{"id":3288,"date":"2025-06-30T12:30:48","date_gmt":"2025-06-30T12:30:48","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=3288"},"modified":"2025-06-30T12:30:48","modified_gmt":"2025-06-30T12:30:48","slug":"are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/de\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/","title":{"rendered":"Are You Really Protecting Microsoft 365 &#038; Google Workspace? Here\u2019s What You\u2019re Missing"},"content":{"rendered":"<p data-start=\"304\" data-end=\"596\">In today\u2019s digital workplace, SaaS platforms like <strong data-start=\"354\" data-end=\"371\">Microsoft 365<\/strong> and <strong data-start=\"376\" data-end=\"396\">Google Workspace<\/strong> are business-critical. They power everything from collaboration to customer service \u2014 and yet, many businesses mistakenly assume that their data is fully protected just because it lives in the cloud.<\/p>\n<p data-start=\"598\" data-end=\"643\">Unfortunately, that assumption can be costly.<\/p>\n<h3 data-start=\"645\" data-end=\"681\">Cloud Does Not Mean Backed Up<\/h3>\n<p data-start=\"683\" data-end=\"929\">Microsoft and Google are clear: <strong data-start=\"715\" data-end=\"765\">They operate on a shared responsibility model.<\/strong> They protect platform availability and infrastructure, but <strong data-start=\"825\" data-end=\"854\">your data is your problem<\/strong> \u2014 including accidental deletions, insider threats, and ransomware attacks.<\/p>\n<p data-start=\"931\" data-end=\"943\">For example:<\/p>\n<ul data-start=\"944\" data-end=\"1255\">\n<li data-start=\"944\" data-end=\"1032\">\n<p data-start=\"946\" data-end=\"1032\">Microsoft only retains deleted items in Exchange Online for <strong data-start=\"1006\" data-end=\"1031\">14\u201330 days by default<\/strong>.<\/p>\n<\/li>\n<li data-start=\"1033\" data-end=\"1139\">\n<p data-start=\"1035\" data-end=\"1139\">Google Workspace\u2019s Trash is purged after <strong data-start=\"1076\" data-end=\"1087\">30 days<\/strong>, often with <strong data-start=\"1100\" data-end=\"1128\">limited recovery options<\/strong> afterward.<\/p>\n<\/li>\n<li data-start=\"1140\" data-end=\"1255\">\n<p data-start=\"1142\" data-end=\"1255\">Neither platform protects against <strong data-start=\"1176\" data-end=\"1207\">malicious insider deletions<\/strong>, <strong data-start=\"1209\" data-end=\"1230\">misconfigurations<\/strong>, or <strong data-start=\"1235\" data-end=\"1254\">app sync errors<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1257\" data-end=\"1380\">Without third-party backup, many organizations are <strong data-start=\"1308\" data-end=\"1380\">just one mistake or malware attack away from irreversible data loss.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3290 alignleft\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-200x200.png 200w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-8.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<hr data-start=\"1382\" data-end=\"1385\" \/>\n<h3 data-start=\"1387\" data-end=\"1433\">What\u2019s Missing from Native Protections?<\/h3>\n<ol data-start=\"1435\" data-end=\"2198\">\n<li data-start=\"1435\" data-end=\"1608\">\n<p data-start=\"1438\" data-end=\"1608\"><strong data-start=\"1438\" data-end=\"1467\">Granular Recovery Options<\/strong><br data-start=\"1467\" data-end=\"1470\" \/>Need to restore a single email or folder from 90 days ago? Native tools don\u2019t offer point-in-time recovery or detailed version history.<\/p>\n<\/li>\n<li data-start=\"1610\" data-end=\"1801\">\n<p data-start=\"1613\" data-end=\"1801\"><strong data-start=\"1613\" data-end=\"1641\">Long-Term Data Retention<\/strong><br data-start=\"1641\" data-end=\"1644\" \/>Compliance requirements (like GDPR, HIPAA, or ISO 27001) often demand that data be kept for <strong data-start=\"1739\" data-end=\"1763\">months or even years<\/strong> \u2014 far beyond native retention limits.<\/p>\n<\/li>\n<li data-start=\"1803\" data-end=\"2027\">\n<p data-start=\"1806\" data-end=\"2027\"><strong data-start=\"1806\" data-end=\"1857\">Protection Against Ransomware &amp; Insider Threats<\/strong><br data-start=\"1857\" data-end=\"1860\" \/>If a threat actor gains access to your Microsoft 365 or Google Workspace account, they can encrypt, delete, or sync-wipe data \u2014 and there may be no rollback option.<\/p>\n<\/li>\n<li data-start=\"2029\" data-end=\"2198\">\n<p data-start=\"2032\" data-end=\"2198\"><strong data-start=\"2032\" data-end=\"2075\">Automated Backup Testing &amp; Verification<\/strong><br data-start=\"2075\" data-end=\"2078\" \/>How do you know your backups actually work? Most native tools don\u2019t provide automated validation of backup integrity.<\/p>\n<\/li>\n<\/ol>\n<hr data-start=\"2200\" data-end=\"2203\" \/>\n<h3 data-start=\"2205\" data-end=\"2242\">How Providers can Solve This Problem<\/h3>\n<p data-start=\"2244\" data-end=\"2427\">Cyber Protect Cloud provider offer <strong data-start=\"2279\" data-end=\"2316\">comprehensive backup and recovery<\/strong> for both Microsoft 365 and Google Workspace \u2014 all managed through a single platform. Here\u2019s how it stands out:<\/p>\n<ul data-start=\"2429\" data-end=\"2937\">\n<li data-start=\"2429\" data-end=\"2537\">\n<p data-start=\"2431\" data-end=\"2537\"><strong data-start=\"2431\" data-end=\"2535\">Full support for Exchange Online, OneDrive, SharePoint, Teams, Gmail, Drive, Calendar, and Contacts.<\/strong><\/p>\n<\/li>\n<li data-start=\"2538\" data-end=\"2629\">\n<p data-start=\"2540\" data-end=\"2629\"><strong data-start=\"2540\" data-end=\"2576\">Granular, point-in-time recovery<\/strong> for individual files, emails, or entire mailboxes.<\/p>\n<\/li>\n<li data-start=\"2630\" data-end=\"2692\">\n<p data-start=\"2632\" data-end=\"2692\"><strong data-start=\"2632\" data-end=\"2653\">Immutable storage<\/strong> options to prevent backup tampering.<\/p>\n<\/li>\n<li data-start=\"2693\" data-end=\"2767\">\n<p data-start=\"2695\" data-end=\"2767\"><strong data-start=\"2695\" data-end=\"2726\">Flexible retention policies<\/strong> to meet regulatory and business needs.<\/p>\n<\/li>\n<li data-start=\"2768\" data-end=\"2840\">\n<p data-start=\"2770\" data-end=\"2840\"><strong data-start=\"2770\" data-end=\"2798\">Backup anomaly detection<\/strong> using AI\/ML to spot abnormal behaviors.<\/p>\n<\/li>\n<li data-start=\"2841\" data-end=\"2937\">\n<p data-start=\"2843\" data-end=\"2937\"><strong data-start=\"2843\" data-end=\"2867\">Seamless MSP support<\/strong> with multi-tenant management, usage tracking, and billing automation.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2939\" data-end=\"2942\" \/>\n<h3 data-start=\"2944\" data-end=\"2978\">Who Needs This the Most?<\/h3>\n<ul data-start=\"2980\" data-end=\"3293\">\n<li data-start=\"2980\" data-end=\"3076\">\n<p data-start=\"2982\" data-end=\"3076\"><strong data-start=\"2982\" data-end=\"2990\">MSPs<\/strong> looking to differentiate their service offerings with reliable cloud-to-cloud backup.<\/p>\n<\/li>\n<li data-start=\"3077\" data-end=\"3205\">\n<p data-start=\"3079\" data-end=\"3205\"><strong data-start=\"3079\" data-end=\"3112\">SMBs and mid-sized businesses<\/strong> that have adopted Microsoft 365 or Google Workspace but lack robust disaster recovery plans.<\/p>\n<\/li>\n<li data-start=\"3206\" data-end=\"3293\">\n<p data-start=\"3208\" data-end=\"3293\"><strong data-start=\"3208\" data-end=\"3243\">Compliance-driven organizations<\/strong> in healthcare, finance, education, or government.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3295\" data-end=\"3298\" \/>\n<h3 data-start=\"3300\" data-end=\"3324\">Real-World Impact<\/h3>\n<p data-start=\"3326\" data-end=\"3587\">In 2024, a mid-sized UK legal firm lost access to over 80,000 critical documents when a departing employee wiped their OneDrive before HR offboarding. Microsoft was unable to restore the data \u2014 but a third-party backup could have reversed the damage in minutes.<\/p>\n<p data-start=\"3589\" data-end=\"3677\">The lesson? <strong data-start=\"3601\" data-end=\"3653\">You can\u2019t outsource responsibility for your data<\/strong> \u2014 even to cloud giants.<\/p>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital workplace, SaaS platforms like Microsoft 365 and Google Workspace are business-critical. They power everything from collaboration to&#8230;<\/p>","protected":false},"author":26,"featured_media":3289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16,36],"tags":[],"class_list":["post-3288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-technology","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are You Really Protecting Microsoft 365 &amp; Google Workspace? Here\u2019s What You\u2019re Missing - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/de\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Really Protecting Microsoft 365 &amp; Google Workspace? Here\u2019s What You\u2019re Missing - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s digital workplace, SaaS platforms like Microsoft 365 and Google Workspace are business-critical. They power everything from collaboration to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/de\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-30T12:30:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/\",\"url\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/\",\"name\":\"Are You Really Protecting Microsoft 365 & Google Workspace? Here\u2019s What You\u2019re Missing - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png\",\"datePublished\":\"2025-06-30T12:30:48+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Technology\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/information-technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are You Really Protecting Microsoft 365 &#038; Google Workspace? Here\u2019s What You\u2019re Missing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are You Really Protecting Microsoft 365 & Google Workspace? Here\u2019s What You\u2019re Missing - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/de\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/","og_locale":"de_DE","og_type":"article","og_title":"Are You Really Protecting Microsoft 365 & Google Workspace? Here\u2019s What You\u2019re Missing - Techknowledge","og_description":"In today\u2019s digital workplace, SaaS platforms like Microsoft 365 and Google Workspace are business-critical. They power everything from collaboration to...","og_url":"https:\/\/b2btechknowledge.net\/de\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/","og_site_name":"Techknowledge","article_published_time":"2025-06-30T12:30:48+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"John Gallacher","Gesch\u00e4tzte Lesezeit":"3 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/","url":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/","name":"Are You Really Protecting Microsoft 365 & Google Workspace? Here\u2019s What You\u2019re Missing - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png","datePublished":"2025-06-30T12:30:48+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-7.png","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/information-technology\/are-you-really-protecting-microsoft-365-google-workspace-heres-what-youre-missing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Information Technology","item":"https:\/\/b2btechknowledge.net\/topics\/information-technology\/"},{"@type":"ListItem","position":3,"name":"Are You Really Protecting Microsoft 365 &#038; Google Workspace? Here\u2019s What You\u2019re Missing"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/3288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/comments?post=3288"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/posts\/3288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media\/3289"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/media?parent=3288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/categories?post=3288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/de\/wp-json\/wp\/v2\/tags?post=3288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}