{"id":640,"date":"2022-01-25T12:00:15","date_gmt":"2022-01-25T12:00:15","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=640"},"modified":"2022-01-25T12:08:16","modified_gmt":"2022-01-25T12:08:16","slug":"5-cybersecurity-myths-truths","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/","title":{"rendered":"5 Cybersecurity Myths &#038; Truths"},"content":{"rendered":"<p style=\"text-align: center;\"><b>5 Cybersecurity Myths &amp; Truths<\/b><\/p>\n<p><strong>1. Hackers Don\u2019t Target Small Organizations<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">If the media was anything to go by, it would appear that only large organizations like AT&amp;T, Apple and Uber suffered from attacks.\u00a0 In fact, according to the 2018 Verizon Data Breach Investigations Report, 58 percent of data breach victims were small businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This myth is particularly persistent because of mainstream news and the fact that hackers can potentially extort higher sums of money from these businesses. While the financial gain from targeting enterprises is more lucrative, the stakes are higher for small businesses. Cybercriminals know that a cyber-attack could destroy a small business and force it to close.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are widespread weak security procedures in small businesses, including a lack of formal password policies, not installing updates and not using security software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most small businesses lack a contingency plan to deal with active attacks such as ransomware. In addition, it is imperative to have an\u00a0 active data management backup plan that is hidden from attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers don&#8217;t discriminate when it comes to their victims so don&#8217;t let the size of your business determine how valuable your data is or how secure your assets are.<\/span><\/p>\n<p><strong>2. Cybersecurity is Too Expensive\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The cost of a good cybersecurity solution is nothing compared to the cost of a successful attack. Even as malicious cyberattacks continue to make headlines and cost businesses millions, companies still wonder if cybersecurity investments are worth it. Data security is frequently overlooked and is only an afterthought for many enterprises. The average cost of a data breach in 2021 was $4.24 million, the highest in the last 17 years. This figure does not include the damage that comes with the crippling reputational losses and customer losses from a breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apart from the costs of obtaining access to your data, there are often regulatory fines for an organization for which they may be liable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compliance with mandates, such as the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) are two of the most important regulations. Explicitly written on the official GDPR website, \u201cGDPR fines are designed to make non-compliance a costly mistake for both large and small businesses.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The GDPR explicitly states that some violations are more severe than others. These less severe infringements could result in a fine of up to $11,899,550 (\u20ac10,000,000) or 2% of an organization\u2019s worldwide annual revenue from the preceding financial year, whichever amount is higher. More serious GDPR infringements \u2014 those going against the right to privacy and right to be forgotten \u2014 could result in a fine of up to $23,799,100 (\u20ac20,000,000) or 4% of an organization\u2019s worldwide annual revenue from the preceding financial year, whichever amount is higher.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last year, a new set of regulations, the California Consumer Privacy Act were created. The CCPA fines are just as intimidating as GDPR. Each time a business is found to have an intentional violation, they can be fined up to $7,500. Even unintentional violations come with a price tag of $2,500. Violations can also stack up on one another. For example, if a business\u2019s website is using third-party cookies without leveraging a cookie banner for awareness and opt-in, that organization could be committing thousands (or more) of violations per day.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cybersecurity company, Trusted Partner, Bergerode Consulting, explains that\u00a0 \u201ceffective cybersecurity, in my view, is first and foremost a set of positive behaviors which put cybersecurity on a solid footing. Just now, knowing what threats your business faces determines what choices you make about meeting these threats.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They continue \u201cIf a business faces a malware risk from staff using personal USBs in company workstations, some security companies will try to sell software to that business which controls the use of USBs, but such software can be expensive and it will certainly not address the reason why staff are using USBs, to begin with. Rather than buy such software, companies should seek to address why staff are using personal USBs and take ownership of the issue by updating the staff handbook to make use of personal USBs not permissible and also look to using existing software, e.g. Active Directory, to manage the use of USBs. This is more likely to address the root cause of the issue and deal with any risks than just buying a solution and being locked into an expensive support contract.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, there are many precautionary measures that you can take with absolutely no additional cost to your business, such as strong passwords, multi-factor authentication, access management, and employee training.<\/span><\/p>\n<p><strong>3. Cybersecurity is Solely the IT\u2019s Department\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">IT security is still viewed as the IT team\u2019s problem when that\u2019s not the case. All employees have a responsibility to ensure the security of their business. Every employee is part of the\u00a0 frontline of an organization\u2019s defense and represents its biggest attack pool. They are the people hackers are targeting with phishing campaigns because they\u2019re banking on a lack of security knowledge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This myth can have serious consequences if employees\u00a0 don\u2019t practise basic cybersecurity hygiene. If they don\u2019t take care when clicking links in emails or downloading software, they could compromise your business\u2019 security. Training is critical because your employees need to understand why cybersecurity is so important and that they have a role to play. This will also equip them with the skills to spot threats and change their behavior for the better.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a security breach can have potential and long-lasting effects on the entire business, the culture change needed to address this in a real and meaningful way comes from leadership while real cybersecurity preparedness is the responsibility of every employee.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While IT has a big responsibility when it comes to implementing and reviewing policies to keep companies cybersafe, true cybersecurity preparedness falls on the shoulders of every employee, not just those within the information technology department.<\/span><\/p>\n<p><strong>4. Cyberattacks are Only Caused by External Actors<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">While insider threats can be accidental or negligent, they can sometimes be malicious. Though protecting devices and servers is necessary, organizations should not overlook the importance of protecting against personnel and contractors and consider employee monitoring.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Did a disgruntled employee who was recently fired extract sensitive data on their way out with the intent to sell it or release it publicly? When it comes to cybersecurity, an ounce of protection goes a long way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe threat of insiders is real and what can happen is you have amazing defenses to protect your intellectual property and other secrets from those who are trying to obtain them from outside your company\u2019s walls, but you forget sometimes to have a program where you are watching those who you trust,\u201d said Assistant Attorney General for National Security John Carlin after the FBI arrested and charged an individual with theft of government secrets. <\/span><span style=\"font-weight: 400;\">In addition, you can never be fully aware of where these attacks can originate from, and traditional security solutions are largely ineffective when it comes to these threats. This makes them much harder to detect and contain than external threats.<\/span><\/p>\n<p><strong>5. Not Needing to Monitor Remote Employees<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v6 will record Windows remote sessions reliably and securely for Microsoft RDS, Citrix and VMware systems as well as cloud environments such as Azure and AWS. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><b>Sources<\/b><\/span><\/p>\n<p><a href=\"https:\/\/hamiltonfraser.co.uk\/knowledge\/7-cyber-security-myths-busted\/\"><b>https:\/\/hamiltonfraser.co.uk\/knowledge\/7-cyber-security-myths-busted\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.stealthlabs.com\/blog\/infographic-top-15-cybersecurity-myths-vs-reality\/\"><b>https:\/\/www.stealthlabs.com\/blog\/infographic-top-15-cybersecurity-myths-vs-reality\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.fpainc.com\/blog\/14-cybersecurity-myths-and-misconceptions\"><b>https:\/\/www.fpainc.com\/blog\/14-cybersecurity-myths-and-misconceptions<\/b><\/a><\/p>\n<p><a href=\"https:\/\/thehackernews.com\/2021\/12\/top-7-common-cybersecurity-myths-busted.html\"><b>https:\/\/thehackernews.com\/2021\/12\/top-7-common-cybersecurity-myths-busted.html<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.varonis.com\/blog\/top-cybersecurity-myths\"><b>https:\/\/www.varonis.com\/blog\/top-cybersecurity-myths<\/b><\/a><\/p>\n<p><a href=\"https:\/\/eu.usatoday.com\/story\/tech\/columnist\/2020\/08\/20\/10-common-cybersecurity-myths-consumers-should-stop-believing\/3370758001\/\"><b>https:\/\/eu.usatoday.com\/story\/tech\/columnist\/2020\/08\/20\/10-common-cybersecurity-myths-consumers-should-stop-believing\/3370758001\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/08\/26\/five-cybersecurity-myths-that-need-to-go\/?sh=7bba8b807c59\"><b>https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/08\/26\/five-cybersecurity-myths-that-need-to-go\/?sh=7bba8b807c59<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.nwcrc.co.uk\/post\/cybersecurity-myths\"><b>https:\/\/www.nwcrc.co.uk\/post\/cybersecurity-myths<\/b><\/a><\/p>\n<p><a href=\"https:\/\/cybriant.com\/do-you-believe-these-top-10-cybersecurity-myths\/\"><b>https:\/\/cybriant.com\/do-you-believe-these-top-10-cybersecurity-myths\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/cybermagazine.com\/cyber-security\/5-cybersecurity-myths-are-compromising-your-data\"><b>https:\/\/cybermagazine.com\/cyber-security\/5-cybersecurity-myths-are-compromising-your-data<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.ibm.com\/uk-en\/qradar?utm_content=SRCWW&amp;p1=Search&amp;p4=43700068028949984&amp;p5=p&amp;gclid=Cj0KCQiAraSPBhDuARIsAM3Js4qvhKo_lEpqm0gtfIxMudFpG8dE3_oEOauJwTgDI97PAO1-apvtCS4aAuM0EALw_wcB&amp;gclsrc=aw.ds\"><b>https:\/\/www.ibm.com\/uk-en\/qradar?utm_content=SRCWW&amp;p1=Search&amp;p4=43700068028949984&amp;p5=p&amp;gclid=Cj0KCQiAraSPBhDuARIsAM3Js4qvhKo_lEpqm0gtfIxMudFpG8dE3_oEOauJwTgDI97PAO1-apvtCS4aAuM0EALw_wcB&amp;gclsrc=aw.ds<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/\"><b>https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/<\/b><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>5 Cybersecurity Myths &amp; Truths 1. Hackers Don\u2019t Target Small Organizations If the media was anything to go by, it would appear that only large organizations like AT&amp;T, Apple and Uber suffered from attacks.\u00a0 In fact, according to the 2018 Verizon Data Breach Investigations Report, 58 percent of data breach victims were small businesses. This [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":641,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Cybersecurity Myths &amp; Truths - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Cybersecurity Myths &amp; Truths - Blogs\" \/>\n<meta property=\"og:description\" content=\"5 Cybersecurity Myths &amp; Truths 1. Hackers Don\u2019t Target Small Organizations If the media was anything to go by, it would appear that only large organizations like AT&amp;T, Apple and Uber suffered from attacks.\u00a0 In fact, according to the 2018 Verizon Data Breach Investigations Report, 58 percent of data breach victims were small businesses. This [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-25T12:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-25T12:08:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1919\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/\",\"name\":\"5 Cybersecurity Myths & Truths - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg\",\"datePublished\":\"2022-01-25T12:00:15+00:00\",\"dateModified\":\"2022-01-25T12:08:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg\",\"width\":1280,\"height\":1919},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Cybersecurity Myths &#038; Truths\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Cybersecurity Myths & Truths - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/","og_locale":"en_US","og_type":"article","og_title":"5 Cybersecurity Myths & Truths - Blogs","og_description":"5 Cybersecurity Myths &amp; Truths 1. Hackers Don\u2019t Target Small Organizations If the media was anything to go by, it would appear that only large organizations like AT&amp;T, Apple and Uber suffered from attacks.\u00a0 In fact, according to the 2018 Verizon Data Breach Investigations Report, 58 percent of data breach victims were small businesses. This [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-01-25T12:00:15+00:00","article_modified_time":"2022-01-25T12:08:16+00:00","og_image":[{"width":1280,"height":1919,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/","name":"5 Cybersecurity Myths & Truths - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg","datePublished":"2022-01-25T12:00:15+00:00","dateModified":"2022-01-25T12:08:16+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/01\/pexels-cottonbro-5483240.jpg","width":1280,"height":1919},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-cybersecurity-myths-truths\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"5 Cybersecurity Myths &#038; Truths"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=640"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/640\/revisions"}],"predecessor-version":[{"id":644,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/640\/revisions\/644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/641"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}