{"id":42585,"date":"2021-10-16T16:09:38","date_gmt":"2021-10-16T08:09:38","guid":{"rendered":"https:\/\/version-2.com\/?p=42585"},"modified":"2022-08-19T15:17:09","modified_gmt":"2022-08-19T07:17:09","slug":"the-difference-between-remediation-and-mitigation","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/10\/the-difference-between-remediation-and-mitigation\/","title":{"rendered":"The Difference Between Remediation and Mitigation"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"42585\" class=\"elementor elementor-42585\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p>\nMitigation and remediation are two words that are used a lot in cybersecurity. Most times they are used interchangeably. Although there is a stark contrast between them, both play a major role in security service providers\u2019 risk-related decisions. In this post, we will take a closer look at both strategies and how threat intelligence contributes to each.\n<h4><strong>Mitigation Versus Remediation: Knowing the Differences<\/strong><\/h4>\nRemediation and mitigation are both a direct result of risk assessment, following the discovery of a new or advanced persistent threat (APT). Remediation involves the removal of threat when it can be eliminated. On the other hand, mitigation involves creating tactics to reduce a threat\u2019s negative impact when it cannot be eliminated.\n\nRemediation is straightforward because it ascertains attack patterns using indicators of compromise (IoCs). For instance, when a scan catches a vulnerability, it has to be patched effectively in order to prevent malicious individuals from exploiting it. The immediate objective of vulnerability remediation is to stop threats from entering the network by closing security holes.\n\nIn mitigation, removing the threat is non-negotiable, as it may lead to service disruption. Mitigation involves conducting risk assessments in order to measure the risk profile of a specific threat and ensure that the remaining risks are acceptable. Unlike remediation, a vulnerability can be left unaddressed for the time being provided it does not present offensive risks or threats.\n\nOnce a vulnerability has been discovered, the best solution is to remediate it. In other words, allow IT professionals or IT administrators to fix or patch the vulnerability before it can become a security threat. Generally, it\u2019s the organization\u2019s IT security team, system administrators and system owners who come together to know which actions are suitable.\n\nRemediation can be as complex as replacing a fleet of physical servers across an organization\u2019s network or as simple as applying a readily available software patch. When remediation activities are finalized, it\u2019s best to always run another vulnerability scan to confirm that the vulnerability has been fully resolved.\n\nNevertheless, sometimes remediation is not possible, for many reasons. Firstly, not all vulnerabilities need to be fixed. For instance, if the vulnerability is identified in Adobe Flash Player but the use of Flash Player is already disabled in all applications and web browsers company-wide, there is no need for action. Also, sometimes you may be prevented from taking remediation action by a technology issue, where a patch is not yet available for the vulnerability in question.\n\nOther times, you may experience setbacks from your own organization. This often occurs when a vulnerability is on a customer-facing system and your company wants to avoid the downtime needed to patch a vulnerability.\n\nIn those cases, the concept of mitigation will come into play. That\u2019s a process that reduces the likelihood of a vulnerability being exploited. For instance, distributed denial-of-service (DDoS) mitigation can route suspicious traffic to a centralized location where it is filtered.\n\nGenerally, mitigation is not the final step in dealing with a vulnerability. It\u2019s more of a way to buy time for the company to either wait for the technology to be released or find a more suitable time to schedule downtime in the system. In the long run, fixing a network security issue is better than blocking the port that could expose it.\n<h4><strong>How Mitigation and Remediation Figure in the Kill Chain<\/strong><\/h4>\nNowadays, organizations know better. Rather than assume their applications are impenetrable, they are searching for proactive ways to uncover ongoing attacks through computer forensics, penetration testing or threat intelligence.\n\nTherefore, many IT security experts understand that they need to go beyond the kill chain model to more effectively address attacks. Their solution is through mitigation and remediation techniques guided by the fact that attacks do not stop with interruption.\n\nLet\u2019s take a closer look at the steps in a kill chain:\n<ol>\n \t<li><strong>Reconnaissance<\/strong>:\u00a0Attackers research the target by looking at public Internet records for expired domains or certificates they can use for attacks.<\/li>\n \t<li><strong>Weaponization<\/strong>:\u00a0Once weaknesses are spotted in the target\u2019s network, cyber attackers create the payload they will use to infiltrate defenses.<\/li>\n \t<li><strong>Delivery<\/strong>:\u00a0This is the actual act of delivering a malicious payload. Links embedded in spam, phishing emails or malware-laced email attachments are normally used.<\/li>\n \t<li><strong>Exploitation<\/strong>:\u00a0This only occurs when attackers choose to enter a network by abusing a vulnerability in a system or connected device.<\/li>\n \t<li><strong>Installation<\/strong>:\u00a0Attackers install malware on a vulnerable system in the network to elevate access privileges, steal data or gain control.<\/li>\n \t<li><strong>Command and Control<\/strong>:\u00a0This involves the use of a command and control server to communicate with infected hosts within the target\u2019s network.<\/li>\n \t<li><strong>Actions on Objectives<\/strong>:\u00a0Attackers deliver the final blow to the target network, often by exfiltrating data or shutting down operations.<\/li>\n<\/ol>\nKnowing the elements that make up the kill chain allows cybersecurity professionals to take the right action to prevent attacks. Incident responders can redirect bad traffic to black holes during an ongoing DDoS attack. Additionally, if a similar incident occurs in the future, the best practices they followed in the past can be reapplied, reducing damage and downtime.\n<h4><strong>How Threat Intelligence Improves Both Processes<\/strong><\/h4>\nIT security experts depend on threat feeds to offer actionable intelligence for their mitigation or vulnerability remediation techniques. Threats are often documented in publicly available databases. To make sense of innumerable datasets, they can use aggregated threat intelligence for faster mitigation and remediation. External data feeds give cybersecurity specialists access to accurate and real-time information which include the following:\n<ol>\n \t<li>Secure Sockets Layer (SSL) vulnerabilities and misconfigurations that could be signs of malicious connections.<\/li>\n \t<li>Domain infrastructure data that reveals registrants, organization data, email addresses and other information, which may be tied to ongoing publicized attacks.<\/li>\n \t<li>Reputation scores to know how safe or unsafe accessing a particular domain is.<\/li>\n \t<li>A list of domains that resolve to a particular IP address and could reveal ties between both known and unknown malicious hosts.<\/li>\n<\/ol>\nThreat intelligence empowers security experts by giving them access to structured data to support their remediation and mitigation processes. While policy exceptions and other controls may hold them back from implementing remediation methods, threat intelligence enables them to gain better visibility into all potential attack vectors.\n\nIf you need a cybersecurity tool for vulnerability remediation, vulnerability mitigation and protecting your data against cyber threats, choose Vicarius.\u00a0Vicarius\u00a0is a vulnerability management software that targets cybersecurity officers and operators, as well as IT managers and operators from the U.S. market.\n\n&nbsp;\n\nPhoto by\u00a0Alice Yamamura\u00a0on\u00a0Unsplash\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"39690\" class=\"elementor elementor-39690\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><b>About VRX<\/b><br><b>VRX&nbsp;<\/b>is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Mitigation and remediation are two words that are used  [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[461,476,61],"tags":[462,477],"class_list":["post-42585","post","type-post","status-publish","format-standard","hentry","category-year2021","category-vrx","category-press-release","tag-462","tag-vrx"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Difference Between Remediation and Mitigation - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2021\/10\/the-difference-between-remediation-and-mitigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Difference Between Remediation and Mitigation - Version 2\" \/>\n<meta property=\"og:description\" content=\"Mitigation and remediation are two words that are used [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2021\/10\/the-difference-between-remediation-and-mitigation\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-16T08:09:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-19T07:17:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"The Difference Between Remediation and Mitigation\",\"datePublished\":\"2021-10-16T08:09:38+00:00\",\"dateModified\":\"2022-08-19T07:17:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/\"},\"wordCount\":1094,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/f.hubspotusercontent40.net\\\/hubfs\\\/2821246\\\/Frame%20110.png\",\"keywords\":[\"2021\",\"vRx\"],\"articleSection\":[\"2021\",\"vRx\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/\",\"name\":\"The Difference Between Remediation and Mitigation - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/f.hubspotusercontent40.net\\\/hubfs\\\/2821246\\\/Frame%20110.png\",\"datePublished\":\"2021-10-16T08:09:38+00:00\",\"dateModified\":\"2022-08-19T07:17:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/f.hubspotusercontent40.net\\\/hubfs\\\/2821246\\\/Frame%20110.png\",\"contentUrl\":\"https:\\\/\\\/f.hubspotusercontent40.net\\\/hubfs\\\/2821246\\\/Frame%20110.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/10\\\/the-difference-between-remediation-and-mitigation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Difference Between Remediation and Mitigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Difference Between Remediation and Mitigation - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2021\/10\/the-difference-between-remediation-and-mitigation\/","og_locale":"en_US","og_type":"article","og_title":"The Difference Between Remediation and Mitigation - Version 2","og_description":"Mitigation and remediation are two words that are used [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2021\/10\/the-difference-between-remediation-and-mitigation\/","og_site_name":"Version 2","article_published_time":"2021-10-16T08:09:38+00:00","article_modified_time":"2022-08-19T07:17:09+00:00","og_image":[{"url":"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"The Difference Between Remediation and Mitigation","datePublished":"2021-10-16T08:09:38+00:00","dateModified":"2022-08-19T07:17:09+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/"},"wordCount":1094,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png","keywords":["2021","vRx"],"articleSection":["2021","vRx","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/","url":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/","name":"The Difference Between Remediation and Mitigation - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#primaryimage"},"thumbnailUrl":"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png","datePublished":"2021-10-16T08:09:38+00:00","dateModified":"2022-08-19T07:17:09+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#primaryimage","url":"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png","contentUrl":"https:\/\/f.hubspotusercontent40.net\/hubfs\/2821246\/Frame%20110.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/10\/the-difference-between-remediation-and-mitigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The Difference Between Remediation and Mitigation"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-b4R","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=42585"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42585\/revisions"}],"predecessor-version":[{"id":42589,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/42585\/revisions\/42589"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=42585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=42585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=42585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}