{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/univista.com\/blog\/#Blog","headline":"Blog","description":"Your Source for Technology Success","url":"https:\/\/univista.com\/blog\/","blogPost":[{"@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-back-to-school\/","headline":"The Ping: Back To School","url":"https:\/\/univista.com\/posts\/the-ping-back-to-school\/","datePublished":"2019-08-09","dateModified":"2019-08-09","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-back-to-school\/","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/08\/back-to-school-conceptual-cube-207658.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/08\/back-to-school-conceptual-cube-207658.jpg","height":457,"width":640},"wordCount":193,"keywords":["apple","cybersecurity","dell","microsoft","o365","office 365"]},{"@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-preparing-your-organization-for-compliance\/","headline":"The Ping: Preparing Your Organization for Compliance","url":"https:\/\/univista.com\/posts\/the-ping-preparing-your-organization-for-compliance\/","datePublished":"2019-07-30","dateModified":"2019-07-30","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-preparing-your-organization-for-compliance\/","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/07\/Rules.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/07\/Rules.jpg","height":426,"width":640},"wordCount":157,"keywords":["2fa","cjis","compliance","cybersecurity","hipaa","multi-factor authentication","Security","updates"]}]}