{"id":772,"date":"2018-11-22T14:29:18","date_gmt":"2018-11-22T14:29:18","guid":{"rendered":"https:\/\/cortadoblog1.wpengine.com\/3-simple-tips-to-close-security-gaps-in-your-organization\/"},"modified":"2023-07-04T18:21:32","modified_gmt":"2023-07-04T18:21:32","slug":"3-simple-tips-to-close-security-gaps-in-your-organization","status":"publish","type":"post","link":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/","title":{"rendered":"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">IT security and cyber attack prevention is a complex issue. In this article, you\u2019ll find three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization. <\/p>\n\n\n\n<figure class=\"wp-block-image alignnone wp-image-773 size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug-1024x576.jpg\" alt=\"Star Wars mug on the author's desk\" class=\"wp-image-773\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug-1024x576.jpg 1024w, https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug-300x169.jpg 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug-768x432.jpg 768w, https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug-1536x864.jpg 1536w, https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug-2048x1152.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">\u201cThe more you tighten your grip, Tarkin&#8230;\u201d. These 3 cyber security best practices help reduce data security risks and lead to better cyber attack prevention<\/figcaption><\/figure>\n\n\n\n<p>With the ever-increasing use of mobile devices and new technologies required for digital transformation, traditional boundaries and their risks are becoming blurred. <\/p>\n\n\n\n<p>The aim of this article is not to reel off common cyber security best practices or to present auditing strategies. Neither is it intended to join the many IT security providers offering solutions to constructed problems created by exaggerated risk assessments and distracting your focus from the actual dangers.<\/p>\n\n\n\n<p>Instead, this article aims to give you ideas on how to identify steps which can be taken today to reduce systemic IT security gaps which helps your achieve better cyber attack prevention with very little effort and cost.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3 Cyber Security Best Practices that Really Work<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Employee-Based Data Security Risks: Try Sensitization Instead of a Heavy Hand<\/h3>\n\n\n\n<p>Remember that scene in Star Wars: A New Hope? A defiant Leia Organa builds herself up in front of the dark Grand Moff Tarkin and says, \u201cThe more you tighten your grip, Tarkin, the more star systems will slip through your fingers\u201d. An eerily precise description of the results of heavy-handed IT security measures.<\/p>\n\n\n\n<p>And just as the defenseless Princess Leia\u2019s home planet fades away in a cloud of fire and debris in the sights of the Empire\u2019s flawless superweapon, so too does employee trust, productivity and willingness to cooperate when heavy-handed IT security policies are put in place. And not without consequences \u2013 what happens with the Death Star is well known. <\/p>\n\n\n\n<p>It\u2019s not good when IT admins brand the threatened as a threat and then use their valuable resources against them. <strong><a rel=\"noopener noreferrer\" href=\"http:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\">Phishing<\/a><\/strong> and <strong><a rel=\"noopener noreferrer\" href=\"https:\/\/searchsecurity.techtarget.com\/definition\/social-engineering\" target=\"_blank\">social engineering<\/a> <\/strong>are among the biggest risks facing companies. Counterfeit instructions emailed to unsuspecting employees, where cyber criminals pretend to be their superiors and request funds to be transferred to their own accounts, have already been responsible for losses running into millions.<\/p>\n\n\n\n<p>This type of cyberattack is often far more lucrative than traditional hacking, yet inexplicably, some in IT still believe that a firewall, virus scanner, and password offer significantly more protection than discussing with employees what can be done better, together, to counter these threats.<\/p>\n\n\n\n<p>If the <strong><a href=\"https:\/\/www.securitymagazine.com\/articles\/89155-study-exposes-employee-negligence-as-top-information-security-risk-to-us-businesses\" target=\"_blank\" rel=\"noopener noreferrer\">end user becomes the final opponent<\/a><\/strong> for IT admins, then the next security measure is not the Elysium of Security, but probably the bitter realization sooner or later that overly-enslaved employees become highly imaginative when it comes to creating unsanctioned parallel structures and workarounds that nobody has any control over.<\/p>\n\n\n\n<p><strong>Steps to take:<\/strong> Before you invest any more hard-earned money in a shiny new security concept, why not set up a simple training course that shows employees <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.globalsign.com\/en\/blog\/how-to-spot-a-fake-email\/\" target=\"_blank\">how to recognize a fake email<\/a><\/strong> or website? No matter how sophisticated your IT system may be \u2013 as long as your workforce isn\u2019t aware of the dangers posed by cyberattacks, the door remains open to potential attackers. It makes cyber attack prevention a joint effort. Also, take a moment to consider how a planned security measure could help an employee make his or her work processes more secure and but also less complex. Then sit down and talk with your end users who are affected by these plans.  <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Don&#8217;t Always Increase IT Complexity for Better Cyber Attack Prevention: <\/h3>\n\n\n\n<p>Constantly increasing your IT complexity actually often backfires. Administrators face the challenge of maintaining process control and avoiding performance constraints. According to a <strong><a rel=\"noopener noreferrer\" href=\"https:\/\/info.dynatrace.com\/global_all_whitepaper_cloud_complexity_report_11870_registration.html\" target=\"_blank\">study by dynatrace<\/a><\/strong>, IT teams are spending 30% of their time on just fixing performance problems.<\/p>\n\n\n\n<p>In order not to lose track, documentation is highly important. Any changes made to your IT infrastructure should be fully documented and kept in a secure place (i.e. don\u2019t save documented server changes on that server). But documentation also has its limits. If too many infrastructure components are recorded, it can quickly become time-consuming, confusing and the structures are difficult to understand, especially for colleagues standing in for others.<\/p>\n\n\n\n<p>Infrastructure consolidation should also be regularly assessed. Can certain services be provided with one rather than two products? Do we really need the second firewall, or can the first one be modified, (maybe some product training would be helpful) and fully reach its potential?<\/p>\n\n\n\n<p>If you work in a small or medium-sized business that doesn\u2019t have a dedicated IT security team, simplicity should be your primary goal. Keep your environment simple \u2013 fewer servers, shorter distances, deeper expertise and better insight into the components you use.<\/p>\n\n\n\n<p>Get trained wisely \u2013 not just for your career or the certificates. Get trained in such a way that you feel fully fit and are able to understand and explain your security concept (both technically and conceptually).<\/p>\n\n\n\n<p><strong>Steps to take:<\/strong> Turn off a server or service today that you no longer need. For areas where you feel unsure, look for training opportunities and eliminate your knowledge gaps. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Legacy IT Creates Greater Data Security Risks<\/h3>\n\n\n\n<p>The last of our 3 cyber security best practices focuses on <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.techopedia.com\/definition\/635\/legacy-system\" target=\"_blank\">Legacy systems.<\/a><\/strong>  Inflexible infrastructure components occur in some form or other in nearly every business. There is rarely a valid excuse for these legacy systems \u2013 they are often no longer updatable or even allowed to be renewed. You should actually feel guilty if you have been dragging these systems along with you for a longer time, but more importantly take a moment to question your reasons for doing so.<\/p>\n\n\n\n<p>IT security is a fast-moving and dynamic area of business. Every component or system that is static and unchangeable doesn\u2019t fit into this concept and needs to be replaced sooner or later. However, it\u2019s inexcusable to not replace legacy devices or systems for cost reasons. Think about what could happen if the system failed tomorrow. What if the data on this system were to end up in the wrong hands by the end of the day? Can you really quantify the potential damage? You should also be thinking about the big picture \u2013 what opportunities is your business passing up on by using these old devices and systems?<\/p>\n\n\n\n<p><strong>Steps to take:<\/strong> If a legacy system or device you have in place has come into your mind, take a moment to list the reasons why you need to keep that system or device and bear in mind the questions in the previous paragraph. Are the reasons for keeping that old system or device really that important?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>These three cyber security best practices will help identify security vulnerabilities that are often not highlighted in the marketing brochures of expensive IT security solutions. Fear is used far too often to gain headlines and while aggressive sensitization is in some cases justified, we\u2019re often distracted from the fact that the most dangerous data security risks are often created by our own security concepts. The good news is that our own concepts can be easily improved.<\/p>\n\n\n\n<p>Reducing data security risks and cyber attack prevention are not unitary goals that are completed once and for all, but belong to a continuous journey. This journey is far easier to navigate when hand-in-hand with your colleagues, with a clear timetable and without any heavy legacy baggage. And in that sense, may the force be with you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security is a complex issue. With the ever-increasing use of mobile devices and new technologies required for digital transformation, traditional boundaries and their risks are becoming blurred. In this article, you\u2019ll find three simple tips which can be quickly implemented, and which have a significant impact on closing security gaps for any sized business.<\/p>\n","protected":false},"author":12,"featured_media":773,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[40],"class_list":["post-772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-administration","tag-data-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Curveball Best Practices for Better Cyber Attack Prevention<\/title>\n<meta name=\"description\" content=\"This article gives three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention\" \/>\n<meta property=\"og:description\" content=\"This article gives three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\" \/>\n<meta property=\"og:site_name\" content=\"Cortado Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-22T14:29:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-04T18:21:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Miller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Miller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\"},\"author\":{\"name\":\"Thomas Miller\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/518f3ccd1db375c6ef783be978ebd94e\"},\"headline\":\"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention\",\"datePublished\":\"2018-11-22T14:29:18+00:00\",\"dateModified\":\"2023-07-04T18:21:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\"},\"wordCount\":1247,\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg\",\"keywords\":[\"Data Security\"],\"articleSection\":[\"IT Administration\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\",\"url\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\",\"name\":\"3 Curveball Best Practices for Better Cyber Attack Prevention\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg\",\"datePublished\":\"2018-11-22T14:29:18+00:00\",\"dateModified\":\"2023-07-04T18:21:32+00:00\",\"description\":\"This article gives three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"\u201cThe more you tighten your grip, Tarkin\u2026.\u201d Our author is a self-confessed Star Wars fan.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.cortado.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog\",\"description\":\"News from Cortado\",\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.cortado.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\",\"name\":\"Cortado Blog\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"width\":226,\"height\":32,\"caption\":\"Cortado Blog\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/518f3ccd1db375c6ef783be978ebd94e\",\"name\":\"Thomas Miller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e290ea4cf78feb3072287fbf46340512?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e290ea4cf78feb3072287fbf46340512?s=96&d=mm&r=g\",\"caption\":\"Thomas Miller\"},\"url\":\"https:\/\/blog.cortado.com\/en\/author\/thomasl\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 Curveball Best Practices for Better Cyber Attack Prevention","description":"This article gives three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/","og_locale":"en_US","og_type":"article","og_title":"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention","og_description":"This article gives three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization.","og_url":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/","og_site_name":"Cortado Blog","article_published_time":"2018-11-22T14:29:18+00:00","article_modified_time":"2023-07-04T18:21:32+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg","type":"image\/jpeg"}],"author":"Thomas Miller","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thomas Miller","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#article","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/"},"author":{"name":"Thomas Miller","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/518f3ccd1db375c6ef783be978ebd94e"},"headline":"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention","datePublished":"2018-11-22T14:29:18+00:00","dateModified":"2023-07-04T18:21:32+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/"},"wordCount":1247,"publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg","keywords":["Data Security"],"articleSection":["IT Administration"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/","url":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/","name":"3 Curveball Best Practices for Better Cyber Attack Prevention","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg","datePublished":"2018-11-22T14:29:18+00:00","dateModified":"2023-07-04T18:21:32+00:00","description":"This article gives three cyber security best practices that are a little unconventional, but really help reduce data security risks in your organization.","breadcrumb":{"@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#primaryimage","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/authors-desk-star-wars-mug.jpg","width":2560,"height":1440,"caption":"\u201cThe more you tighten your grip, Tarkin\u2026.\u201d Our author is a self-confessed Star Wars fan."},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cortado.com\/en\/3-simple-tips-to-close-security-gaps-in-your-organization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cortado.com\/en\/"},{"@type":"ListItem","position":2,"name":"3 Tips for Reduced Security Risks and Better Cyber Attack Prevention"}]},{"@type":"WebSite","@id":"https:\/\/blog.cortado.com\/en\/#website","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog","description":"News from Cortado","publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cortado.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cortado.com\/en\/#organization","name":"Cortado Blog","url":"https:\/\/blog.cortado.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","width":226,"height":32,"caption":"Cortado Blog"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/518f3ccd1db375c6ef783be978ebd94e","name":"Thomas Miller","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e290ea4cf78feb3072287fbf46340512?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e290ea4cf78feb3072287fbf46340512?s=96&d=mm&r=g","caption":"Thomas Miller"},"url":"https:\/\/blog.cortado.com\/en\/author\/thomasl\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/772"}],"collection":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/comments?post=772"}],"version-history":[{"count":0,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/772\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media\/773"}],"wp:attachment":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media?parent=772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/categories?post=772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/tags?post=772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}