{"id":19728,"date":"2022-05-03T09:28:09","date_gmt":"2022-05-03T13:28:09","guid":{"rendered":"https:\/\/www.foundationsoft.com\/?page_id=19728"},"modified":"2025-09-22T08:17:09","modified_gmt":"2025-09-22T12:17:09","slug":"it-security-guide-foundation-hosted","status":"publish","type":"page","link":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/","title":{"rendered":"The IT Security Guide \u2014 FOUNDATION Hosted"},"content":{"rendered":"<div id=\"cs-content\" class=\"cs-content\"><div class=\"x-section e19728-e1 mf80-0 mf80-1 mf80-2 page-header\"><div class=\"x-bg\" aria-hidden=\"true\"><div class=\"x-bg-layer-lower-image\" data-x-element-bg-layer=\"{&quot;parallaxSize&quot;:&quot;150%&quot;,&quot;parallaxDir&quot;:&quot;v&quot;,&quot;parallaxRev&quot;:false}\"><\/div><\/div><div class=\"x-row x-container max width e19728-e2 mf80-a mf80-b mf80-c mf80-d mf80-j mf80-k\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e3 mf80-u mf80-v mf80-w\"><div class=\"x-row x-container max width e19728-e4 mf80-a mf80-b mf80-c mf80-e mf80-j mf80-l page-title-row\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e5 mf80-w\"><div class=\"x-text x-text-headline e19728-e6 mf80-y mf80-z mf80-10 mf80-11 mf80-12 mf80-13\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h1 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Protect_Yourself_Your_Employees_and_Your_Business_with_These_IT_Tips\"><\/span>Protect Yourself, Your Employees and Your Business with These IT Tips<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"x-col x-hide-sm x-hide-xs e19728-e7 mf80-w\"><\/div><\/div><\/div><\/div><div class=\"x-section e19728-e8 mf80-0 mf80-1 mf80-3\"><div class=\"x-row x-container max width e19728-e9 mf80-a mf80-c mf80-f mf80-g mf80-m mf80-n\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e10 mf80-w\"><div class=\"x-text x-content e19728-e11 mf80-1a mf80-1b mf80-1c\"><p>With cyberattacks on the rise, the average construction business is in need of a security upgrade to avoid falling victim to a costly attack. According to IBM, the average cost of a data breach in the United States was $9.05 million in 2021. With ransomware attacks becoming increasingly widespread, it&rsquo;s important to take steps now to make sure your most sensitive data is secure.<\/p><\/div><\/div><div class=\"x-col e19728-e12 mf80-w\"><div class=\"x-text x-content e19728-e13 mf80-1a mf80-1b mf80-1c\"><p>The FOUNDATION&reg; Hosted IT Datasheet provides some tips and procedures you can implement today to help protect your company and data from cyberattacks.<\/p><\/div><a class=\"x-anchor x-anchor-button has-graphic e19728-e14 mf80-1g mf80-1h demo-cta\" tabindex=\"0\" href=\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2022\/05\/2022-04_FOUNDATION_IT_Checklist_Datasheet_OnePage.pdf\"><div class=\"x-anchor-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf1c1;\"><\/i><\/span><div class=\"x-anchor-text\"><span class=\"x-anchor-text-primary\">Download the Datasheet<\/span><\/div><\/div><\/a><\/div><\/div><\/div><\/div><div class=\"x-section e19728-e15 mf80-0 mf80-3 mf80-4 mf80-5\"><div class=\"x-row x-container max width e19728-e16 mf80-a mf80-h mf80-i mf80-o mf80-p\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e17 mf80-w\"><div class=\"x-text x-text-headline e19728-e18 mf80-y mf80-z mf80-11 mf80-13 mf80-14 mf80-15\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h3 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"The_beginners_guide_for_basic_IT_Security\"><\/span>The beginners guide for basic IT Security:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"x-section e19728-e19 mf80-0 mf80-3 mf80-6 mf80-7\"><div class=\"x-row x-container max width e19728-e20 mf80-a mf80-g mf80-h mf80-m mf80-q\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e21 mf80-w\"><div class=\"x-text x-text-headline e19728-e22 mf80-y mf80-z mf80-11 mf80-14 mf80-16\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Have_strong_passwords\"><\/span>Have strong passwords<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e23 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Key aspects of a strong password: length, mix of upper and lower letters, numbers and symbols &ndash; for example, a1B!c2D@e3F#<\/span>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e24 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Use a password management solution &ndash; these programs will store long, unique passwords for online accounts<\/span>\n<\/div><\/div><\/div><\/div><div class=\"x-col e19728-e25 mf80-w\"><div class=\"x-text x-text-headline e19728-e26 mf80-y mf80-z mf80-11 mf80-14 mf80-16\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Have_backups_of_all_key_data_and_information_to_protect_against_ransomware\"><\/span>Have backups of all key<br \/>data and information to<br \/>protect against ransomware<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e27 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Perform off site backups at least<br \/>once a year<\/span>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e28 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Test backups to validate you can recover your data in the event of an emergency<\/span>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e29 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Review backups to ensure the data you are backing up is relevant and add new sources of data as requirements change<\/span>\n<\/div><\/div><\/div><\/div><div class=\"x-col e19728-e30 mf80-w\"><div class=\"x-text x-text-headline e19728-e31 mf80-y mf80-z mf80-11 mf80-14 mf80-16\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Good_message_hygiene\"><\/span>Good message hygiene<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e32 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Set up anti-spam and malware rules to block malicious emails<\/span>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e33 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Configure multi-layered detection (multiple levels of security examination) to prevent various spam, malware and more<\/span>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e34 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Use email warning tags to raise awareness in identifying suspicious email<\/span>\n<\/div><\/div><\/div><\/div><div class=\"x-col e19728-e35 mf80-w\"><div class=\"x-text x-text-headline e19728-e36 mf80-y mf80-z mf80-11 mf80-14 mf80-16\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Endpoint_protection\"><\/span>Endpoint protection<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e37 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Implement this security application to protect business endpoints such as laptops, servers or anything that connects to the internet to stop users from running malicious programs<\/span>\n<\/div><\/div><\/div><\/div><div class=\"x-col e19728-e38 mf80-w\"><div class=\"x-text x-text-headline e19728-e39 mf80-y mf80-z mf80-11 mf80-14 mf80-16\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Set_up_security_awareness_training\"><\/span>Set up security awareness<br \/>training<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e40 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Train employees on how to identify and report activity &mdash; see something say something mentality<\/span>\n<\/div><\/div><\/div><\/div><div class=\"x-col e19728-e41 mf80-w\"><div class=\"x-text x-text-headline e19728-e42 mf80-y mf80-z mf80-11 mf80-14 mf80-16\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h4 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"Physical_security\"><\/span>Physical security<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<\/div><\/div><\/div><div class=\"x-text x-text-headline has-graphic e19728-e43 mf80-z mf80-10 mf80-17 mf80-18\"><div class=\"x-text-content\"><span class=\"x-graphic\" aria-hidden=\"true\"><i class=\"x-icon x-graphic-child x-graphic-icon x-graphic-primary\" aria-hidden=\"true\" data-x-icon-l=\"&#xf45c;\"><\/i><\/span><div class=\"x-text-content-text\"><span class=\"x-text-content-text-primary\">Encrypt laptops for protection<\/span>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"x-section e19728-e44 mf80-0 mf80-3 mf80-4 mf80-7\"><div class=\"x-row x-container max width e19728-e45 mf80-a mf80-h mf80-i mf80-o mf80-r\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e46 mf80-w\"><div class=\"x-text x-content e19728-e47 mf80-1b mf80-1c mf80-1d\"><p>Take your protection a step further by following recommendations and best practices from a security framework that works best for your business. Some examples include:<\/p><\/div><div class=\"x-text x-content e19728-e48 mf80-1a mf80-1b mf80-1c mf80-1e\"><ul>\n \t<li>NIST<\/li>\n \t<li>ISO 27001 and ISO27002<\/li>\n \t<li>NERC-Clp<\/li>\n \t<li>FISMA<\/li>\n \t<li>HIPAA<\/li>\n \t<li>PCI<\/li>\n \t<li>SOC2<\/li>\n \t<li>GDPR<\/li>\n<\/ul><\/div><\/div><\/div><\/div><\/div><div class=\"x-section e19728-e49 mf80-0 mf80-3 mf80-8\"><div class=\"x-row x-container max width e19728-e50 mf80-a mf80-h mf80-i mf80-o mf80-s\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e51 mf80-u mf80-v mf80-w\"><div class=\"x-text x-content e19728-e52 mf80-1a mf80-1b mf80-1f\"><p>FOUNDATION&reg; offers a secure way to track and store your critical financial and project data with FOUNDATION&reg; Hosted &mdash; a cloud-based solution. With automatic system backups and security updates, FOUNDATION&reg; Hosted takes the stress out of keeping your data secure.<\/p><\/div><\/div><\/div><\/div><\/div><div class=\"x-section e19728-e53 mf80-0 mf80-3 mf80-6 mf80-7 mf80-9 see-foundation\"><div class=\"x-row x-container max width e19728-e54 mf80-a mf80-b mf80-c mf80-j mf80-t\"><div class=\"x-row-inner\"><div class=\"x-col e19728-e55 mf80-u mf80-w mf80-x\"><div class=\"x-text x-text-headline e19728-e56 mf80-y mf80-z mf80-10 mf80-18 mf80-19 h2\"><div class=\"x-text-content\"><div class=\"x-text-content-text\"><h2 class=\"x-text-content-text-primary\"><span class=\"ez-toc-section\" id=\"See_How_FOUNDATION_Can_Help_Your_Business\"><\/span>See How FOUNDATION Can Help Your Business!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div><\/div><\/div><a class=\"x-anchor x-anchor-button e19728-e57 mf80-1h mf80-1i demo-cta\" tabindex=\"0\" href=\"#schedule-a-live-demo\"><div class=\"x-anchor-content\"><div class=\"x-anchor-text\"><span class=\"x-anchor-text-primary\">Schedule a Live Demo<\/span><\/div><\/div><\/a><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>If you are a California resident, you may have the right under the California Consumer Privacy Act of 2018 (CCPA) to ask us to disclose your personal information that we have collected in the last 12 months.<\/p>\n","protected":false},"author":50,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-blank-4.php","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"class_list":["post-19728","page","type-page","status-publish","hentry","no-post-thumbnail"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The IT Security Guide \u2014 FOUNDATION Hosted - Foundation Software<\/title>\n<meta name=\"description\" content=\"Access the IT Security Guide for Foundation hosted software. Protect your construction business with essential cybersecurity practices. Download now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The IT Security Guide \u2014 FOUNDATION Hosted - Foundation Software\" \/>\n<meta property=\"og:description\" content=\"Access the IT Security Guide for Foundation hosted software. Protect your construction business with essential cybersecurity practices. Download now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/\" \/>\n<meta property=\"og:site_name\" content=\"Foundation Software\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-22T12:17:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2023\/07\/fsl-datasheet-bg-scaled-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1704\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/\",\"url\":\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/\",\"name\":\"The IT Security Guide \u2014 FOUNDATION Hosted - Foundation Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.foundationsoft.com\/#website\"},\"datePublished\":\"2022-05-03T13:28:09+00:00\",\"dateModified\":\"2025-09-22T12:17:09+00:00\",\"description\":\"Access the IT Security Guide for Foundation hosted software. Protect your construction business with essential cybersecurity practices. Download now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.foundationsoft.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The IT Security Guide \u2014 FOUNDATION Hosted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.foundationsoft.com\/#website\",\"url\":\"https:\/\/www.foundationsoft.com\/\",\"name\":\"Foundation Software\",\"description\":\"Construction Software for Contractors\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.foundationsoft.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The IT Security Guide \u2014 FOUNDATION Hosted - Foundation Software","description":"Access the IT Security Guide for Foundation hosted software. Protect your construction business with essential cybersecurity practices. Download now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/","og_locale":"en_US","og_type":"article","og_title":"The IT Security Guide \u2014 FOUNDATION Hosted - Foundation Software","og_description":"Access the IT Security Guide for Foundation hosted software. Protect your construction business with essential cybersecurity practices. Download now!","og_url":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/","og_site_name":"Foundation Software","article_modified_time":"2025-09-22T12:17:09+00:00","og_image":[{"width":2560,"height":1704,"url":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2023\/07\/fsl-datasheet-bg-scaled-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/","url":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/","name":"The IT Security Guide \u2014 FOUNDATION Hosted - Foundation Software","isPartOf":{"@id":"https:\/\/www.foundationsoft.com\/#website"},"datePublished":"2022-05-03T13:28:09+00:00","dateModified":"2025-09-22T12:17:09+00:00","description":"Access the IT Security Guide for Foundation hosted software. Protect your construction business with essential cybersecurity practices. Download now!","breadcrumb":{"@id":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.foundationsoft.com\/"},{"@type":"ListItem","position":2,"name":"The IT Security Guide \u2014 FOUNDATION Hosted"}]},{"@type":"WebSite","@id":"https:\/\/www.foundationsoft.com\/#website","url":"https:\/\/www.foundationsoft.com\/","name":"Foundation Software","description":"Construction Software for Contractors","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.foundationsoft.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/pages\/19728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/comments?post=19728"}],"version-history":[{"count":0,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/pages\/19728\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/media?parent=19728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}