{"id":945,"date":"2025-05-10T10:59:29","date_gmt":"2025-05-10T15:59:29","guid":{"rendered":"https:\/\/stagefoursecurity.com\/blog\/?p=945"},"modified":"2025-05-10T11:02:48","modified_gmt":"2025-05-10T16:02:48","slug":"doors-go-digital-access-control","status":"publish","type":"post","link":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/","title":{"rendered":"Doors Go Digital Access Control"},"content":{"rendered":"<article>\n<header>\n<h1>\ud83d\udd0c When Doors Go Digital: Cyber Risk in Physical Access Control<\/h1>\n<p><em>By James K. Bishop, vCISO | Founder, <a href=\"https:\/\/stagefoursecurity.com\" target=\"_blank\" rel=\"noopener\">Stage Four Security<\/a><\/em><\/p>\n<\/header>\n<section>\n<h2>\ud83d\udd13 From Locks and Keys to Credentials and Clouds<\/h2>\n<p><a href=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-976\" src=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-300x200.png\" alt=\"\" width=\"401\" height=\"267\" srcset=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-300x200.png 300w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-1024x683.png 1024w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-768x512.png 768w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png 1536w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/><\/a>This post explores the cyber risks created by modern PACS deployments and how Zero Trust principles help prevent physical systems from becoming digital liabilities.<\/p>\n<\/section>\n<section>\n<h2>\ud83e\udde0 Why Attackers Target Physical Access Systems<\/h2>\n<ul>\n<li><strong>Badge cloning:<\/strong> Tools like Proxmark3 or Flipper Zero can clone legacy 125kHz RFID cards in seconds.<\/li>\n<li><strong>Credential relay:<\/strong> Using mobile relays, attackers capture NFC signals and replay them from a different location.<\/li>\n<li><strong>Controller exposure:<\/strong> Many PACS panels are on flat networks or exposed to the internet with default credentials.<\/li>\n<li><strong>Cloud misconfigurations:<\/strong> Cloud-based access control platforms often lack MFA or role-based admin separation.<\/li>\n<\/ul>\n<p>Compromise here isn\u2019t theoretical\u2014it\u2019s happening. Once inside, attackers can move laterally, access sensitive systems, or even disable alarms and surveillance.<\/p>\n<\/section>\n<section>\n<h2>\ud83d\udee0\ufe0f Real-World Case Study<\/h2>\n<p>In a 2023 breach, a retail chain experienced a physical intrusion after attackers accessed the cloud admin portal of its access control vendor using stolen credentials (no MFA). From there, they unlocked rear doors at multiple locations remotely\u2014timing the intrusion with unmonitored hours.<\/p>\n<p>This attack required no technical compromise of the physical devices\u2014only abuse of poor identity and access hygiene in the cloud admin tier.<\/p>\n<\/section>\n<section>\n<h2>\ud83e\uddf1 Applying Zero Trust to Access Control<\/h2>\n<p>Zero Trust isn\u2019t just for networks\u2014it applies to buildings too. Here\u2019s how:<\/p>\n<ul>\n<li><strong>Strong identity:<\/strong> Use modern credentials like encrypted badges, mobile tokens with biometric unlock, or FIDO2 for admin access.<\/li>\n<li><strong>Least privilege:<\/strong> Grant physical access by role, time, and zone\u2014just like you would with digital access.<\/li>\n<li><strong>Context-aware access:<\/strong> Require MFA or re-authentication for high-risk actions like remote unlocking.<\/li>\n<li><strong>Segmentation:<\/strong> Isolate PACS panels on separate VLANs or OT networks. Never expose them to the public internet.<\/li>\n<li><strong>Logging &amp; monitoring:<\/strong> Treat badge use like a login event. Monitor access attempts, alert on anomalies, and retain logs.<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2>\u26a0\ufe0f Common Pitfalls to Avoid<\/h2>\n<ul>\n<li>Using legacy unencrypted RFID cards (e.g., HID Prox)<\/li>\n<li>Relying on shared admin credentials with no audit trail<\/li>\n<li>Exposing access panels to public IPs \u201cfor convenience\u201d<\/li>\n<li>Skipping firmware updates due to vendor dependency<\/li>\n<\/ul>\n<p>Modern physical systems must be treated as cyber assets. If it connects, it\u2019s a target.<\/p>\n<\/section>\n<section>\n<h2>\ud83d\udce3 Final Thought<\/h2>\n<p>The door is no longer just a physical boundary\u2014it\u2019s part of your digital threat surface. A modern attacker doesn\u2019t pick locks\u2014they pick credentials and cloud consoles.<\/p>\n<p><strong>Want help evaluating the security posture of your access control systems?<\/strong> <a href=\"https:\/\/stagefoursecurity.com\/blog\/partner-with-stage-four-security\/\" target=\"_blank\" rel=\"noopener\">Let\u2019s talk<\/a>.<\/p>\n<\/section>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd0c When Doors Go Digital: Cyber Risk in Physical Access Control By James K. Bishop, vCISO | Founder, Stage Four [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-945","post","type-post","status-publish","format-standard","hentry","category-physical-security-meets-cyber"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Doors Go Digital Access Control - Stage Four Security Blog<\/title>\n<meta name=\"description\" content=\"Explore how modern access control systems\u2014like smart locks and badge readers\u2014can be exploited by attackers, and how to secure them using Zero Trust principles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Doors Go Digital Access Control - Stage Four Security Blog\" \/>\n<meta property=\"og:description\" content=\"Explore how modern access control systems\u2014like smart locks and badge readers\u2014can be exploited by attackers, and how to secure them using Zero Trust principles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Stage Four Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-10T15:59:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-10T16:02:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"stagefoursec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stagefoursec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\"},\"author\":{\"name\":\"stagefoursec\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde\"},\"headline\":\"Doors Go Digital Access Control\",\"datePublished\":\"2025-05-10T15:59:29+00:00\",\"dateModified\":\"2025-05-10T16:02:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\"},\"wordCount\":419,\"publisher\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-300x200.png\",\"articleSection\":[\"Physical Security Meets Cyber\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\",\"name\":\"Doors Go Digital Access Control - Stage Four Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-300x200.png\",\"datePublished\":\"2025-05-10T15:59:29+00:00\",\"dateModified\":\"2025-05-10T16:02:48+00:00\",\"description\":\"Explore how modern access control systems\u2014like smart locks and badge readers\u2014can be exploited by attackers, and how to secure them using Zero Trust principles.\",\"breadcrumb\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png\",\"contentUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stagefoursecurity.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Doors Go Digital Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#website\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/\",\"name\":\"Stage Four Security Blog\",\"description\":\"Protecting today, fortifying tomorrow\",\"publisher\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stagefoursecurity.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\",\"name\":\"Stage Four Security Blog\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png\",\"contentUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png\",\"width\":1000,\"height\":150,\"caption\":\"Stage Four Security Blog\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde\",\"name\":\"stagefoursec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g\",\"caption\":\"stagefoursec\"},\"sameAs\":[\"https:\/\/stagefoursecurity.com\/blog\"],\"url\":\"https:\/\/stagefoursecurity.com\/blog\/author\/admin_w171pcka\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Doors Go Digital Access Control - Stage Four Security Blog","description":"Explore how modern access control systems\u2014like smart locks and badge readers\u2014can be exploited by attackers, and how to secure them using Zero Trust principles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Doors Go Digital Access Control - Stage Four Security Blog","og_description":"Explore how modern access control systems\u2014like smart locks and badge readers\u2014can be exploited by attackers, and how to secure them using Zero Trust principles.","og_url":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/","og_site_name":"Stage Four Security Blog","article_published_time":"2025-05-10T15:59:29+00:00","article_modified_time":"2025-05-10T16:02:48+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png","type":"image\/png"}],"author":"stagefoursec","twitter_card":"summary_large_image","twitter_image":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png","twitter_misc":{"Written by":"stagefoursec","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#article","isPartOf":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/"},"author":{"name":"stagefoursec","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde"},"headline":"Doors Go Digital Access Control","datePublished":"2025-05-10T15:59:29+00:00","dateModified":"2025-05-10T16:02:48+00:00","mainEntityOfPage":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/"},"wordCount":419,"publisher":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#organization"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-300x200.png","articleSection":["Physical Security Meets Cyber"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/","url":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/","name":"Doors Go Digital Access Control - Stage Four Security Blog","isPartOf":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors-300x200.png","datePublished":"2025-05-10T15:59:29+00:00","dateModified":"2025-05-10T16:02:48+00:00","description":"Explore how modern access control systems\u2014like smart locks and badge readers\u2014can be exploited by attackers, and how to secure them using Zero Trust principles.","breadcrumb":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#primaryimage","url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png","contentUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Physical-Security-Doors.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/10\/doors-go-digital-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stagefoursecurity.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Doors Go Digital Access Control"}]},{"@type":"WebSite","@id":"https:\/\/stagefoursecurity.com\/blog\/#website","url":"https:\/\/stagefoursecurity.com\/blog\/","name":"Stage Four Security Blog","description":"Protecting today, fortifying tomorrow","publisher":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stagefoursecurity.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/stagefoursecurity.com\/blog\/#organization","name":"Stage Four Security Blog","url":"https:\/\/stagefoursecurity.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png","contentUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png","width":1000,"height":150,"caption":"Stage Four Security Blog"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde","name":"stagefoursec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g","caption":"stagefoursec"},"sameAs":["https:\/\/stagefoursecurity.com\/blog"],"url":"https:\/\/stagefoursecurity.com\/blog\/author\/admin_w171pcka\/"}]}},"_links":{"self":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=945"}],"version-history":[{"count":3,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/945\/revisions"}],"predecessor-version":[{"id":983,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/945\/revisions\/983"}],"wp:attachment":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}