Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":69231,"date":"2024-10-01T18:50:23","date_gmt":"2024-10-01T18:50:23","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/"},"modified":"2024-10-01T18:50:23","modified_gmt":"2024-10-01T18:50:23","slug":"zscaler-deception-itdr-the-network-security-standoff-steven-hajny","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/","title":{"rendered":"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny"},"content":{"rendered":"

You\u2019ve seen the meme. Three identical characters pointing at each other, confused about which is the real one while some supervillain watches in frustration. Now, imagine those characters are your healthcare network\u2019s users, applications, and systems. The frustrated supervillain? That\u2019s your attacker, trying to figure out who the real target is. This perfectly describes how Zscaler Deception and Identity Threat Detection and Response (ITDR) work to confuse, delay, and ultimately defeat cyber attackers.<\/p>\n

The Setup: What Is Zscaler Deception?Imagine you’re managing a healthcare security operations center (SOC). It\u2019s quiet (too quiet\u2026), and suddenly you notice an attacker probing your network. Normally, you\u2019d go into panic mode, racing to secure everything. But what if, instead of reacting, you could actively confuse the attacker before they even get close to something critical?<\/p>\n

Zscaler Deception is designed to do exactly that. It sets up traps\u2014decoy systems, fake credentials, and honeypots\u2014across your network, all of which look real to an attacker. It\u2019s like having multiple identical-looking systems standing in a lineup. The attacker can\u2019t tell what\u2019s genuine and what\u2019s bait. So, they start poking around, chasing after fake systems while your SOC calmly observes, collects data, and prepares to shut them down.<\/p>\n

As the attacker keeps guessing, they\u2019re essentially wandering in circles, pointing fingers at the decoy systems, wasting time while your team silently gathers valuable intelligence. Meanwhile, the actual network stays protected and untouched.<\/p>\n

How Deception Works in Healthcare NetworksZscaler Deception creates a fake environment filled with decoy credentials and systems that trick attackers into revealing their strategies. Imagine your hospital\u2019s network is like a big, bustling ER. But instead of real patient rooms, the attacker finds themselves in fake, empty rooms that lead nowhere.<\/p>\n

Here\u2019s how it plays out:<\/p>\n

Fake credentials and honeytokens: Attackers grab these thinking they\u2019ve found the jackpot. They try to use them, but all they do is trigger alarms that alert your SOC to their activities.
\n Decoy servers: These look like real, critical systems, but they serve no purpose other than to attract bad actors. It\u2019s like walking into a room full of beds and monitors that aren\u2019t connected to anything.
\n Early detection: By interacting with decoy systems, attackers tip their hand early, letting your team jump into action before they can get close to actual patient data or systems.<\/p>\n

Essentially, Zscaler Deception turns your network into a maze of traps, where the attacker keeps running into fake systems, all the while revealing more and more about their tactics. It\u2019s a classic case of misdirection\u2014the attacker thinks they\u2019re advancing, but they\u2019re only falling deeper into a web of deception.<\/p>\n

ITDR: Constant Active Directory VigilanceSo, what happens when an attacker ignores the decoys and heads straight for your Active Directory (AD)\u2014the beating heart of your healthcare network? That\u2019s where Zscaler Identity Threat Detection and Response (ITDR) steps in.<\/p>\n

AD is critical in healthcare environments. It manages user access to everything from electronic medical records (EMRs) to the Wi-Fi in patient rooms. Hackers know this and target it relentlessly. If they can compromise AD, they can control access to sensitive data and applications.<\/p>\n

ITDR acts as a 24\/7 bodyguard, continuously monitoring AD for any signs of tampering or abnormal behavior. Like a motion sensor, ITDR can spot:<\/p>\n

Unusual login attempts
\nChanges to privileged accounts
\nSuspicious access attempts to critical systems
\nUnexplained modifications to group policies<\/p>\n

Crucially, ITDR doesn\u2019t wait for something bad to happen. It\u2019s proactive, catching any suspicious AD activity before it turns into a major breach. It\u2019s like having an extra layer of defense, always ready to stop an intruder before they get near the critical parts of your network.<\/p>\n

How ITDR Protects HealthcareIn healthcare, Active Directory is often the gatekeeper to patient records, clinical systems, and staff information. An attacker who compromises AD could gain control of the entire network. ITDR is constantly scanning, ready to catch anyone trying to tamper with the access controls or privileged accounts. If something doesn\u2019t look right, your SOC gets an immediate alert, and your team can take action before any damage is done.<\/p>\n

Suppose an attacker tries to sneak into AD, thinking they\u2019ve found a vulnerable back door. ITDR spots the unusual activity, shuts it down, and alerts your team. The hacker never even gets a chance to mess with your system, much less compromise patient data.<\/p>\n

The Benefits: Confusion, Control, and ConfidenceIn healthcare, downtime or data breaches can have catastrophic consequences. With Zscaler Deception and ITDR working together, you\u2019re not just reacting to threats\u2014you\u2019re playing offense. By the time an attacker realizes they\u2019re in a decoy network or that their attempt to breach AD has been detected, it\u2019s too late for them.<\/p>\n

Here\u2019s what you gain:<\/p>\n

Misdirection: Deception makes attackers waste time and resources chasing false leads, while you stay two steps ahead.
\nEarly detection: Attackers are caught early in the process, well before they can compromise critical data.
\nContinuous vigilance: ITDR watches over AD 24\/7, so nothing slips through the cracks.
\nOperational efficiency: Both solutions automate much of the detection and response process, allowing your SOC team to focus on more strategic initiatives.<\/p>\n

Final Thought: Outsmart the AttackerNext time you think about your healthcare network security, picture that meme. Zscaler Deception and ITDR create a network where every attacker is left confused, pointing fingers, trying to figure out which system is real. Meanwhile, your actual network is secure, and your SOC has everything under control.<\/p>\n

And the attackers? They\u2019re stuck in a loop, pointing at each other while your healthcare network remains untouched.<\/p>\n

For more information about how Zscaler is helping secure, simplify and transform healthcare organizations, visit our healthcare page.\u00a0\u00a0<\/p>\n

\u200b[#item_full_content]\u00a0[[{“value”:”You\u2019ve seen the meme. Three identical characters pointing at each other, confused about which is the real one while some supervillain watches in frustration. Now, imagine those characters are your healthcare network\u2019s users, applications, and systems. The frustrated supervillain? That\u2019s your attacker, trying to figure out who the real target is. This perfectly describes how Zscaler Deception and Identity Threat Detection and Response (ITDR) work to confuse, delay, and ultimately defeat cyber attackers.<\/p>\n

The Setup: What Is Zscaler Deception?Imagine you’re managing a healthcare security operations center (SOC). It\u2019s quiet (too quiet\u2026), and suddenly you notice an attacker probing your network. Normally, you\u2019d go into panic mode, racing to secure everything. But what if, instead of reacting, you could actively confuse the attacker before they even get close to something critical?<\/p>\n

Zscaler Deception is designed to do exactly that. It sets up traps\u2014decoy systems, fake credentials, and honeypots\u2014across your network, all of which look real to an attacker. It\u2019s like having multiple identical-looking systems standing in a lineup. The attacker can\u2019t tell what\u2019s genuine and what\u2019s bait. So, they start poking around, chasing after fake systems while your SOC calmly observes, collects data, and prepares to shut them down.<\/p>\n

As the attacker keeps guessing, they\u2019re essentially wandering in circles, pointing fingers at the decoy systems, wasting time while your team silently gathers valuable intelligence. Meanwhile, the actual network stays protected and untouched.<\/p>\n

How Deception Works in Healthcare NetworksZscaler Deception creates a fake environment filled with decoy credentials and systems that trick attackers into revealing their strategies. Imagine your hospital\u2019s network is like a big, bustling ER. But instead of real patient rooms, the attacker finds themselves in fake, empty rooms that lead nowhere.<\/p>\n

Here\u2019s how it plays out:<\/p>\n

Fake credentials and honeytokens: Attackers grab these thinking they\u2019ve found the jackpot. They try to use them, but all they do is trigger alarms that alert your SOC to their activities.
\n Decoy servers: These look like real, critical systems, but they serve no purpose other than to attract bad actors. It\u2019s like walking into a room full of beds and monitors that aren\u2019t connected to anything.
\n Early detection: By interacting with decoy systems, attackers tip their hand early, letting your team jump into action before they can get close to actual patient data or systems.<\/p>\n

Essentially, Zscaler Deception turns your network into a maze of traps, where the attacker keeps running into fake systems, all the while revealing more and more about their tactics. It\u2019s a classic case of misdirection\u2014the attacker thinks they\u2019re advancing, but they\u2019re only falling deeper into a web of deception.<\/p>\n

ITDR: Constant Active Directory VigilanceSo, what happens when an attacker ignores the decoys and heads straight for your Active Directory (AD)\u2014the beating heart of your healthcare network? That\u2019s where Zscaler Identity Threat Detection and Response (ITDR) steps in.<\/p>\n

AD is critical in healthcare environments. It manages user access to everything from electronic medical records (EMRs) to the Wi-Fi in patient rooms. Hackers know this and target it relentlessly. If they can compromise AD, they can control access to sensitive data and applications.<\/p>\n

ITDR acts as a 24\/7 bodyguard, continuously monitoring AD for any signs of tampering or abnormal behavior. Like a motion sensor, ITDR can spot:<\/p>\n

Unusual login attempts
\nChanges to privileged accounts
\nSuspicious access attempts to critical systems
\nUnexplained modifications to group policies<\/p>\n

Crucially, ITDR doesn\u2019t wait for something bad to happen. It\u2019s proactive, catching any suspicious AD activity before it turns into a major breach. It\u2019s like having an extra layer of defense, always ready to stop an intruder before they get near the critical parts of your network.<\/p>\n

How ITDR Protects HealthcareIn healthcare, Active Directory is often the gatekeeper to patient records, clinical systems, and staff information. An attacker who compromises AD could gain control of the entire network. ITDR is constantly scanning, ready to catch anyone trying to tamper with the access controls or privileged accounts. If something doesn\u2019t look right, your SOC gets an immediate alert, and your team can take action before any damage is done.<\/p>\n

Suppose an attacker tries to sneak into AD, thinking they\u2019ve found a vulnerable back door. ITDR spots the unusual activity, shuts it down, and alerts your team. The hacker never even gets a chance to mess with your system, much less compromise patient data.<\/p>\n

The Benefits: Confusion, Control, and ConfidenceIn healthcare, downtime or data breaches can have catastrophic consequences. With Zscaler Deception and ITDR working together, you\u2019re not just reacting to threats\u2014you\u2019re playing offense. By the time an attacker realizes they\u2019re in a decoy network or that their attempt to breach AD has been detected, it\u2019s too late for them.<\/p>\n

Here\u2019s what you gain:<\/p>\n

Misdirection: Deception makes attackers waste time and resources chasing false leads, while you stay two steps ahead.
\nEarly detection: Attackers are caught early in the process, well before they can compromise critical data.
\nContinuous vigilance: ITDR watches over AD 24\/7, so nothing slips through the cracks.
\nOperational efficiency: Both solutions automate much of the detection and response process, allowing your SOC team to focus on more strategic initiatives.<\/p>\n

Final Thought: Outsmart the AttackerNext time you think about your healthcare network security, picture that meme. Zscaler Deception and ITDR create a network where every attacker is left confused, pointing fingers, trying to figure out which system is real. Meanwhile, your actual network is secure, and your SOC has everything under control.<\/p>\n

And the attackers? They\u2019re stuck in a loop, pointing at each other while your healthcare network remains untouched.<\/p>\n

For more information about how Zscaler is helping secure, simplify and transform healthcare organizations, visit our healthcare page.”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

You\u2019ve seen the meme. Three identical characters pointing at each […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-69231","post","type-post","status-publish","format-standard","hentry","category-zenith-zscaler"],"yoast_head":"\nZscaler Deception & ITDR: The Network Security Standoff Steven Hajny - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny\" \/>\n<meta property=\"og:description\" content=\"You\u2019ve seen the meme. Three identical characters pointing at each […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-01T18:50:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny\",\"datePublished\":\"2024-10-01T18:50:23+00:00\",\"dateModified\":\"2024-10-01T18:50:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\"},\"wordCount\":1950,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\",\"name\":\"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"datePublished\":\"2024-10-01T18:50:23+00:00\",\"dateModified\":\"2024-10-01T18:50:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/","og_locale":"en_US","og_type":"article","og_title":"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny","og_description":"You\u2019ve seen the meme. Three identical characters pointing at each […]","og_url":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/","og_site_name":"JHC","article_published_time":"2024-10-01T18:50:23+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/"},"author":{"name":"","@id":""},"headline":"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny","datePublished":"2024-10-01T18:50:23+00:00","dateModified":"2024-10-01T18:50:23+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/"},"wordCount":1950,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/","url":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/","name":"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"datePublished":"2024-10-01T18:50:23+00:00","dateModified":"2024-10-01T18:50:23+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/zscaler-deception-itdr-the-network-security-standoff-steven-hajny\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Zscaler Deception & ITDR: The Network Security Standoff Steven Hajny"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/69231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=69231"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/69231\/revisions"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=69231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=69231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=69231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}