{"id":2589,"date":"2018-09-28T02:00:00","date_gmt":"2018-09-28T02:00:00","guid":{"rendered":"https:\/\/mpulse.cloud.fruitionqa.com\/what-need-know-cmms-software-security\/"},"modified":"2025-07-30T06:27:37","modified_gmt":"2025-07-30T06:27:37","slug":"what-need-know-cmms-software-security","status":"publish","type":"post","link":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/","title":{"rendered":"CMMS Software Security Must-Knows"},"content":{"rendered":"<p>CMMS data is an organizational asset, and it needs to be protected like any other asset. You don\u2019t hand the keys to your office over to just anyone\u2014and you don\u2019t want unauthorized access to your CMMS software either.<\/p>\n<p>As a maintenance professional, your goal should be to prevent unauthorized access, misuse, modification, unintended deletion, or malfunction of your data. Modern CMMS software can help you achieve that goal.<\/p>\n<p>Here\u2019s what you should know about CMMS software security.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-flat ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#Network_Security\" >Network Security<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#Single-Sign-On_SSO_Active_Directory_Integration_for_Cloud-Hosted_Customers\" >Single-Sign-On (SSO) \/ Active Directory Integration for Cloud-Hosted Customers<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#Access_Control\" >Access Control<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Network_Security\"><\/span>Network Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security starts with the network. If your <a href=\"https:\/\/www.mpulsesoftware.com\/management-maintenance\">CMMS software<\/a> is hosted internally, your IT team will be responsible for ensuring the security of your network.<\/p>\n<p>However, cloud-based CMMS software\u00a0runs on external servers. If you have cloud-based maintenance software\u2014or you\u2019re thinking about buying it\u2014be sure your <a href=\"https:\/\/www.mpulsesoftware.com\/maintenance-database\">CMMS data<\/a> is backed up and secured in a professionally managed environment.<\/p>\n<p>[related-content]<\/p>\n<p>MPulse provides a SSAE 16 Type II certified <a href=\"https:\/\/www.mpulsesoftware.com\/services\/application-hosting-service\">cloud hosting<\/a> and recovery service. Our goal is to offer solutions that combine certified production deployments with fully tested, disaster recovery services to provide the highest levels of availability, security, responsiveness, and recovery.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Single-Sign-On_SSO_Active_Directory_Integration_for_Cloud-Hosted_Customers\"><\/span>Single-Sign-On (SSO) \/ Active Directory Integration for Cloud-Hosted Customers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SAML SSO enables cloud-based CMMS software to integrate with security directories that determine who gets access to what computers, networks, applications, and services. SSO offers many advantages for organizations that want to streamline and control access to cloud-based software.<\/p>\n<p>For example, with our <a href=\"https:\/\/www.mpulsesoftware.com\/software\/sso\">SSO option<\/a>, MPulse users can log into their computers once and have immediate access to their hosted CMMS from MPulse.<\/p>\n<p>MPulse\u2019s SSO option extends an organization\u2019s internal Microsoft Active Directory to the MPulse cloud environment. This feature supports multiple identity providers (including Microsoft ADFS and Okta) as well as user self-provisioning and custom claims for populating user data.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Access_Control\"><\/span>Access Control<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Within your CMMS database, you\u2019ll want to protect sensitive information by limiting which records your employees see depending on their role in the organization. In other words, you want the right people to have the right access to the right records.<\/p>\n<p>MPulse Maintenance Software&#8217;s <a href=\"https:\/\/www.mpulsesoftware.com\/software\/role-based-access-control-rbac\">Role-Based Access Control<\/a> (RBAC)\u00a0was designed for this purpose\u2014enabling you to reduce errors in data entry, prevent unauthorized users from viewing or editing data, gain tighter control over data access, and eliminate the \u201cdata clutter\u201d of unnecessary information.<\/p>\n<p>Have questions about CMMS software security? We have answers. <a href=\"https:\/\/mpulsesoftware.com\/Contact\/\">Contact us<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CMMS data is an organizational asset, and it needs to be protected like any other asset. You don\u2019t hand the keys to your office over to just anyone\u2014and you don\u2019t want unauthorized access to your CMMS software either. As a maintenance professional, your goal should be to prevent unauthorized access, misuse, modification, unintended deletion, or malfunction of your data. Modern CMMS software can help you achieve that goal. Here\u2019s what you should know about CMMS software security. Network Security Security starts with the network. If your CMMS software is hosted internally, your IT team will be responsible for ensuring the security of your network. However, cloud-based CMMS software\u00a0runs on external servers. If you have cloud-based maintenance software\u2014or you\u2019re thinking about buying it\u2014be sure your CMMS data is backed up and secured in a professionally managed environment. [related-content] MPulse provides a SSAE 16 Type II certified cloud hosting and recovery service. Our goal is to offer solutions that combine certified production deployments with fully tested, disaster recovery services to provide the highest levels of availability, security, responsiveness, and recovery. Single-Sign-On (SSO) \/ Active Directory Integration for Cloud-Hosted Customers SAML SSO enables cloud-based CMMS software to integrate with security directories that determine who gets access to what computers, networks, applications, and services. SSO offers many advantages for organizations that want to streamline and control access to cloud-based software. For example, with our SSO option, MPulse users can log into their computers once and have immediate access to their hosted CMMS from MPulse. MPulse\u2019s SSO option extends an organization\u2019s internal Microsoft Active Directory to the MPulse cloud environment. This feature supports multiple identity providers (including Microsoft ADFS and Okta) as well as user self-provisioning and custom claims for populating user data. Access Control Within your CMMS database, you\u2019ll want to protect sensitive information by limiting which records your employees see depending on their role in the organization. In other words, you want the right people to have the right access to the right records. MPulse Maintenance Software&#8217;s Role-Based Access Control (RBAC)\u00a0was designed for this purpose\u2014enabling you to reduce errors in data entry, prevent unauthorized users from viewing or editing data, gain tighter control over data access, and eliminate the \u201cdata clutter\u201d of unnecessary information. Have questions about CMMS software security? We have answers. Contact us.<\/p>\n","protected":false},"author":6,"featured_media":2590,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[12],"tags":[],"class_list":["post-2589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cmms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CMMS Software Security Must-Knows | MPulse Software<\/title>\n<meta name=\"description\" content=\"Get insights into CMMS software security best practices to protect your maintenance data from unauthorized access and potential risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CMMS Software Security Must-Knows\" \/>\n<meta property=\"og:description\" content=\"Get insights into CMMS software security best practices to protect your maintenance data from unauthorized access and potential risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MPulse Software\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-28T02:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T06:27:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle Nicolson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle Nicolson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\"},\"author\":{\"name\":\"Michelle Nicolson\",\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd\"},\"headline\":\"CMMS Software Security Must-Knows\",\"datePublished\":\"2018-09-28T02:00:00+00:00\",\"dateModified\":\"2025-07-30T06:27:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\"},\"wordCount\":398,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg\",\"articleSection\":[\"CMMS\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\",\"url\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\",\"name\":\"CMMS Software Security Must-Knows | MPulse Software\",\"isPartOf\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg\",\"datePublished\":\"2018-09-28T02:00:00+00:00\",\"dateModified\":\"2025-07-30T06:27:37+00:00\",\"description\":\"Get insights into CMMS software security best practices to protect your maintenance data from unauthorized access and potential risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage\",\"url\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg\",\"contentUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg\",\"width\":1200,\"height\":900,\"caption\":\"What You Need to Know about CMMS Software Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mpulsesoftware.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CMMS\",\"item\":\"https:\/\/mpulsesoftware.com\/blog\/category\/cmms\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CMMS Software Security Must-Knows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mpulsesoftware.com\/#website\",\"url\":\"https:\/\/mpulsesoftware.com\/\",\"name\":\"MPulse Software\",\"description\":\"CMMS Software\",\"publisher\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mpulsesoftware.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mpulsesoftware.com\/#organization\",\"name\":\"MPulse Software\",\"url\":\"https:\/\/mpulsesoftware.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png\",\"contentUrl\":\"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png\",\"width\":315,\"height\":105,\"caption\":\"MPulse Software\"},\"image\":{\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd\",\"name\":\"Michelle Nicolson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g\",\"caption\":\"Michelle Nicolson\"},\"url\":\"https:\/\/mpulsesoftware.com\/blog\/author\/michelleblackcatcommunications-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CMMS Software Security Must-Knows | MPulse Software","description":"Get insights into CMMS software security best practices to protect your maintenance data from unauthorized access and potential risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/","og_locale":"en_US","og_type":"article","og_title":"CMMS Software Security Must-Knows","og_description":"Get insights into CMMS software security best practices to protect your maintenance data from unauthorized access and potential risks.","og_url":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/","og_site_name":"MPulse Software","article_published_time":"2018-09-28T02:00:00+00:00","article_modified_time":"2025-07-30T06:27:37+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg","type":"image\/jpeg"}],"author":"Michelle Nicolson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michelle Nicolson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#article","isPartOf":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/"},"author":{"name":"Michelle Nicolson","@id":"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd"},"headline":"CMMS Software Security Must-Knows","datePublished":"2018-09-28T02:00:00+00:00","dateModified":"2025-07-30T06:27:37+00:00","mainEntityOfPage":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/"},"wordCount":398,"commentCount":0,"publisher":{"@id":"https:\/\/mpulsesoftware.com\/#organization"},"image":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg","articleSection":["CMMS"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/","url":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/","name":"CMMS Software Security Must-Knows | MPulse Software","isPartOf":{"@id":"https:\/\/mpulsesoftware.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage"},"image":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg","datePublished":"2018-09-28T02:00:00+00:00","dateModified":"2025-07-30T06:27:37+00:00","description":"Get insights into CMMS software security best practices to protect your maintenance data from unauthorized access and potential risks.","breadcrumb":{"@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#primaryimage","url":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg","contentUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2019\/07\/what-need-know-cmms-security.jpg","width":1200,"height":900,"caption":"What You Need to Know about CMMS Software Security"},{"@type":"BreadcrumbList","@id":"https:\/\/mpulsesoftware.com\/blog\/cmms\/what-need-know-cmms-software-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mpulsesoftware.com\/"},{"@type":"ListItem","position":2,"name":"CMMS","item":"https:\/\/mpulsesoftware.com\/blog\/category\/cmms\/"},{"@type":"ListItem","position":3,"name":"CMMS Software Security Must-Knows"}]},{"@type":"WebSite","@id":"https:\/\/mpulsesoftware.com\/#website","url":"https:\/\/mpulsesoftware.com\/","name":"MPulse Software","description":"CMMS Software","publisher":{"@id":"https:\/\/mpulsesoftware.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mpulsesoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mpulsesoftware.com\/#organization","name":"MPulse Software","url":"https:\/\/mpulsesoftware.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/","url":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png","contentUrl":"https:\/\/mpulsesoftware.com\/wp-content\/uploads\/2024\/06\/image-5.png","width":315,"height":105,"caption":"MPulse Software"},"image":{"@id":"https:\/\/mpulsesoftware.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mpulsesoftware.com\/#\/schema\/person\/bd92353973a29542ef16cd8c623465cd","name":"Michelle Nicolson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7eb32c3d99be5e0ef8f1f8ec2f47b343d5da4b73a9f77565490e135fc9939d8?s=96&d=mm&r=g","caption":"Michelle Nicolson"},"url":"https:\/\/mpulsesoftware.com\/blog\/author\/michelleblackcatcommunications-com\/"}]}},"_links":{"self":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/posts\/2589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/comments?post=2589"}],"version-history":[{"count":0,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/posts\/2589\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/media\/2590"}],"wp:attachment":[{"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/media?parent=2589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/categories?post=2589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mpulsesoftware.com\/wp-json\/wp\/v2\/tags?post=2589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}