{"id":10058,"date":"2024-02-19T06:55:50","date_gmt":"2024-02-19T06:55:50","guid":{"rendered":"https:\/\/carecomputers.co.uk\/?p=10058"},"modified":"2025-01-29T11:26:35","modified_gmt":"2025-01-29T11:26:35","slug":"top-5-security-considerations-when-migrating-to-the-cloud","status":"publish","type":"post","link":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/","title":{"rendered":"Top 5 Security Considerations when Migrating to the Cloud"},"content":{"rendered":"<p>As with the physical locks and security implementations to your business, your IT security is incredibly vital and needs to be considered in any part of your organisation \u2014 especially when moving to the cloud.<\/p>\n<p>After all, whilst the cloud hosts a bunch of benefits for any forward-thinking company, you\u2019ll still need to consider the security implications of making the jump.<\/p>\n<p>In this article, we\u2019re going to go over five considerations that you should make when migrating your IT systems to the cloud, all of which will help you reinforce your organisation\u2019s security and help keep your data safe.<\/p>\n<h2>Security Consideration 1: Data Encryption<\/h2>\n<p>Data encryption is a security process where data is cyphered when transferred in the web, jumbling it into an assortment of letters, numbers, and characters that can\u2019t be read without a decryption key.<\/p>\n<p>Encryption is built into every single aspect of modern technology \u2014 from browsers and mobile applications protected by HTTPS and passwords and data being stored in an encrypted manner to stop any attackers from intercepting data packets and getting a host of possibly destructive data.<\/p>\n<p>Your data is one of your most valuable assets, and encrypting it is the last bastion of defence to ensure that even if anyone does gain access to it, the information cannot be deciphered. After all, this could spell disaster for your whole organisation \u2014 and you do not want to risk it.<\/p>\n<p>By using a modern encryption system, nobody without the encryption key will be able to access said data, meaning that it essentially becomes unusable even in the event of a breach or attack. This means that in the worst case, you won\u2019t end up in a situation where your most sensitive data is leaked or utilised to harm you or your customers.<\/p>\n<h2>Security Consideration 2: Access Control<\/h2>\n<p>Much like any modern business that uses lanyards and keys to stop unauthorised access to your organisation, access control tools protect your organisation from anyone trying to use your IT systems and access data without the proper authorisation.<\/p>\n<p>Firstly, it\u2019s important to make sure that employees and stakeholders only have access to the files and applications they need. This is known as the principle of least privilege and will ensure that everyone only has access to the data that they need \u2014 to prevent any internal or external access to unauthorised data. It\u2019s all to common for businesses to give all employees blanket access to the entire organisation\u2019s files. This increases the risk of an insider attack, where someone who has genuine access to your systems may leak or tamper with data.<\/p>\n<p>Access control can help mitigate other attacks such as social engineering or phishing. By utilising access control tools (along with multi-factor authentication), you can limit the damage an attacker may be able to inflict if get access to someone\u2019s user account.<\/p>\n<h2>Security Consideration 3: Compliance<\/h2>\n<p>Compliance is essential in the modern world, with regulators cracking down on businesses that flaunt compliance rules. With this, ensuring that you stay compliant and that you have no reason for regulators to take action against you is important.<\/p>\n<p>However, compliance also offers an opportunity for you to secure your organisation effectively. Part of the reason that compliance regulations exist is because they essentially enforce the standards that your organisation needs to meet, for the benefit of your customers, community, and those employed within your organisation.<\/p>\n<p>By following compliance regulations, you\u2019ll be able to ensure that your organisation is secure and you\u2019re not letting any aspect of your business down.<\/p>\n<h2>Security Consideration 4: Backup and Recovery<\/h2>\n<p>In the event of a disaster, the procedure for what happens next is just as important as the preventative measures in place to stop said disaster. After all, sometimes things just slip under the cracks or new attacks that haven\u2019t been prepared yet happen \u2014 and you need to be prepared.<\/p>\n<p>Backups and disaster recovery plans will help you ensure that you can get your business back up and running in the event of a disaster. Both of these are vital, as backups ensure that you can have alternative access to your critical data in the event of it not being accessible through a disaster, and a disaster recovery plan will make sure that you have a path forward back to full functionality.<\/p>\n<h2>Security Consideration 5: Monitoring<\/h2>\n<p>Monitoring is important to ensure that you\u2019re keeping an eye on anything suspicious within your organisation.<\/p>\n<p>By keeping track of everything within your organisation and monitoring it effectively, you can have a holistic view of everything that is happening and stamp out any malicious activity before it can hurt you.<\/p>\n<p>Cloud platforms like Microsoft 365 have a bunch of <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/enterprise\/microsoft-365-monitoring?view=o365-worldwide\">monitoring tools <\/a>built in. This will let you stay ahead of any attackers and be prepared for any potential threats and actions that you may need to take.<\/p>\n<p>There are different types of monitoring and detection tools that can be used, such as continuous monitoring solutions and intrusion detection solutions, all of which will be able to alert you in the event of any malicious activity.<\/p>\n<p>Furthermore, the use of AI in these tools makes them even more effective at being able to monitor, analyse, and predict attacks before they even occur, and can truly protect your organisation against more powerful attacks that otherwise may fly under the radar to other detection methods.<\/p>\n<h2>Final Thoughts<\/h2>\n<p>Your organisation\u2019s security is incredibly important, and taking steps to ensure that your IT security implementation is solid will go a long way in protecting your organisation in the future.<\/p>\n<p>These steps are the five most important considerations for your organisation to make regarding security and are practically essential for any modern business.<\/p>\n<p>If you\u2019re looking to get started in improving your organisation\u2019s security but need a helping hand along the way, <a href=\"https:\/\/carecomputers.co.uk\/contact-care-computers\/\">contact us<\/a> today. Our experts will be able to guide you through the process and provide you with the support that your organisation needs.<\/p>\n<p><a href=\"https:\/\/carecomputers.co.uk\/contact-care-computers\/\"><img decoding=\"async\" class=\"alignnone wp-image-8515\" src=\"https:\/\/carecomputers.co.uk\/wp-content\/uploads\/2022\/01\/contact_us_green-300x89.png\" alt=\"Contact us button\" width=\"169\" height=\"50\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As with the physical locks and security implementations to your business, your IT security is incredibly vital and needs to be considered in any part of your organisation \u2014 especially when moving to the cloud. After all, whilst the cloud hosts a bunch of benefits for any forward-thinking company, you\u2019ll still need to consider the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":10496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-10058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 Security Considerations when Migrating to the Cloud - Care Computers<\/title>\n<meta name=\"description\" content=\"Care Computers Top 5 Security Considerations when Migrating to the Cloud - Care Computers\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Security Considerations when Migrating to the Cloud - Care Computers\" \/>\n<meta property=\"og:description\" content=\"Care Computers Top 5 Security Considerations when Migrating to the Cloud - Care Computers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Care Computers\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T06:55:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T11:26:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1703\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Spencer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Spencer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/\"},\"author\":{\"name\":\"Simon Spencer\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/person\\\/bfcdaddfd6c3617490c1f1693891b74e\"},\"headline\":\"Top 5 Security Considerations when Migrating to the Cloud\",\"datePublished\":\"2024-02-19T06:55:50+00:00\",\"dateModified\":\"2025-01-29T11:26:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/\"},\"wordCount\":1005,\"publisher\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg\",\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/\",\"name\":\"Top 5 Security Considerations when Migrating to the Cloud - Care Computers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg\",\"datePublished\":\"2024-02-19T06:55:50+00:00\",\"dateModified\":\"2025-01-29T11:26:35+00:00\",\"description\":\"Care Computers Top 5 Security Considerations when Migrating to the Cloud - Care Computers\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg\",\"width\":2560,\"height\":1703},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/top-5-security-considerations-when-migrating-to-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Security Considerations when Migrating to the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#website\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\",\"name\":\"Care Computers\",\"description\":\"Managed IT Support and Services Provider in Windsor, Berkshire\",\"publisher\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#organization\",\"name\":\"Care Computers\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/care-computers-logo.svg\",\"contentUrl\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/care-computers-logo.svg\",\"caption\":\"Care Computers\"},\"image\":{\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/#\\\/schema\\\/person\\\/bfcdaddfd6c3617490c1f1693891b74e\",\"name\":\"Simon Spencer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g\",\"caption\":\"Simon Spencer\"},\"url\":\"https:\\\/\\\/creativeideasfactory.co.uk\\\/carenew\\\/author\\\/simon-spencer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Security Considerations when Migrating to the Cloud - Care Computers","description":"Care Computers Top 5 Security Considerations when Migrating to the Cloud - Care Computers","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Top 5 Security Considerations when Migrating to the Cloud - Care Computers","og_description":"Care Computers Top 5 Security Considerations when Migrating to the Cloud - Care Computers","og_url":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/","og_site_name":"Care Computers","article_published_time":"2024-02-19T06:55:50+00:00","article_modified_time":"2025-01-29T11:26:35+00:00","og_image":[{"width":2560,"height":1703,"url":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg","type":"image\/jpeg"}],"author":"Simon Spencer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simon Spencer","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#article","isPartOf":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/"},"author":{"name":"Simon Spencer","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/person\/bfcdaddfd6c3617490c1f1693891b74e"},"headline":"Top 5 Security Considerations when Migrating to the Cloud","datePublished":"2024-02-19T06:55:50+00:00","dateModified":"2025-01-29T11:26:35+00:00","mainEntityOfPage":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/"},"wordCount":1005,"publisher":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg","articleSection":["Cloud"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/","name":"Top 5 Security Considerations when Migrating to the Cloud - Care Computers","isPartOf":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg","datePublished":"2024-02-19T06:55:50+00:00","dateModified":"2025-01-29T11:26:35+00:00","description":"Care Computers Top 5 Security Considerations when Migrating to the Cloud - Care Computers","breadcrumb":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#primaryimage","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg","contentUrl":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/Security-Considerations-when-Migrating-to-the-Cloud-scaled-1.jpg","width":2560,"height":1703},{"@type":"BreadcrumbList","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/top-5-security-considerations-when-migrating-to-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/creativeideasfactory.co.uk\/carenew\/"},{"@type":"ListItem","position":2,"name":"Top 5 Security Considerations when Migrating to the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#website","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/","name":"Care Computers","description":"Managed IT Support and Services Provider in Windsor, Berkshire","publisher":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/creativeideasfactory.co.uk\/carenew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#organization","name":"Care Computers","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/logo\/image\/","url":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/care-computers-logo.svg","contentUrl":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-content\/uploads\/2025\/01\/care-computers-logo.svg","caption":"Care Computers"},"image":{"@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/creativeideasfactory.co.uk\/carenew\/#\/schema\/person\/bfcdaddfd6c3617490c1f1693891b74e","name":"Simon Spencer","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93f3a12865826337de95458c27581b1d2b53bee5a81ad9c0aee757e53c4089f5?s=96&d=mm&r=g","caption":"Simon Spencer"},"url":"https:\/\/creativeideasfactory.co.uk\/carenew\/author\/simon-spencer\/"}]}},"_links":{"self":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/10058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/comments?post=10058"}],"version-history":[{"count":1,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/10058\/revisions"}],"predecessor-version":[{"id":10497,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/posts\/10058\/revisions\/10497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/media\/10496"}],"wp:attachment":[{"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/media?parent=10058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/categories?post=10058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/creativeideasfactory.co.uk\/carenew\/wp-json\/wp\/v2\/tags?post=10058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}