{"id":57925,"date":"2022-09-07T17:41:54","date_gmt":"2022-09-07T09:41:54","guid":{"rendered":"https:\/\/version-2.com\/?p=57925"},"modified":"2022-09-29T17:41:07","modified_gmt":"2022-09-29T09:41:07","slug":"cyber-defense-for-business-mapping-pain-areas-and-securing-them","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/09\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\/","title":{"rendered":"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"57925\" class=\"elementor elementor-57925\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSometimes cyberattacks just seem to happen. Even in those instances, when you have: some cybersecurity measures in place and your employees know of good cybersecurity hygiene.\n\n<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png\" width=\"1200\" height=\"655\" \/>\n<div class=\"Article_wrapper__2ddM4\">\n<p class=\"text-base leading-normal\">The Defensive Strategist at Nord Security, Adrianus Warmenhowen, points out that having systems in place often is not enough. They may protect your company at an 80% or 90% rate, but good hackers will target your weak points. Therefore, in this interview, he explains how organizations can identify their vulnerabilities and what are the best ways to secure those pain areas.<\/p>\n\n<h2 id=\"Tech person by nature\" class=\"text-h2 leading-none text-left\"><b>Tech person by nature<\/b><\/h2>\n<p class=\"text-base leading-normal\"><b>First, could you tell us a bit about your role here at Nord Security?<\/b><\/p>\n<p class=\"text-base leading-normal\">At Nord Security, I am a Defensive Strategist, meaning I advise on areas that need a strategic focus on the protection of customers.<\/p>\n<p class=\"text-base leading-normal\"><b>Could you give us a brief overview of your career path?<\/b><\/p>\n<p class=\"text-base leading-normal\">I started my journey with the internet and cybersecurity in the middle of the 1980s. And since then, I&#8217;ve had many adventures along the way. I\u2019ve helped in the pioneering years of the internet, where cybersecurity kind of crept into my daily responsibilities, and soon after, hacking became another area of interest for me.<\/p>\n<p class=\"text-base leading-normal\">Earlier in my career, I worked with the aviation industry, electric companies on high voltage equipment, satellites, and more.<\/p>\n\n<h2 id=\"The growing cyber threat to companies\" class=\"text-h2 leading-none text-left\"><b>The growing cyber threat to companies<\/b><\/h2>\n<p class=\"text-base leading-normal\"><b>2021 was a record-breaking year with a <\/b><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.forbes.com\/sites\/chuckbrooks\/2022\/06\/03\/alarming-cyber-statistics-for-mid-year-2022-that-you-need-to-know\/?sh=6c1f438c7864\" target=\"_blank\" rel=\"noopener noreferrer\"><b>50% increase<\/b><\/a><b> in corporate cyberattacks. What do you think are the major reasons behind it?<\/b><\/p>\n<p class=\"text-base leading-normal\">The pandemic in the first place. People had less mental &#8216;back-up&#8217; from colleagues while working from home.<\/p>\n<p class=\"text-base leading-normal\">In general, the past years felt for me like a watershed moment for criminals in how to conduct cyberattacks with a return on investment: cybercrime got professional.<\/p>\n<p class=\"text-base leading-normal\"><b>What are the most common types of cyberattacks that companies are exposed to, and what disruptions can they cause?<\/b><\/p>\n<p class=\"text-base leading-normal\">In general, companies are most likely to experience either ransomware or (d)DOS attacks. Ransomware because it pays the criminal well, and denial-of-service attacks because people want to be actionable instead of just doing more talking.<\/p>\n<p class=\"text-base leading-normal\">However, those cyberattacks that cause no direct disruptions are actually the ones you should worry about. By this, I mean information stealing. It can range from intellectual property to bid books, from vendor assessments to information on where you buy your hardware. That last one is important for supply-chain poisoning.<\/p>\n<p class=\"text-base leading-normal\"><b>How do cybercriminals identify which companies or employees will be their next targets? Where and how are they looking for pain points they could exploit?<\/b><\/p>\n<p class=\"text-base leading-normal\">Well, when a vulnerability comes out that is remotely exploitable, then search engines like Shodan or BinaryEdge can be used to identify potential victims quickly. A good example of such a case is the <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-07-10\/kaseya-failed-to-address-security-before-hack-ex-employees-say#xj4y7vzkg\" target=\"_blank\" rel=\"noopener noreferrer\">Kaseya<\/a> or <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.businessinsider.com\/solarwinds-hack-explained-government-agencies-cyber-security-2020-12\" target=\"_blank\" rel=\"noopener noreferrer\">Solar Winds<\/a> debacle.<\/p>\n<p class=\"text-base leading-normal\">As for ransomware, an organization&#8217;s digital footprint is one of the ways attackers can target their victims and plan their attacks. For instance, monitoring a company&#8217;s LinkedIn page can give an insight into the churn and the rate at which people get hired\/leave the company. If a company has a high churn rate, there will be many inexperienced and\/or disgruntled people. That is the perfect phishing spot or moment to try a CEO fraud.<\/p>\n<p class=\"text-base leading-normal\">Sites like Glassdoor are also good for gathering this kind of information. Another valuable source of information can also be announcements of new partnerships or acquisitions.<\/p>\n\n<h2 id=\"Identifying pain points and securing them\" class=\"text-h2 leading-none text-left\"><b>Identifying pain points and securing them<\/b><\/h2>\n<p class=\"text-base leading-normal\"><b>How can companies best identify their pain points? How should they look for them?<\/b><\/p>\n<p class=\"text-base leading-normal\">One of the most effective ways is to <b>get someone from the outside looking in<\/b>. And by that, I mean someone who will be searching not for the solutions to the problems but for vulnerabilities and unprotected areas that your company has.<\/p>\n<p class=\"text-base leading-normal\">The truth is that we all rather run through our \u201chappy paths\u201d to do our work and are just glad we can avoid the day-to-day pitfalls of what we are doing. But for the sake of security, we really should take the pain and enumerate as much as possible what could go wrong and why. For that, an outsider can usually help. Just don&#8217;t get me wrong. I don&#8217;t mean &#8220;hire a pentester and be done with it.&#8221; The pentester will probably find something, but not all the things that make &#8220;you being at risk.&#8221;<\/p>\n<p class=\"text-base leading-normal\">A really good starting point could be to <b>leverage your audits<\/b> if you have certifications. An auditor is quite meticulous (if you have a good one), and an audit process is pretty transparent to all involved because all shortcomings are discussed during this procedure.<\/p>\n<p class=\"text-base leading-normal\">After an audit and the subsequent resolution of any issues found, various specialists can be used to target specific areas. That could be a pentester, pickpocket, or lockpicker (depending on your business type). Finally, if your company discusses a lot of sensitive information, then you might want to set up a spying operation on yourself.<\/p>\n<p class=\"text-base leading-normal\">Also,<b> set up a permanent bug bounty program<\/b> so that well-willing people can report to you if they find anything out of the ordinary.<\/p>\n<p class=\"text-base leading-normal\">But above all, start with a &#8220;cleaning out the crud&#8221; session.<\/p>\n<p class=\"text-base leading-normal\"><b>What measures or actions should businesses take to protect themselves from potential cyber threats?<\/b><\/p>\n\n<ol>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Organize and systemize everything you have.<\/b><\/p>\n<p class=\"text-base leading-normal\">For your tech, have a form of CMDB (Configuration management database) with ownership (for risk acceptance). For your personnel, have proper onboarding\/offboarding procedures. And make transfers like offboarding-&gt;onboarding so you can avoid accrual rights. Make sure you spot unhappy employees and unhappy customers &#8211; document this (but keep their privacy decent). Even if you are a small business, know your battlefield.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Do regular updates and patches. <\/b><\/p>\n<p class=\"text-base leading-normal\">For instance, have every odd-week Tuesday be your patch day. Always reserve that time. If nothing is to be patched, use that time to review vendors and check if anything approaches end-of-life and such.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b> Use <\/b><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordlocker.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>encryption<\/b><\/a><b> everywhere. <\/b><\/p>\n<p class=\"text-base leading-normal\">A VPN will help make your infrastructure less visible to attackers and protect you during client meetings, lunch discussions, or work-from-anywhere.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Use an antivirus. <\/b><\/p>\n<p class=\"text-base leading-normal\">Even if it is unused 99.9%, you will be happy for that one single time it blocks ransomware.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Use offline rotating backups for your most important data. <\/b><\/p>\n<p class=\"text-base leading-normal\">A couple of SSDs should be able to hold a backup of most of your documents and probably even export your database. At the very least, keep a copy of all the contact information of your customers and employees with an offline backup.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Use a <\/b><a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/nordpass.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>password manager<\/b><\/a><b>. <\/b><\/p>\n<p class=\"text-base leading-normal\">Secure that password manager with a passphrase (a sentence, maybe from a book you liked, a song, or a poem). The reason for using a password manager is simple, SSO is not available everywhere, and using OAuth gives away a lot of information to your identity provider. And some websites simply need a separate account\/log-in.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Have regular security meetups<\/b> with employees to check what is new, what is wrong, and what to do about it.<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Keep in mind that there is always something to protect. <\/b>Make a policy that explicitly states: that if there is no budget for securing something, it is automatically a risk accepted by the board.<\/p>\n\n<\/div><\/li>\n<\/ol>\n<p class=\"text-base leading-normal\"><b>On what things should organizations focus on when mapping their cyber battlefield and building up their cyber defenses?<\/b><\/p>\n\n<ol>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>Knowledge. <\/b><\/p>\n<p class=\"text-base leading-normal\">Know what you have, what connects to what and why (do you really need plugins in Slack or Jira, or are they &#8220;just&#8221; quality of life improvements), who has access to what and why (and, very important &#8211; from when to when). What software runs on what, and does it really need to be accessible from the outside world.<\/p>\n&nbsp;\n<p class=\"text-base leading-normal\">Really, take the pain and map out what you have now and then adjust your processes so that this knowledge is updated all the time. Do a two-yearly check if everything is as it is documented.<\/p>\n&nbsp;\n<p class=\"text-base leading-normal\">Don\u2019t fall into the &#8220;productivity fallacy&#8221; trap &#8211; all arguments there are comparable to removing the safety measures of your car so that you can drive faster. It might seem the right thing when you blast across the highway doing 200, but the crash when you did not turn out to be Max Verstappen will be much more devastating. This goes for cybersecurity all the same: you might feel like the proper business king when you outdo your competition in time-to-market, but when it goes wrong, it is not just you. It is your clients&#8217; lives as well that get mangled in the &#8220;incident.&#8221;<\/p>\n\n<\/div><\/li>\n \t<li class=\"ml-20\">\n<div>\n<p class=\"text-base leading-normal\"><b>On processes and audit trails.<\/b><\/p>\n<p class=\"text-base leading-normal\">The audit trails are an essential part of the knowledge because they document what is changing in our current state of knowledge.<\/p>\n&nbsp;\n<p class=\"text-base leading-normal\">Processes make things predictable and reliable. A process does not have to be an oppressive set of micromanagement instructions but can be as simple as &#8220;for each system in our CMDB, do a security check and document it.&#8221; In fact, the most crucial part of a process is not the steps within it but the interfaces with other processes, input, and output. Whenever there is a handover, it pays to check the CIA triad (Confidentiality, Integrity, Availability) and what the handover means to each of these.<\/p>\n&nbsp;\n<p class=\"text-base leading-normal\">Also, to dispel a myth: you can have an open culture and still be very good at keeping things a secret. It should be normalized that you can tell your co-workers, &#8220;I can not tell because of confidentiality,&#8221; because it simply means those co-workers are not instrumental in that specific case. If they were, access would be granted when needed.<\/p>\n\n<\/div><\/li>\n<\/ol>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"54571\" class=\"elementor elementor-54571\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Nord Security<\/strong><br \/>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Sometimes cyberattacks just seem to happen. Even in tho [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,488,61],"tags":[974,489],"class_list":["post-57925","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-488","category-press-release","tag-nord-security","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM - Version 2\" \/>\n<meta property=\"og:description\" content=\"Sometimes cyberattacks just seem to happen. Even in tho [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-07T09:41:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-29T09:41:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM\",\"datePublished\":\"2022-09-07T09:41:54+00:00\",\"dateModified\":\"2022-09-29T09:41:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\\\/\"},\"wordCount\":1590,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/09\\\/Blog_image_size_1280x720_1.png\",\"keywords\":[\"Nord Security\",\"2022\"],\"articleSection\":[\"Nord Security\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/09\\\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\\\/\",\"url\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business\",\"name\":\"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/09\\\/Blog_image_size_1280x720_1.png\",\"datePublished\":\"2022-09-07T09:41:54+00:00\",\"dateModified\":\"2022-09-29T09:41:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#primaryimage\",\"url\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/09\\\/Blog_image_size_1280x720_1.png\",\"contentUrl\":\"https:\\\/\\\/res.cloudinary.com\\\/nordsec\\\/f_auto,c_limit,w_1200,q_auto\\\/v1\\\/nord-security-web\\\/blog\\\/categories\\\/cybersecurity\\\/2022\\\/09\\\/Blog_image_size_1280x720_1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordsecurity.com\\\/blog\\\/cyber-defense-for-business#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business","og_locale":"en_US","og_type":"article","og_title":"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM - Version 2","og_description":"Sometimes cyberattacks just seem to happen. Even in tho [&hellip;]","og_url":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business","og_site_name":"Version 2","article_published_time":"2022-09-07T09:41:54+00:00","article_modified_time":"2022-09-29T09:41:07+00:00","og_image":[{"url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/09\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM","datePublished":"2022-09-07T09:41:54+00:00","dateModified":"2022-09-29T09:41:07+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/09\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\/"},"wordCount":1590,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png","keywords":["Nord Security","2022"],"articleSection":["Nord Security","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/09\/cyber-defense-for-business-mapping-pain-areas-and-securing-them\/","url":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business","name":"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#primaryimage"},"image":{"@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#primaryimage"},"thumbnailUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png","datePublished":"2022-09-07T09:41:54+00:00","dateModified":"2022-09-29T09:41:07+00:00","breadcrumb":{"@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#primaryimage","url":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png","contentUrl":"https:\/\/res.cloudinary.com\/nordsec\/f_auto,c_limit,w_1200,q_auto\/v1\/nord-security-web\/blog\/categories\/cybersecurity\/2022\/09\/Blog_image_size_1280x720_1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/nordsecurity.com\/blog\/cyber-defense-for-business#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"CYBER DEFENSE FOR BUSINESS: MAPPING PAIN AREAS AND SECURING THEM"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-f4h","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/57925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=57925"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/57925\/revisions"}],"predecessor-version":[{"id":57929,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/57925\/revisions\/57929"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=57925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=57925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=57925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}