{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/univista.com\/blog\/#Blog","headline":"Blog","description":"Your Source for Technology Success","url":"https:\/\/univista.com\/blog\/","blogPost":[{"@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/","headline":"The Ping: State of CyberSecurity","url":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/","datePublished":"2019-06-14","dateModified":"2019-06-14","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/06\/Hacker.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/06\/Hacker.jpg","height":1280,"width":1920},"wordCount":195,"keywords":["cybersecurity","data breaches","disaster recovery","end of life","hackers","malware","microsoft","Risk","Security","updates","upgrades"]},{"@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/","headline":"The Ping: CyberSecurity and EOL","url":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/","datePublished":"2019-06-07","dateModified":"2019-07-15","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-cybersecurity-and-eol\/","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"126","width":"300"},"wordCount":190,"keywords":["compliance","end of life","hackers","malware","Security","updates","upgrade","upgrades","Virus"]}]}