely to follow best practices, reducing the risk of breaches and protecting both organizational assets and individual privacy.<\/p>\n\n\n\n<p>To help organizations align security practices that are essential for the successful implementation of a conditional access strategy, here\u2019s a <strong>7-Point Checklist for Implementing Human-Centric Conditional Access<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7-Point Checklist for Implementing Human-Centric Conditional Access<\/h2>\n\n\n\n<p>By adopting this streamlined checklist, organizations can successfully implement a human-centric conditional access strategy that enhances security while empowering employees to actively protect sensitive information.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Engage Stakeholders: <\/strong>Involve key departments in policy development and gather feedback through workshops.<\/li>\n\n\n\n<li><strong>Implement Analytics:<\/strong> Use behavioral monitoring tools to establish user behavior baselines and detect anomalies.<\/li>\n\n\n\n<li><strong>Establish Reporting Protocols: <\/strong>Create clear channels for reporting suspicious activities and ensure employee awareness.<\/li>\n\n\n\n<li><strong>Review and Adapt Policies: <\/strong>Regularly assess and update access policies based on user feedback and evolving threats.<\/li>\n\n\n\n<li><strong>Promote Security Awareness:<\/strong> Conduct training sessions and awareness campaigns, recognizing employees who practice good security.<\/li>\n\n\n\n<li><strong>Document Access Policies: <\/strong>Write clear, accessible policies and integrate training into onboarding and ongoing education.<\/li>\n\n\n\n<li><strong>Monitor Compliance: <\/strong>Set metrics for policy adherence and conduct regular audits to identify areas for improvement.<\/li>\n<\/ul>\n\n\n\n<p>Tracking regular updates will help ensure that this approach remains effective against the ever-evolving cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>As organizations prioritize the human factor in their conditional access strategies, they will be better equipped to navigate the evolving threat landscape, ultimately leading to a more secure and resilient digital future. Integrating the human element is essential for effective security in today\u2019s complex environment. Organizations can enhance their access management frameworks by understanding user behavior, developing user-centric policies, and fostering a culture of security awareness.<\/p>\n\n\n\n<p><a href=\"https:\/\/scalefusion.com\/products\/oneidp?utm_source=blog&amp;utm_medium=Empowering%20Teams%3A%20Human%20Factors%20in%20Conditional%20Access%20Management&amp;utm_campaign=Scalefusion%20Blog\" target=\"_blank\" rel=\"noopener\" title=\"\">OneIDP<\/a> can empower your organization by streamlining identity management with comprehensive capabilities, including Single Sign-On (SSO), multi-factor authentication (MFA), and seamless integration with existing systems. This holistic approach not only strengthens security but also enables users to confidently access the resources they need while protecting sensitive information. Discover how OneIDP can transform your access management strategy today!<\/p>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5768c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c5768c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e987c36\" data-id=\"e987c36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b3a92 elementor-widget elementor-widget-shortcode\" data-id=\"73b3a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"82231\" class=\"elementor elementor-82231\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Scalefusion<br \/><\/strong>Scalefusion&#8217;s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Organizations face unprecedented challenges as cyber th [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1280,1273,61],"tags":[1283,1272],"class_list":["post-99821","post","type-post","status-publish","format-standard","hentry","category-scalefusion","category-1273","category-press-release","tag-scalefusion","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Conditional Access Unplugged: Tapping into the Power of Human Experience - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM,%20MDM,%20IAM%20|%20Product%20Updates,%20SaaS%20|%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conditional Access Unplugged: Tapping into the Power of Human Experience - Version 2\" \/>\n<meta property=\"og:description\" content=\"Organizations face unprecedented challenges as cyber th [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&amp;utm_medium=UEM, MDM, IAM | Product Updates, SaaS | Scalefusion Blog&amp;utm_campaign=Scalefusion Blog\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-15T07:32:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Conditional Access Unplugged: Tapping into the Power of Human Experience\",\"datePublished\":\"2024-12-15T07:32:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\\\/\"},\"wordCount\":1457,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scalefusion.com\\\/wp-content\\\/uploads\\\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png\",\"keywords\":[\"Scalefusion\",\"2024\"],\"articleSection\":[\"Scalefusion\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\\\/\",\"url\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog\",\"name\":\"Conditional Access Unplugged: Tapping into the Power of Human Experience - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.scalefusion.com\\\/wp-content\\\/uploads\\\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png\",\"datePublished\":\"2024-12-15T07:32:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage\",\"url\":\"https:\\\/\\\/blog.scalefusion.com\\\/wp-content\\\/uploads\\\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png\",\"contentUrl\":\"https:\\\/\\\/blog.scalefusion.com\\\/wp-content\\\/uploads\\\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scalefusion.com\\\/conditional-access-unplugged\\\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Conditional Access Unplugged: Tapping into the Power of Human Experience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Conditional Access Unplugged: Tapping into the Power of Human Experience - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM, MDM, IAM | Product Updates, SaaS | Scalefusion Blog&utm_campaign=Scalefusion Blog","og_locale":"en_US","og_type":"article","og_title":"Conditional Access Unplugged: Tapping into the Power of Human Experience - Version 2","og_description":"Organizations face unprecedented challenges as cyber th [&hellip;]","og_url":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM, MDM, IAM | Product Updates, SaaS | Scalefusion Blog&utm_campaign=Scalefusion Blog","og_site_name":"Version 2","article_published_time":"2024-12-15T07:32:32+00:00","og_image":[{"url":"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/12\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Conditional Access Unplugged: Tapping into the Power of Human Experience","datePublished":"2024-12-15T07:32:32+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/12\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\/"},"wordCount":1457,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage"},"thumbnailUrl":"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png","keywords":["Scalefusion","2024"],"articleSection":["Scalefusion","2024","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/12\/conditional-access-unplugged-tapping-into-the-power-of-human-experience\/","url":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog","name":"Conditional Access Unplugged: Tapping into the Power of Human Experience - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage"},"image":{"@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage"},"thumbnailUrl":"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png","datePublished":"2024-12-15T07:32:32+00:00","breadcrumb":{"@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#primaryimage","url":"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png","contentUrl":"https:\/\/blog.scalefusion.com\/wp-content\/uploads\/Beyond-Technology_-Understanding-Human-Impact-in-Conditional-Access_1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scalefusion.com\/conditional-access-unplugged\/?utm_source=blog&utm_medium=UEM%2c%20MDM%2c%20IAM%20%7c%20Product%20Updates%2c%20SaaS%20%7c%20Scalefusion%20Blog&utm_campaign=Scalefusion%20Blog#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Conditional Access Unplugged: Tapping into the Power of Human Experience"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-pY1","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=99821"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99821\/revisions"}],"predecessor-version":[{"id":99828,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/99821\/revisions\/99828"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=99821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=99821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=99821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}