{"id":16858,"date":"2015-08-27T12:36:09","date_gmt":"2015-08-27T12:36:09","guid":{"rendered":"http:\/\/blog.greenpages.com\/?p=5417"},"modified":"2015-08-27T12:36:09","modified_gmt":"2015-08-27T12:36:09","slug":"the-hacked-landscape-protecting-your-organization-from-modern-threats","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/the-hacked-landscape-protecting-your-organization-from-modern-threats\/","title":{"rendered":"The Hacked Landscape: Protecting Your Organization from Modern Threats"},"content":{"rendered":"<p>Security is one of, if not the, top concerns among IT professionals. Every week it seems a new, widely publicized breach occurs. Some vendors claim to have a\u00a0silver bullet solution that is a cure-all for every security need. But is that the case? In this video, I talk about the current &#8220;hacked landscape,&#8221; how preventative measures to keeping information safe has changed, and the approach organizations should be taking to security.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/DwKHs21l6hk?feature=oembed\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><em>Interested in speaking more with Dan about security? <a href=\"mailto:socialmedia@greenpages.com\" >Reach out<\/a>!<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>By Dan Allen, Solutions Architect<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=PuEcijUAsvQ:1HybfLnQY7A:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=PuEcijUAsvQ:1HybfLnQY7A:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=PuEcijUAsvQ:1HybfLnQY7A:-BTjWOF_DHI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=PuEcijUAsvQ:1HybfLnQY7A:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=PuEcijUAsvQ:1HybfLnQY7A:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=PuEcijUAsvQ:1HybfLnQY7A:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/JourneyToTheCloud\/~4\/PuEcijUAsvQ\" height=\"1\" width=\"1\" alt=\"\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is one of, if not the, top concerns among IT professionals. Every week it seems a new, widely publicized breach occurs. Some vendors claim to have a&nbsp;silver bullet solution that is a cure-all for every security need. But is that the case? In this video, I talk about the current &ldquo;hacked landscape,&rdquo; how preventative&hellip;<a href=\"http:\/\/blog.greenpages.com\/featured\/the-hacked-landscape-protecting-your-organization-from-modern-threats\/\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[179,1315,3327],"tags":[118],"class_list":["post-16858","post","type-post","status-publish","format-standard","hentry","category-featured","category-hacking","category-networking-security","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=16858"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16858\/revisions"}],"predecessor-version":[{"id":16915,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/16858\/revisions\/16915"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=16858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=16858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=16858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}