{"id":9411,"date":"2015-08-04T08:57:16","date_gmt":"2015-08-04T13:57:16","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=9411"},"modified":"2022-11-22T16:03:34","modified_gmt":"2022-11-22T22:03:34","slug":"9-common-enterprise-cybersecurity-myths","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2015\/08\/9-common-enterprise-cybersecurity-myths\/","title":{"rendered":"9 common enterprise cybersecurity myths"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-725\" alt=\"Education\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" width=\"76\" height=\"100\" \/><span style=\"font-size: 14px;\"><em>Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data (and their customer&#8217;s data) at risk. <\/em><br \/><\/span><br \/>\n<a name=\"20150803\"><\/a><!--more--><\/p>\n<p>Cyberattacks are on the rise. The problem is only growing worse. <\/p>\n<p>How bad is it? The number of U.S. data breaches reached a record high in 2014, with <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', '2014 data breaches']); \" href=\"http:\/\/www.usatoday.com\/story\/tech\/2014\/09\/24\/data-breach-companies-60\/16106197\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">43% of companies<\/span><\/a> experiencing a data breach. This year, that number is expected to rise.<\/p>\n<p>How much does a breach harm a business? One study finds that the cost of a data breach has <span style=\"color: red;font-weight: bold\">increased to $3.8 million<\/span>&#8211;up from $3.5 million a year ago. This includes all aspects of a breach, like hiring experts to fix it, offering help to your customers, repairing your damaged reputation, and more.<\/p>\n<p>The problem: Many companies are easy targets for a cyberattack, but don\u2019t realize it. Some just don\u2019t take security seriously. Others believe common security myths that place their data at risk. <\/p>\n<p>What are these misconceptions? Today, let\u2019s explore some of the most common myths and explain why they\u2019re false.<\/p>\n<h3>Myth #1: We can&#8217;t get malware because we have antivirus<\/h3>\n<p>A common consumer belief, some businesses also place too much faith in anti-virus software. The fact is, it can\u2019t possibly protect your business from every type of malware.<\/p>\n<p>Why not? Antivirus software protects you against KNOWN vulnerabilities. But, security risks constantly evolve. New vulnerabilities emerge all the time. While antivirus software is important, you must understand that it\u2019s a reactive approach that can\u2019t protect you from everything.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\">\n<p>\u201cTraditional reactive measures are no longer sufficient to keep users and endpoints safe,\u201d says Andrew Avanessian, VP at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Avecto']); \" href=\"https:\/\/www.avecto.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Avecto<\/span><\/a>. \u201cThe prolific growth of malware, and the increasingly sophisticated threat landscape, mean that antivirus is unable to detect advanced evasion techniques. With legacy approaches quickly becoming obsolete, leaving companies vulnerable to attack and further infiltration, the first and most important step for making environments more secure is getting rid of end user admin rights. This proactive measure will ensure that complementary defenses like anti-malware, whitelisting and firewalls can actually be effective in tackling ever more complex threats.\u201d<\/p>\n<\/blockquote>\n<h3>Myth #2: We are safe because we have a firewall<\/h3>\n<p>On a similar note, many businesses put far too much faith in their firewall. While firewalls are important, it\u2019s only the first line of defense. What happens if an attacker gets past your firewall? What happens if it&#8217;s improperly configured or maintained? It could put your entire network at risk.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cMy number one security myth to bust is \u2018We are safe because we have a firewall,\u2019\u201d says Oli Thordarson, President, CEO &#8211; <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Alvaka Networks, Inc']); \" href=\"http:\/\/www.alvaka.net\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Alvaka Networks, Inc<\/span><\/a>. \u201cWhile that is a refrain I hear more often from small businesses rather than enterprises, I still hear variations of that from the enterprise. It is also common to hear that refrain from executives at an enterprise. The variation I hear from enterprise IT staff is their pointing to a lot of additional magical security devices and software in that solutions version of &#8220;We are safe because we have this magical device&#8230;.&#8221;\n<\/p><\/blockquote>\n<h3>Myth #3: We&#8217;re not a target<\/h3>\n<p>Maybe your company doesn\u2019t store sensitive data. Maybe you don\u2019t have data that any hacker might want. <\/p>\n<p>Does this mean you\u2019re not a security target? Not at all!<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><figure id=\"attachment_7444\" aria-describedby=\"caption-attachment-7444\" style=\"width: 240px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/01\/small_2377844553.jpg\" alt=\"photo credit: Bogdan Suditu via photopin cc\" width=\"240\" height=\"180\" class=\"size-full wp-image-7444\" \/><figcaption id=\"caption-attachment-7444\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/bogdansuditu\/2377844553\/\">Bogdan Suditu<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/figcaption><\/figure>\n<p>\u201cAt the grass roots, when I pitch security to potential customers, somebody always says, &#8220;Wait a minute. We&#8217;re not keeping national security secrets here. Why should we spend money on all this security.\u201d While you may not be the ultimate target of a cyberattack, you can easily become an unwitting partner in a major cyberattack. Just ask the HVAC contractor in Pennsylvania with access into the Target network about what that&#8217;s like,\u201d explains Greg Scott, author of the new security education book, &#8220;<a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Bullseye Breach']); \" href=\"http:\/\/www.bullseyebreach.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Bullseye Breach<\/span><\/a>&#8220;.<\/p>\n<\/blockquote>\n<p>The fact is, every business is a target. Maybe they\u2019re not after your data. Maybe an attacker uses your vulnerabilities to attack the real target. Those who believe they\u2019re aren\u2019t a target are actually better targets for attackers because they have weaker defenses.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cMost attacks are random,\u201d says Frank Bradshaw, President at <span style=\"color: red;font-weight: bold\">Ho&#8217;ike Technologies<\/span>. \u201cAttackers send out phishing emails hoping anyone would open them. Yes, there are targeted attacks (OPM, IRS, Sony for example were targeted) where criminals are looking at a specific target for what they have and go directly after them. Most organizations that are breached are breached by a random attack that happens to get through the defenses. As big as Target&#8217;s breach was, it was a small HVAC vendor with weak defenses that was the root cause. Many SMBs think they are too small, but they are the right size. You have information or access to information and less resources to protect yourself.\u201d\n<\/p><\/blockquote>\n<h3>Myth #4: If we haven&#8217;t yet been breached, our IT systems are secure<\/h3>\n<p>Why do some business leaders treat security as an afterthought? It\u2019s usually because they\u2019ve never experienced a data breach. They assume this means their systems are secure. <\/p>\n<p>The problem with this assumption: Security constantly changes. Sure, you may be secure today, but what about tomorrow? As explained below, you must always be on guard.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cWhen you see the systems up and running without any interruption &#8211; here comes the peace of mind, which for any cybersecurity pro is a sign that they might be missing something critical,\u201d says Michael Fimin, CEO and co-founder of <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Netwrix']); \" href=\"http:\/\/www.netwrix.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Netwrix<\/span><\/a>. \u201cHow to avoid that? When dealing with cybersecurity, remember that everything is changing. And your main goal is to obtain pervasive and true visibility into any changes made across the entire IT infrastructure. Knowing who changed what, when and where, and who has access to what will provide you with permanent control over your data, and give you precious time to react to any burst of suspicious activity.\u201d\n<\/p><\/blockquote>\n<p>The other problem with assuming your systems are secured because you haven\u2019t experienced a breach: How can you know for sure? Not all breaches are obvious. In fact, the best attackers know how to enter and leave your systems without a trace.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\">\n<p>\u201cPerfect security has always been a myth and it&#8217;s hard to imagine how anything could be 100 percent safe in the physical world,\u201d says Nathaniel Borenstein, chief scientist at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Mimecast']); \" href=\"http:\/\/www.mimecast.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Mimecast<\/span><\/a>. \u201cUnfortunately, Internet-based information attacks are even harder to deal with, in part because one doesn&#8217;t necessarily even know when the attack has happened. It would be hard not to notice a hijacked plane flying through the sky, but a clever cyber-attacker has the potential to get into a system, do his dirty work, and get out without being noticed. Thus, while we should put into place the toughest cyber-defenses we can manage, we should also work from the assumption that they will sometimes fail, and institute fallback strategies, or multi-layered defenses.\u201d<\/p>\n<p>\u201cThis sounds simple, but it stands a lot of current practice on its head. People tend to assume that what&#8217;s on their &#8220;internal&#8221; network is safe, but it isn&#8217;t, and it should always be treated as suspect. This means that even on your internal network, you should be using strong encryption and multi-level access control for sensitive documents, and two-factor authentication for critical actions. That way, someone who has broken into your network is somewhat less likely to be able to read your sensitive documents, or cause something bad to happen in the physical world. In short, you should pay as much attention to securing what&#8217;s inside your network as you do to keeping the bad guys out of it.\u201d\n<\/p><\/blockquote>\n<h3>Myth #5: Technology can fix our security issues<\/h3>\n<p>Imagine your business is a castle. You\u2019ve built the strongest walls, added extra fortifications, and even created an alligator-filled moat. Your defense could not possibly get any better. Then, one of your soldiers leaves the drawbridge down and your enemy walks right through your front door.<\/p>\n<p>This is a great analogy for the modern business. Many companies fortify their systems with the best security products. But, they lack a security plan. They don\u2019t educate their users about proper security practices. Or, they give their users too much data access. <\/p>\n<p>Am I saying that security technology is worthless? Not at all. In fact, it\u2019s necessary. But, no amount of technology will protect you from uninformed users with too much access.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cThe biggest single myth about cybersescurity is that the organizations will be safer if only they would deploy more security products,\u201d says Jonathan Gossels, CEO of <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'SystemExperts']); \" href=\"http:\/\/systemexperts.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">SystemExperts<\/span><\/a>. \u201cThe best products in the world can\u2019t keep you safe if you do not have an overall plan, a coherent architecture built on a comprehensive framework like ISO 27002, security policies to ensure appropriate behavior and handling off sensitive data, and a security-knowledgeable workforce. Technology is secondary \u2013 a distant second. 3 P\u2019s \u2013 People, Policies, and a Plan matter most.\u200b\u201d\n<\/p><\/blockquote>\n<h3>Myth #6: Our developers are building secure applications<\/h3>\n<figure id=\"attachment_9217\" aria-describedby=\"caption-attachment-9217\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2015\/06\/man-475559_640-300x211.jpg\" alt=\"photo credit: geralt via pixabay cc\" width=\"300\" height=\"211\" class=\"size-medium wp-image-9217\" \/><figcaption id=\"caption-attachment-9217\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/pixabay.com\/en\/man-boy-stylish-internet-network-475559\/\">geralt<\/a> via <a href=\"http:\/\/pixabay.com\/\">pixabay<\/a> <a href=\"http:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">cc<\/a><\/figcaption><\/figure>\n<p>Let me ask you a question: Are your business applications secure? How do you know?<\/p>\n<p>Many business leaders just assume their developers create secure applications. They check to make sure their applications include the requested features and requirements, without paying thought to its security.<\/p>\n<p>Here\u2019s a statistic that might make you think twice about that approach: <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'cenzic']); \" href=\"https:\/\/www.info-point-security.com\/sites\/default\/files\/cenzic-vulnerability-report-2014.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">96% of all web applications<\/span><\/a> contain at least one \u201cserious vulnerability.\u201d These vulnerabilities open the door for attackers, and can lead to data loss, complete system takeovers, and much more.<\/p>\n<p>This <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'SDTimes']); \" href=\"http:\/\/sdtimes.com\/stop-fighting-yesterdays-software-security-wars\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">article<\/span><\/a> sums up the problem nicely: <strong>We\u2019re still fighting the same software security battles we fought a decade ago.<\/strong> Despite the importance of security, developers still deliver applications with known vulnerabilities. They\u2019re making the same mistakes that were made 10 years ago.<\/p>\n<p>Why? Why do businesses create insecure applications year after year? The truth is, the blame doesn\u2019t completely fall on developers. In many ways, businesses bring it on themselves. Here are a few ways:<\/p>\n<ul class=\"arrow-list colored\">\n<li><strong>They provide no incentive for security<\/strong>: Peter Drucker is famously quoted as saying, \u201cWhat is measured improves.\u201d The problem for many developers: Security isn\u2019t measured. Rather, they get rewarded for features and development speed&#8230;not security.<\/li>\n<li><strong>They impose short deadlines<\/strong>: As businesses place greater importance on application development speed, security suffers. Developers rush through the project\u2014ensuring it meets all the business requirements. But, this often comes at the expense of proper security practices.<\/li>\n<li><strong>They treat security like a feature<\/strong>: Shortly after the healthcare.gov site went live, a \u201cwhite hat\u201d hacker testified on Capitol Hill that <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Outside Link', 'healthcare security']); \" href=\"http:\/\/www.cnbc.com\/id\/101225308\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">security was never properly built into the site<\/span><\/a>. Many businesses struggle with this same problem. They treat security like any other feature that they can add to an application. The problem: Security isn\u2019t something a developer can add at the end. You must build security into the application.<\/li>\n<\/ul>\n<p>If you think about it, developers are placed in a no-win situation. They\u2019re tasked with developing modern applications. They must keep up with ever-evolving application trends. They\u2019re faced with tight deadlines. Unless the business can afford a dedicated security engineer, the developer is in charge of security as well. Are we at all surprised that application development security is suffering?<\/p>\n<p>So, how can you fix it this issue? As a business leader, you must make security a top-down effort. It must be something that is measured constantly. You must instill a &#8220;security culture.&#8221; Only then will it improve.<\/p>\n<h3>Myth #7: We passed our audit, so we are secure<\/h3>\n<p>Now, security audits are one way to measure security. But, many companies make the mistake of assuming a passed security audit equals security. As explained below, while audits are helpful, they don\u2019t guarantee security.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cPassing an audit is great,\u201d says Ryan Tappis, Managing Director of <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Northramp, LLC']); \" href=\"http:\/\/www.northramp.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Northramp, LLC<\/span><\/a>. \u201cBut it doesn&#8217;t guarantee security. Think the large retailors didn&#8217;t pass their PCI audits prior to being breached? They did. Audits are a point in time assessment of an organization&#8217;s security posture. Technologies, vulnerabilities, and attack vectors change by the minute.\u201d\n<\/p><\/blockquote>\n<p>The other myth companies believe about audits: It will give you better security. Some businesses believe that an auditor will come in and fix their broken systems or security habits. <\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><figure id=\"attachment_7437\" aria-describedby=\"caption-attachment-7437\" style=\"width: 160px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/01\/small_9530886897.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/01\/small_9530886897.jpg\" alt=\"photo credit: archer10 (Dennis) via photopin cc\" width=\"160\" height=\"240\" class=\"size-full wp-image-7437\" \/><\/a><figcaption id=\"caption-attachment-7437\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/archer10\/9530886897\/\">archer10 (Dennis)<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/figcaption><\/figure>\n<p>\u201cAs an auditor, we are asked to validate what is in place and to asses the risk,\u201d says Carlos Pel\u00e1ez, CISA, PRINCE2, Director and National Practice Leader at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Coalfire']); \" href=\"http:\/\/www.coalfire.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Coalfire<\/span><\/a>. \u201cMany companies look to us to go beyond this and change security configurations, for example. Others think that our presence will somehow embed better habits in their IT Security teams. However, the problem most companies face when it comes to cyber security is not a lack of audits. Most companies have plenty of audits and they spent a good amount on security. The challenge that they are trying to solve is heightened security awareness followed by comfort that they are not placing the company at risk. Unfortunately, an audit won&#8217;t solve that because the true solution that they are seeking is really a change in their company&#8217;s culture. Organizations that view cyber security as a risk and treat it this way have a much healthier dialogue with their employees. Risk of financial losses, theft, or even natural disasters are how cyber security threats should be treated because no risk out there can be reduced to zero. Audits won&#8217;t solve this problem, but we still see many companies holding their compliance and audit teams to this unrealistic expectation.\u201d<\/p>\n<\/blockquote>\n<h3>Myth #8: Credit card compliant vendors make you PCI compliant<\/h3>\n<p>PCI compliance must always be an in-house priority. Unfortunately, many businesses wrongly believe that having a merchant services provider handle your credit card processing is all you need to be compliant. As explained below, you\u2019ll still be held liable if customer data is stolen from your business.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cAnother big myth has to do with credit card liability,\u201d says Marc Prosser, of <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Fit Small Business']); \" href=\"http:\/\/fitsmallbusiness.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Fit Small Business<\/span><\/a>. \u201cMany businesses assume that working with credit card compliant vendors necessarily makes them PCI compliant. But PCI compliance is much more than working with vendors, and you have to make sure that you follow all PCI procedures. Just because your credit card reader and merchant account providers are PCI compliant doesn&#8217;t mean you can&#8217;t be held liable when customer data gets stolen from your business.\u201d\n<\/p><\/blockquote>\n<h3>Myth #9: Encryption is the key to security<\/h3>\n<p>Encryption is the process of encoding data in such a way that only authorized parties can read it. In plain terms, encryption scrambles the contents of a message or file. Only those with the encryption key can unscramble the contents and access the data.<\/p>\n<p>However, some make the mistake of believing that implementing strong encryption is all they need to protect their data. The problem is, they focus so much on the encryption, but not on protecting the key.  <\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cOne of the biggest challenge in today&#8217;s world is that we are constantly inundated by buzzwords like Government grade Encryption, Bank grade Encryption etc etc,\u201d says Mayukh Gon, Founder and CEO of <span style=\"color: red;font-weight: bold\">PerfectCloud Inc<\/span>. \u201cThe problem is NOT strong encryption, but how good the keys are managed for the encryption. Encryption is as good as the weakest link. If the foundation of key management is weak, no matter how strong your encryption, it is bound to fail.\u201d\n<\/p><\/blockquote>\n<h3>Summary<\/h3>\n<p>Now, these are just a few cybersecurity myths, but the list could go on. If you would like to add anything to this list, I\u2019d love to hear it. Feel free to share in the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remain unprepared for an attack. Why? In many cases, they believe some common cybersecurity myths, which can put their data (and their customer&#8217;s data) at risk.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"9 common enterprise cybersecurity myths - mrc&#039;s Cup of Joe Blog","description":"Summary: Cyberattacks are more sophisticated and frequent than ever. The costs to recover from a data breach are now higher than ever. Yet, many companies remai"},"footnotes":""},"categories":[8],"tags":[71],"class_list":["post-9411","post","type-post","status-publish","format-standard","hentry","category-education","tag-security"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=9411"}],"version-history":[{"count":12,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9411\/revisions"}],"predecessor-version":[{"id":14132,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/9411\/revisions\/14132"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=9411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=9411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=9411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}