{"id":11909,"date":"2014-12-02T20:55:00","date_gmt":"2014-12-02T20:55:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3248367"},"modified":"2014-12-02T20:55:00","modified_gmt":"2014-12-02T20:55:00","slug":"product-review-cyberoam-cr10ing-by-gretendave-cloud","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/product-review-cyberoam-cr10ing-by-gretendave-cloud\/","title":{"rendered":"Product Review: Cyberoam CR10iNG By @GretenDave [#Cloud]"},"content":{"rendered":"<p>Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations?<br \/>\nUnfortunately an increasing number of smaller companies find themselves at risk of infiltration, antivirus corruption, and data theft. Hackers are catching on that smaller offices are a softer target. Security in these organizations is generally looser as they often lack the financial resources for a comprehensive security system.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3248367\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security has long been thought the exclusive domain of large enterprises. Why would cyber-criminals bother with small and midsized companies when the big prizes are to be found hacking into large organizations?<br \/>\nUnfortunately an increasing number o&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-11909","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=11909"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/11909\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=11909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=11909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=11909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}