{"id":4045,"date":"2019-08-01T17:20:57","date_gmt":"2019-08-01T17:20:57","guid":{"rendered":"http:\/\/prototypes.transputec.net\/cynance-dev\/?p=4045"},"modified":"2020-10-27T15:19:44","modified_gmt":"2020-10-27T15:19:44","slug":"with-new-technologies-come-new-risks","status":"publish","type":"post","link":"https:\/\/outofsite.biz\/cynance\/with-new-technologies-come-new-risks\/","title":{"rendered":"With new technologies, come new risks."},"content":{"rendered":"

[vc_row][vc_column][vc_column_text css=”.vc_custom_1582712409783{padding-bottom: 50px !important;}”]New technologies can be super exciting, but when you want to keep your assets protected from cyber threats, new technologies actually pose a complex risk. They are the \u201cunknown unknowns\u201d, requiring you to implement Defence-in-Depth mechanisms and expect the unexpected. For those of us protecting major assets or sensitive data, it\u2019s not enough to apply standard security measures. A productive cyber security plan should be strategic, comprised of Defence-in-Depth layered security, evolving solutions which include embedded learning mechanism and of course which is still aligned with the company\u2019s risk management and resource allocation in the most effective way.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"

New technologies can be super exciting, but when you want to keep your assets protected from cyber threats, new technologies actually pose a complex risk.<\/p>\n","protected":false},"author":8,"featured_media":4173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4045"}],"collection":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/comments?post=4045"}],"version-history":[{"count":0,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/posts\/4045\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media\/4173"}],"wp:attachment":[{"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/media?parent=4045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/categories?post=4045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/outofsite.biz\/cynance\/wp-json\/wp\/v2\/tags?post=4045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}