{"id":40909,"date":"2023-06-29T06:32:16","date_gmt":"2023-06-29T06:32:16","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=40909"},"modified":"2024-06-25T10:33:03","modified_gmt":"2024-06-25T10:33:03","slug":"dos-and-donts-about-email-security-part-2","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/dos-and-donts-about-email-security-part-2","title":{"rendered":"Dos and Don\u2019ts about Email Security \u2013 Part 2"},"content":{"rendered":"","protected":false},"author":885,"featured_media":40912,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[3607,4459],"user_email":"maulikj@cloudthat.com","published_by":"324","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/40909"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/885"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=40909"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/40909\/revisions"}],"predecessor-version":[{"id":40914,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/40909\/revisions\/40914"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/40912"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=40909"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=40909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}