{"id":1,"date":"2020-02-03T20:05:00","date_gmt":"2020-02-03T20:05:00","guid":{"rendered":"http:\/\/ip2hg.com\/?p=1"},"modified":"2021-03-07T11:47:09","modified_gmt":"2021-03-07T11:47:09","slug":"cyber-security","status":"publish","type":"post","link":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/","title":{"rendered":"Business readiness in face of cyber threats"},"content":{"rendered":"<p>As organized crime is taking businesses hostage and extracting ransoms &#8211; it is crucial to be ready. This requires planning and verification of recovery plans.<\/p>\n<p>It is an exciting time of opportunity for many Small and Medium Businesses (SMBs) due to the availability of technology that helps market and distribute your products and service. It is also time of technology related security challenges.<\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As organized crime is taking businesses hostage and extracting ransoms &#8211; it is crucial to be ready. This requires planning and verification of recovery plans. It is an exciting time of opportunity for many Small and Medium Businesses (SMBs) due to the availability of technology that helps market and distribute your products and service. It&hellip; <a class=\"more-link\" href=\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\">Continue reading <span class=\"screen-reader-text\">Business readiness in face of cyber threats<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[9,12,11,10],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Business readiness in face of cyber threats - Inspired Path To Higher Ground<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business readiness in face of cyber threats - Inspired Path To Higher Ground\" \/>\n<meta property=\"og:description\" content=\"As organized crime is taking businesses hostage and extracting ransoms &#8211; it is crucial to be ready. This requires planning and verification of recovery plans. It is an exciting time of opportunity for many Small and Medium Businesses (SMBs) due to the availability of technology that helps market and distribute your products and service. It&hellip; Continue reading Business readiness in face of cyber threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Inspired Path To Higher Ground\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-03T20:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-07T11:47:09+00:00\" \/>\n<meta name=\"author\" content=\"admn1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admn1\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\"},\"author\":{\"name\":\"admn1\",\"@id\":\"https:\/\/ip2hg.com\/#\/schema\/person\/500de13973e17812ad1c8c931f15786b\"},\"headline\":\"Business readiness in face of cyber threats\",\"datePublished\":\"2020-02-03T20:05:00+00:00\",\"dateModified\":\"2021-03-07T11:47:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\"},\"wordCount\":70,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ip2hg.com\/#organization\"},\"keywords\":[\"cyber security\",\"data protection\",\"online security\",\"security\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\",\"url\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\",\"name\":\"Business readiness in face of cyber threats - Inspired Path To Higher Ground\",\"isPartOf\":{\"@id\":\"https:\/\/ip2hg.com\/#website\"},\"datePublished\":\"2020-02-03T20:05:00+00:00\",\"dateModified\":\"2021-03-07T11:47:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ip2hg.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business readiness in face of cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ip2hg.com\/#website\",\"url\":\"https:\/\/ip2hg.com\/\",\"name\":\"Inspired Path To Higher Ground - IP2HG\",\"description\":\"Cyber Security and IT consulting expertize\",\"publisher\":{\"@id\":\"https:\/\/ip2hg.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ip2hg.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ip2hg.com\/#organization\",\"name\":\"Inspired Path To Higher Ground\",\"url\":\"https:\/\/ip2hg.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ip2hg.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ip2hg.com\/wp-content\/uploads\/2021\/03\/mtrx-thmb.jpg\",\"contentUrl\":\"https:\/\/ip2hg.com\/wp-content\/uploads\/2021\/03\/mtrx-thmb.jpg\",\"width\":512,\"height\":512,\"caption\":\"Inspired Path To Higher Ground\"},\"image\":{\"@id\":\"https:\/\/ip2hg.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ip2hg.com\/#\/schema\/person\/500de13973e17812ad1c8c931f15786b\",\"name\":\"admn1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business readiness in face of cyber threats - Inspired Path To Higher Ground","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/","og_locale":"en_GB","og_type":"article","og_title":"Business readiness in face of cyber threats - Inspired Path To Higher Ground","og_description":"As organized crime is taking businesses hostage and extracting ransoms &#8211; it is crucial to be ready. This requires planning and verification of recovery plans. It is an exciting time of opportunity for many Small and Medium Businesses (SMBs) due to the availability of technology that helps market and distribute your products and service. It&hellip; Continue reading Business readiness in face of cyber threats","og_url":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/","og_site_name":"Inspired Path To Higher Ground","article_published_time":"2020-02-03T20:05:00+00:00","article_modified_time":"2021-03-07T11:47:09+00:00","author":"admn1","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admn1"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#article","isPartOf":{"@id":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/"},"author":{"name":"admn1","@id":"https:\/\/ip2hg.com\/#\/schema\/person\/500de13973e17812ad1c8c931f15786b"},"headline":"Business readiness in face of cyber threats","datePublished":"2020-02-03T20:05:00+00:00","dateModified":"2021-03-07T11:47:09+00:00","mainEntityOfPage":{"@id":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/"},"wordCount":70,"commentCount":0,"publisher":{"@id":"https:\/\/ip2hg.com\/#organization"},"keywords":["cyber security","data protection","online security","security"],"articleSection":["Cyber security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/","url":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/","name":"Business readiness in face of cyber threats - Inspired Path To Higher Ground","isPartOf":{"@id":"https:\/\/ip2hg.com\/#website"},"datePublished":"2020-02-03T20:05:00+00:00","dateModified":"2021-03-07T11:47:09+00:00","breadcrumb":{"@id":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ip2hg.com\/index.php\/2020\/02\/03\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ip2hg.com\/"},{"@type":"ListItem","position":2,"name":"Business readiness in face of cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/ip2hg.com\/#website","url":"https:\/\/ip2hg.com\/","name":"Inspired Path To Higher Ground - IP2HG","description":"Cyber Security and IT consulting expertize","publisher":{"@id":"https:\/\/ip2hg.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ip2hg.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ip2hg.com\/#organization","name":"Inspired Path To Higher Ground","url":"https:\/\/ip2hg.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ip2hg.com\/#\/schema\/logo\/image\/","url":"https:\/\/ip2hg.com\/wp-content\/uploads\/2021\/03\/mtrx-thmb.jpg","contentUrl":"https:\/\/ip2hg.com\/wp-content\/uploads\/2021\/03\/mtrx-thmb.jpg","width":512,"height":512,"caption":"Inspired Path To Higher Ground"},"image":{"@id":"https:\/\/ip2hg.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ip2hg.com\/#\/schema\/person\/500de13973e17812ad1c8c931f15786b","name":"admn1"}]}},"_links":{"self":[{"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":8,"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":98,"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/posts\/1\/revisions\/98"}],"wp:attachment":[{"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ip2hg.com\/index.php\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}