{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/univista.com\/blog\/#Blog","headline":"Blog","description":"Your Source for Technology Success","url":"https:\/\/univista.com\/blog\/","blogPost":[{"@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/deploying-multi-factor-authentication-in-microsoft-365\/","headline":"Deploying Multi-Factor Authentication in Microsoft 365","url":"https:\/\/univista.com\/posts\/deploying-multi-factor-authentication-in-microsoft-365\/","datePublished":"2022-01-03","dateModified":"2022-01-03","mainEntityOfPage":"https:\/\/univista.com\/posts\/deploying-multi-factor-authentication-in-microsoft-365\/","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/kasha-ford\/#Person","name":"Kasha Ford","url":"https:\/\/univista.com\/posts\/author\/kasha-ford\/","identifier":10,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"181","width":"431"},"wordCount":649,"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/","headline":"Multi-factor Authentication-What it is and why it\u2019s an integral part of a Cybersecurity Protocol.","url":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/","datePublished":"2021-12-07","dateModified":"2021-12-07","mainEntityOfPage":"https:\/\/univista.com\/posts\/multi-factor-authentication-what-it-is-and-why-its-an-integral-part-of-a-cybersecurity-protocol\/","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/kasha-ford\/#Person","name":"Kasha Ford","url":"https:\/\/univista.com\/posts\/author\/kasha-ford\/","identifier":10,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"163","width":"388"},"wordCount":517,"keywords":null}]}