{"id":831423,"date":"2024-07-10T10:27:02","date_gmt":"2024-07-10T04:57:02","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=831423"},"modified":"2024-07-10T10:36:54","modified_gmt":"2024-07-10T05:06:54","slug":"cyber-security-identify-first-what-needs-to-be-protected","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/07\/10\/cyber-security-identify-first-what-needs-to-be-protected\/","title":{"rendered":"Cyber security: Identify first what needs to be protected"},"content":{"rendered":"<p>The approach to implementing enterprise cyber security often is skewed towards focus on control rather than \u201cwhat are we trying to protect?\u201d<\/p>\n<p>Most cybersecurity projects do not feature active involvement from the company\u2019s board and the business teams. Companies may attain a security certification but end up not focusing on protecting what needs to be protected, which is information and data, says Vittal Raj, an expert on cyber security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The approach to implementing enterprise cyber security often is skewed towards focus on control rather than \u201cwhat are we trying to protect?\u201d Most cybersecurity projects do not feature active involvement from the company\u2019s board and the business teams. Companies may attain a security certification but end up not focusing on protecting what needs to be protected, which is information and data, says Vittal Raj, an expert on cyber security.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-831423","post","type-post","status-publish","format-standard","hentry","category-newspapers"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/831423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=831423"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/831423\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=831423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=831423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=831423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}