{"id":394,"date":"2020-11-25T13:45:39","date_gmt":"2020-11-25T13:45:39","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=394"},"modified":"2020-11-25T13:45:39","modified_gmt":"2020-11-25T13:45:39","slug":"why-data-protection-and-cybersecurity-cant-be-separate-functions","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/","title":{"rendered":"Why Data Protection And Cybersecurity Can&#8217;t Be Separate Functions"},"content":{"rendered":"<p>Companies often separate cybersecurity and data protection by forming two independent teams and buying different software to address each of these issues apart. Maintaining and managing two teams, together with two software sets, involves high IT costs and administrative expenses.<\/p>\n<p>Why do companies separate cybersecurity and data protection? To answer this question, let\u2019s take a look at these two incidents.<\/p>\n<p>Recently, a ransomware attack hit UHS, a healthcare provider operating 400 facilities. Ryuk, a ransomware strain known for targeting big organizations, is suspected to have been used during the attack. Luckily, no personal records were compromised during this security incident.<\/p>\n<p>Let\u2019s take a look at another case. Town Sports International, a fitness chain, exposed the personal information of more than\u00a0<a class=\"color-link\" title=\"https:\/\/securityboulevard.com\/2020\/09\/town-sports-international-data-breach-exposed-personal-information-of-600000-members\/\" href=\"https:\/\/securityboulevard.com\/2020\/09\/town-sports-international-data-breach-exposed-personal-information-of-600000-members\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/securityboulevard.com\/2020\/09\/town-sports-international-data-breach-exposed-personal-information-of-600000-members\/\" aria-label=\"600,000\">600,000<\/a>\u00a0customers and staff members. The reason behind the breach was insufficient server protection, which allowed unauthorized access.<\/p>\n<p>Indeed, these two stories may be considered to belong to independent fields \u2014 cybersecurity and data protection. Since data threats belong to different areas, the methods to prevent such threats should be different as well. That\u2019s the logic that often determines corporate IT strategies and their elements, such as team recruiting and choosing software.<\/p>\n<p>Source: Forbes<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/theyec\/2020\/11\/25\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/?sh=3a48573c17cc\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Companies often separate cybersecurity and data protection by forming two independent teams and buying different software to address each of these issues apart. Maintaining and managing two teams, together with two software sets, involves high IT costs and administrative expenses. Why do companies separate cybersecurity and data protection? To answer this question, let\u2019s take a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":395,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Data Protection And Cybersecurity Can&#039;t Be Separate Functions - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Data Protection And Cybersecurity Can&#039;t Be Separate Functions - Community\" \/>\n<meta property=\"og:description\" content=\"Companies often separate cybersecurity and data protection by forming two independent teams and buying different software to address each of these issues apart. Maintaining and managing two teams, together with two software sets, involves high IT costs and administrative expenses. Why do companies separate cybersecurity and data protection? To answer this question, let\u2019s take a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-25T13:45:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/\",\"name\":\"Why Data Protection And Cybersecurity Can't Be Separate Functions - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg\",\"datePublished\":\"2020-11-25T13:45:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Data Protection And Cybersecurity Can&#8217;t Be Separate Functions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Data Protection And Cybersecurity Can't Be Separate Functions - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/","og_locale":"en_US","og_type":"article","og_title":"Why Data Protection And Cybersecurity Can't Be Separate Functions - Community","og_description":"Companies often separate cybersecurity and data protection by forming two independent teams and buying different software to address each of these issues apart. Maintaining and managing two teams, together with two software sets, involves high IT costs and administrative expenses. Why do companies separate cybersecurity and data protection? To answer this question, let\u2019s take a [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-11-25T13:45:39+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/","name":"Why Data Protection And Cybersecurity Can't Be Separate Functions - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg","datePublished":"2020-11-25T13:45:39+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/11\/pexels-designecologist-1779487-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/why-data-protection-and-cybersecurity-cant-be-separate-functions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Why Data Protection And Cybersecurity Can&#8217;t Be Separate Functions"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":399,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/394\/revisions\/399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/395"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}