{"id":1473,"date":"2021-05-13T12:00:00","date_gmt":"2021-05-13T12:00:00","guid":{"rendered":"https:\/\/pdisoftwareprd.wpengine.com\/?p=1473"},"modified":"2022-12-12T15:45:05","modified_gmt":"2022-12-12T15:45:05","slug":"prepare-to-handle-cybersecurity-incident","status":"publish","type":"post","link":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/","title":{"rendered":"Are You Prepared to Handle a Cybersecurity Incident?"},"content":{"rendered":"\n<p>At PDI Security Solutions, we see ransomware attacks on a daily basis. However, those attacks typically don\u2019t show up as news alerts or headlines in national news media. That\u2019s where the attack on the&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-13\/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline<\/a>&nbsp;stands out. Yet the underlying issues of all ransomware attacks are generally the same. Our goal is to help organizations prevent such attacks by malicious criminals looking to profit from corporate weaknesses.<\/p>\n\n\n\n<p>Today\u2019s businesses are increasingly at risk for exposure due to ransomware and the ever-evolving tactics and techniques of threat actors. That coincides with IT and InfoSec teams being sheltered at home for months, as one of the many professions uniquely geared for working remotely during the pandemic.<\/p>\n\n\n\n<p>Because of the remote work setup, suspicious activities that might have normally been observed in the office no longer are. For instance, when the security software for an on-premise workstation displays an alert about something suspicious, that would have historically resulted in a call to InfoSec by the employee. In today\u2019s WFH world, if those alerts aren\u2019t centrally logged and monitored, they might go completely undetected. Compounding this issue is the fact that remote teams who actually recognize the gap might not have the necessary means to install new security tools remotely without physically interacting with the systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The escalation of cyberthreats<\/h2>\n\n\n\n<p>It has become common in recent high-visibility attacks for cybercriminals to not only lock down internal systems with ransomware, but also exfiltrate massive amounts of corporate and customer data\u2014holding it for ransom against the threat of public release. One of the primary reasons businesses even consider paying the ransom is to avoid the risk of exposing sensitive customer information. In fact, the most recent and popular malware has built-in tools to exfiltrate data specifically for this reason.<\/p>\n\n\n\n<p>It wasn\u2019t long ago that the big question was whether your organization would get targeted and compromised. Today, it\u2019s more a matter of&nbsp;<em>when<\/em>&nbsp;that happens. If you\u2019re still relying on purely detective measures\u2014such as SIEM and\/or legacy edge security systems\u2014to keep attackers out of environments where non-technical users interact with the Internet, you aren\u2019t prepared to handle advanced threats.<\/p>\n\n\n\n<p>When your users click on something they shouldn\u2019t (and they inevitably will at some point), you must have the capability to:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Recognize that a security event happened<\/li>\n\n\n\n<li>Respond immediately to the threat, either by terminating the infection or going further to isolate that user and system from all other corporate assets<\/li>\n<\/ol>\n\n\n\n<div class=\"mbm-spacer mbm-spacer__16 wp-block-mbm-responsive-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The growing need for better security tools and expertise<\/h2>\n\n\n\n<p>The notion of completely preventing attackers from getting inside your organization using edge security products is a relic of past decades, especially in the era of remote working. Instead, you must be able to detect and respond to advanced threats and malicious actors. And, no, that\u2019s not a simple or easy task.<\/p>\n\n\n\n<p>Making sure you have the right security tools on your systems is a good start, but you also need trained cybersecurity analysts to monitor those tools. To help secure our customers and their data, we utilize&nbsp;<a href=\"https:\/\/pditechnologies.com\/xdr\/\">Extended Detection and Response (XDR)<\/a>. This approach combines the latest endpoint software with 24\/7\/365 monitoring of network, application, cloud, and system logs to prevent, detect, and enable active response from our Security Operations Center (SOC).<\/p>\n\n\n\n<p>When you consider how sophisticated cybercriminals have become and what\u2019s at stake, how confident are you that your organization is prepared for this challenge? If you\u2019re not sure, it might be time to re-evaluate your cybersecurity approach so you don\u2019t become just another statistic in the ransomware battle.<\/p>\n\n\n\n<p>To learn more about protecting your business from ransomware and other cyberthreats,&nbsp;<a href=\"https:\/\/pditechnologies.com\/xdr\/\">contact us<\/a>.<\/p>\n\n\n\n<div class=\"mbm-spacer mbm-spacer__32 wp-block-mbm-responsive-spacer\"><\/div>\n\n\n\n<div class=\"mbm-row wp-block-mbm-grid-container mbm-row__all-start mbm-row__all-standard\">\n<div class=\"mbm-col mbm-col__6 wp-block-mbm-grid-column\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-mbm-container alignwide\" style=\"padding-top:16px;padding-bottom:16px\"><div class=\"mbm-container\">\n<div class=\"mbm-card wp-block-mbm-card pattern-callout has-background has-blue-alt-2-background-color has-border border-radius__0 padding__sm\">\n<div class=\"wp-block-mbm-semantic-wrapper pattern-callout__left mbm-div\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"49\" height=\"49\" src=\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/07\/report-icon.svg\" alt=\"Report Icon\" class=\"wp-image-667\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-mbm-semantic-wrapper pattern-callout__right mbm-div\">\n<div class=\"wp-block-mbm-semantic-wrapper pattern-callout__content mbm-div\">\n<h2 class=\"pattern-callout__title has-white-base-color has-text-color has-charlie-font-size wp-block-heading\" id=\"h-protect-your-business\">Protect your business.<\/h2>\n\n\n\n<p class=\"pattern-callout__text has-white-base-color has-text-color has-foxtrot-font-size\">What every SMB must know about security threat prevention, detection, and response.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-font-size has-golf-font-size\"><a class=\"wp-block-button__link has-blue-base-background-color has-background wp-element-button\" href=\"https:\/\/pditechnologies.com\/resources\/white-paper\/strengthen-smb-cybersecurity\/\">Get the White Paper<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>At PDI Security Solutions, we see ransomware attacks on a daily basis. However, those attacks typically don\u2019t show up as news alerts or headlines in national news media. That\u2019s where the attack on the&nbsp;Colonial Pipeline&nbsp;stands out. Yet the underlying issues of all ransomware attacks are generally the same. Our goal is to help organizations prevent [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":1648,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"categories":[10],"tags":[144,16,152,149],"pdi_resource_tier":[150],"class_list":["post-1473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-convenience-retail","tag-cybersecurity","tag-network-management-and-security","tag-restaurant-qsr-and-other-retail"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are You Prepared to Handle a Cybersecurity Incident? | PDI<\/title>\n<meta name=\"description\" content=\"The underlying issues of all ransomware attacks are generally the same. Check out this blog to prepare to handle cybersecurity incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Prepared to Handle a Cybersecurity Incident?\" \/>\n<meta property=\"og:description\" content=\"The underlying issues of all ransomware attacks are generally the same. Check out this blog to prepare to handle cybersecurity incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\" \/>\n<meta property=\"og:site_name\" content=\"PDI Technologies, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pditechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-13T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-12T15:45:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"974\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Ketelsen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pditechnologies\" \/>\n<meta name=\"twitter:site\" content=\"@pditechnologies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Ketelsen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\"},\"author\":{\"name\":\"Jason Ketelsen\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c\"},\"headline\":\"Are You Prepared to Handle a Cybersecurity Incident?\",\"datePublished\":\"2021-05-13T12:00:00+00:00\",\"dateModified\":\"2022-12-12T15:45:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\"},\"wordCount\":649,\"publisher\":{\"@id\":\"https:\/\/pditechnologies.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg\",\"keywords\":[\"Convenience Retail\",\"Cybersecurity\",\"Network Management and Security\",\"Restaurant QSR and Other Retail\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\",\"url\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\",\"name\":\"Are You Prepared to Handle a Cybersecurity Incident? | PDI\",\"isPartOf\":{\"@id\":\"https:\/\/pditechnologies.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg\",\"datePublished\":\"2021-05-13T12:00:00+00:00\",\"dateModified\":\"2022-12-12T15:45:05+00:00\",\"description\":\"The underlying issues of all ransomware attacks are generally the same. Check out this blog to prepare to handle cybersecurity incidents.\",\"breadcrumb\":{\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage\",\"url\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg\",\"contentUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg\",\"width\":1350,\"height\":974,\"caption\":\"Man trying to touch cyber security graphic overlay visual\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"PDI Home\",\"item\":\"https:\/\/pditechnologies.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are You Prepared to Handle a Cybersecurity Incident?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pditechnologies.com\/#website\",\"url\":\"https:\/\/pditechnologies.com\/\",\"name\":\"PDI Technologies, Inc.\",\"description\":\"Convenience Store Software | Wholesale Petroleum Software | PDI\",\"publisher\":{\"@id\":\"https:\/\/pditechnologies.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pditechnologies.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pditechnologies.com\/#organization\",\"name\":\"PDI Technologies, Inc.\",\"url\":\"https:\/\/pditechnologies.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png\",\"contentUrl\":\"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png\",\"width\":200,\"height\":200,\"caption\":\"PDI Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pditechnologies\",\"https:\/\/x.com\/pditechnologies\",\"https:\/\/www.linkedin.com\/company\/pdi-technologies\",\"https:\/\/www.instagram.com\/pditechnologies\/\",\"https:\/\/www.youtube.com\/channel\/pdi-tech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c\",\"name\":\"Jason Ketelsen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pditechnologies.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g\",\"caption\":\"Jason Ketelsen\"},\"url\":\"https:\/\/pditechnologies.com\/author\/j-ketelsen\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are You Prepared to Handle a Cybersecurity Incident? | PDI","description":"The underlying issues of all ransomware attacks are generally the same. Check out this blog to prepare to handle cybersecurity incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/","og_locale":"en_US","og_type":"article","og_title":"Are You Prepared to Handle a Cybersecurity Incident?","og_description":"The underlying issues of all ransomware attacks are generally the same. Check out this blog to prepare to handle cybersecurity incidents.","og_url":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/","og_site_name":"PDI Technologies, Inc.","article_publisher":"https:\/\/www.facebook.com\/pditechnologies","article_published_time":"2021-05-13T12:00:00+00:00","article_modified_time":"2022-12-12T15:45:05+00:00","og_image":[{"width":1350,"height":974,"url":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg","type":"image\/jpeg"}],"author":"Jason Ketelsen","twitter_card":"summary_large_image","twitter_creator":"@pditechnologies","twitter_site":"@pditechnologies","twitter_misc":{"Written by":"Jason Ketelsen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#article","isPartOf":{"@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/"},"author":{"name":"Jason Ketelsen","@id":"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c"},"headline":"Are You Prepared to Handle a Cybersecurity Incident?","datePublished":"2021-05-13T12:00:00+00:00","dateModified":"2022-12-12T15:45:05+00:00","mainEntityOfPage":{"@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/"},"wordCount":649,"publisher":{"@id":"https:\/\/pditechnologies.com\/#organization"},"image":{"@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg","keywords":["Convenience Retail","Cybersecurity","Network Management and Security","Restaurant QSR and Other Retail"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/","url":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/","name":"Are You Prepared to Handle a Cybersecurity Incident? | PDI","isPartOf":{"@id":"https:\/\/pditechnologies.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage"},"image":{"@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage"},"thumbnailUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg","datePublished":"2021-05-13T12:00:00+00:00","dateModified":"2022-12-12T15:45:05+00:00","description":"The underlying issues of all ransomware attacks are generally the same. Check out this blog to prepare to handle cybersecurity incidents.","breadcrumb":{"@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#primaryimage","url":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg","contentUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/Cyber-Security-Graphic-1.jpg","width":1350,"height":974,"caption":"Man trying to touch cyber security graphic overlay visual"},{"@type":"BreadcrumbList","@id":"https:\/\/pditechnologies.com\/blog\/prepare-to-handle-cybersecurity-incident\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"PDI Home","item":"https:\/\/pditechnologies.com\/"},{"@type":"ListItem","position":2,"name":"Are You Prepared to Handle a Cybersecurity Incident?"}]},{"@type":"WebSite","@id":"https:\/\/pditechnologies.com\/#website","url":"https:\/\/pditechnologies.com\/","name":"PDI Technologies, Inc.","description":"Convenience Store Software | Wholesale Petroleum Software | PDI","publisher":{"@id":"https:\/\/pditechnologies.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pditechnologies.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pditechnologies.com\/#organization","name":"PDI Technologies, Inc.","url":"https:\/\/pditechnologies.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/","url":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png","contentUrl":"https:\/\/pditechnologies.com\/wp-content\/uploads\/2022\/08\/PDI-case-studies-logo-2.png","width":200,"height":200,"caption":"PDI Technologies, Inc."},"image":{"@id":"https:\/\/pditechnologies.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pditechnologies","https:\/\/x.com\/pditechnologies","https:\/\/www.linkedin.com\/company\/pdi-technologies","https:\/\/www.instagram.com\/pditechnologies\/","https:\/\/www.youtube.com\/channel\/pdi-tech"]},{"@type":"Person","@id":"https:\/\/pditechnologies.com\/#\/schema\/person\/10509df6bde15529e46a51d224fe673c","name":"Jason Ketelsen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pditechnologies.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8c12df7bcb8b97d8d887486a92eb0547162144a9e28b0230ab2571a927063cc8?s=96&d=mm&r=g","caption":"Jason Ketelsen"},"url":"https:\/\/pditechnologies.com\/author\/j-ketelsen\/"}]}},"_links":{"self":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/posts\/1473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/comments?post=1473"}],"version-history":[{"count":0,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/posts\/1473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/media\/1648"}],"wp:attachment":[{"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/media?parent=1473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/categories?post=1473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/tags?post=1473"},{"taxonomy":"pdi_resource_tier","embeddable":true,"href":"https:\/\/pditechnologies.com\/wp-json\/wp\/v2\/pdi_resource_tier?post=1473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}