{"id":68237,"date":"2023-06-19T11:38:32","date_gmt":"2023-06-19T03:38:32","guid":{"rendered":"https:\/\/version-2.com\/?p=68237"},"modified":"2023-06-19T12:05:14","modified_gmt":"2023-06-19T04:05:14","slug":"creating-a-culture-of-cybersecurity-in-the-workplace","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/06\/creating-a-culture-of-cybersecurity-in-the-workplace\/","title":{"rendered":"Creating a culture of cybersecurity in the workplace"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"68237\" class=\"elementor elementor-68237\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/><\/p><article><p class=\"my-4 blog-paragraph text-still-dark-blue\">In an era marked by increased digital dependence and relentless cyber attacks, the significance of cultivating a cybersecurity-conscious culture in the workplace cannot be overstated. The awareness of cyber risks is the key factor influencing an organization&#8217;s resilience to the most prominent type of attack \u2014 social engineering. As security measures become more sophisticated, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/netskope-attackers-double-down-on-social-engineering-techniques-and-malicious-functionalities\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">hackers more often target people as the weakest link<\/a>.\u00a0<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1gCIsBFwMC4I09ixg18Ltn\/01a6b2c0f33021d0cb1d5c6ce818202f\/Most_targeted_industries_in_2022_web_1400x922.png?w=1400&amp;h=922&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"922\" \/><\/p><p><picture>This places cybersecurity culture at the forefront of workplace security procedures, including practices, threat awareness, and effective preparations to counter various risks. In this article, we&#8217;ll share our insights into the role that a human factor plays in information security and awareness.<\/picture><\/p><\/div><h2 id=\"why-is-cybersecurity-awareness-important\" class=\"Heading Heading-h2 text-dark-blue\">Why is cybersecurity awareness important?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity awareness <strong>has become crucial with the rise of cyber threats like phishing attacks, social engineering attacks, and data breaches<\/strong>. These threats disrupt business operations and can lead to the loss or theft of sensitive data, causing significant financial and reputational damage. Yet, more <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.citrix.com\/content\/dam\/citrix\/en_us\/documents\/analyst-report\/the-state-of-security-in-a-hybrid-work-environment.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">employees working remotely created an advantageous environment for various security threats<\/a>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">The significance of cybersecurity awareness is exemplified by <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/thehackernews.com\/2023\/02\/reddit-suffers-security-breach-exposing.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">the Reddit incident<\/a> that took place in early 2023. During this breach, the company fell victim to an advanced phishing attack, leading to the exposure of sensitive internal documents and source code.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">However, there was a positive aspect to this story. A vigilant employee who clicked on the malicious link swiftly recognized the ongoing attack and promptly alerted the internal security team. Thanks to their quick response, the cybercriminal&#8217;s access was limited, enabling the containment of the damage and safeguarding of the files, avoiding a full-scale data breach.<\/p><h2 id=\"main-ways-how-employees-put-companies-at-risk\" class=\"Heading Heading-h2 text-dark-blue\">Main ways how employees put companies at risk<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees can unintentionally expose companies to cyber threats in various ways. To make the challenge even bigger, bad actors often use psychological tactics, authority (CEO fraud), time pressure, and curiosity to trick employees.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This often happens due to a lack of knowledge, carelessness, or even malicious intent in some cases. Here are the most common ways this can happen:<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Phishing scams<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees may <strong>unknowingly open phishing emails and click on malicious links that infect their computers with malware or ransomware<\/strong>. These attacks often disguise themselves as emails from reputable sources. This is one of criminals&#8217; most commonly used tactics to steal sensitive information.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Weak or reused passwords<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees within an organization may <strong>use weak or reuse the same password for multiple accounts<\/strong>. This practice makes hackers&#8217; work much easier because all that&#8217;s needed is to try the identical combination on different websites to see if it works. If it does \u2014 a hacker can easily take over user&#8217;s digital identity, leading to data breaches and information spills. Strong passwords and two-factor authentication enforcement can help organizations to avoid such threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Unauthorized device usage<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees working remotely <strong>may use personal or unsecured devices to access company data<\/strong>. As businesses are increasingly adopting hybrid work and bring-your-own-device models, employees are less tied to their company-issued devices. However, when their devices lack proper security measures, this creates plenty of opportunities to mishandle sensitive data, including inappropriate sharing, insecure storage, or improper disposal. This creates a precedent for a huge variety of security threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Not updating software<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Outdated software is very <strong>likely to have security vulnerabilities that hackers can exploit<\/strong>. If employees fail to install updates and patches on their devices, it can put the entire network at risk. While enforcing these updates is possible for company-managed devices, it&#8217;s much more difficult to control devices that employees use personally.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Physical security breaches<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">In addition to digital breaches, physical security is also crucial. If employees leave devices unlocked or unattended or lose devices containing sensitive information, <strong>it can lead to data breaches<\/strong>. This issue is even more prevalent as more employees work remotely or in a hybrid environment \u2014 dividing time between the office and other places. Shoulder surfing is a technique hackers use to obtain confidential data by physically viewing the device screen and keypads.<\/p><h2 id=\"how-to-create-a-culture-of-cybersecurity-in-the-workplace\" class=\"Heading Heading-h2 text-dark-blue\">How to create a culture of cybersecurity in the workplace?<\/h2><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5ZVumRjgaBRhCnuGUdhyZp\/f8d342322dc6d8a2ceec490e1cabde51\/Methods_of_how_a_company_could_create_a_culture_of_cybersecurity_in_the_workplace_web_1400x880.png?w=1400&amp;h=880&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"880\" \/><\/p><p><picture>Despite the availability of sophisticated security systems, human error often remains the weakest link. This makes a robust culture of cybersecurity cultivation a necessity. Here are some tips on how to achieve this:<\/picture><\/p><\/div><h3 class=\"Heading Heading-h3 text-dark-blue\">1. Foster awareness<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">To adopt good cybersecurity practices, <strong>employees must first be acquainted with them<\/strong>. Cybersecurity awareness programs can help demystify cybersecurity and how it can affect the organization and its employees personally. Regular security training sessions should include real-life case studies of cyber-attacks and their consequences, along with clear, concise explanations of terms like phishing, malware, and ransomware.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">2. Incorporate cybersecurity into onboarding<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity training should not be an afterthought, but it<strong> should be integrated into the employee onboarding process<\/strong>. The sooner an employee becomes familiar with cybersecurity norms, the better. New hires are often targets for cybercriminals because of their elevated access permissions and limited knowledge of the company&#8217;s cybersecurity best practices. Early inclusion of cybersecurity training in the initial stages will help safeguard both an employee and the company (as well as remote workers).<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">3. Establish clear cybersecurity policies<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">A clear, accessible, and detailed cybersecurity policy should be at the top of any organization&#8217;s IT strategy list. These policies should cover password management, the use of personal devices, reporting suspicious activity, data sharing and storage, and more. Make sure that all employees are aware of these policies and know where to find them if they have doubts or questions. As the main document for the cybersecurity approach, <strong>this allows comprehensive reorganization and even enforcement of best cybersecurity practices<\/strong>.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">4. Promote a culture of openness<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees should be <strong>encouraged to report suspicious activity without the fear of blame<\/strong>. A culture focused on punishment rather than problem-solving can make people hide their errors and could escalate into significant security breaches. However, an atmosphere where employees feel comfortable sharing concerns or admitting mistakes allows for quicker threat mitigation. It serves as a valuable learning experience for everyone involved.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">5. Make cybersecurity everyone&#8217;s responsibility<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">A solid cybersecurity strategy is only possible with each employee understanding their role in preventing cyber threats. In the end, cybersecurity isn&#8217;t solely the IT department&#8217;s job. Each employee has a vital role in maintaining the security of the company&#8217;s data. Driving this point home can help <strong>build a mindset where everyone feels accountable for the organization&#8217;s cybersecurity<\/strong>.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">6. Involve leadership<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Like any other company-wide organizational initiative, a culture of cybersecurity has to be led from the top. The leadership team should endorse the cybersecurity program and actively participate in its implementation. <strong>This sends a clear message to all employees that cybersecurity is a priority <\/strong>and should be taken seriously at all levels of the organization.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">7. Regular training and updates<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The cyber threat landscape never stops evolving. The same knowledge that was relevant last year might be useless now. For this reason, it&#8217;s important to <strong>ensure that employees are aware of the latest threats and prevention measures <\/strong>and train them regularly. <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/sosafe-awareness.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cyber security awareness training<\/a> for your employees should cover new types of threats, updates in cybersecurity policies, and reinforcement of fundamental security practices. Regular security drills also help to keep employees alert and prepared for potential threats.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">8. Use technology to establish digital obstacles<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Implementing security tools and software to automate and enforce security policies helps to prevent or restrict certain employee actions that may pose security risks. Multi-factor authentication, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/identity-access-management\/\">IAM<\/a>, virtual private networks, regular automatic updates, and firewalls are just some of the tools that can help bolster cybersecurity. With these features, organizations can enhance their <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/zero-trust-security\/\">Zero Trust<\/a> cybersecurity posture and protect sensitive data and resources from unauthorized access or misuse.<\/p><h2 id=\"individual-roles-of-cybersecurity-culture-creation\" class=\"Heading Heading-h2 text-dark-blue\">Individual roles of cybersecurity culture creation<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Creating a culture of cybersecurity is a shared responsibility. This means that everyone, from top executives to individual remote employees, has a role to play. Once cybersecurity awareness is established in the workplace, it&#8217;s crucial to comprehend distinct responsibilities assigned to each person and ensure they are adequately prepared to fulfill their roles effectively.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Roles in the boardroom<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Based on a <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.eidebailly.com\/-\/media\/eide-bailly\/website-service\/cyber-security\/cybersecurity_research_paper_-_the_accountability_gap_-_executive_summary.ashx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">study by Tanium &amp; Nasdaq<\/a>, only 10% of board members believed they received consistent updates on cybersecurity threats to their business. While a board can be concerned about a myriad of risks, it&#8217;s crucial to discern the correct roles of a board in overseeing cybersecurity risk:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Prioritizing<\/strong>: Instruct management to give cybersecurity the attention it deserves and establish an attitude for the entire organization.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Assessing<\/strong>: Demand that the organization conducts an official evaluation of cybersecurity threats, employs external specialists and complies with instructions from an established risk-assessment structure.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Monitoring<\/strong>: Set the expectation for the board to receive regular updates on managing cybersecurity risks.<\/p><\/li><\/ul><h3 class=\"Heading Heading-h3 text-dark-blue\">Roles of executives<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Executive management is central when setting the course for an organization&#8217;s cybersecurity operations. Their starting aims should include treating cybersecurity as a key area, designing a cybersecurity plan of action, and allocating suitable resources (personnel and budget). Following this, they should persistently supervise, train, and modify their efforts to sustain best practices. Their responsibilities should encompass:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Organizing<\/strong>: Assign responsible individuals for organizing cybersecurity operations and security integration within everyday procedures.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Communicating<\/strong>: Advocate for the organization&#8217;s cybersecurity initiatives. When employees observe that executive management has prioritized cybersecurity, it naturally becomes a priority for everyone.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Preparing<\/strong>: Cybersecurity risk management schemes are incomplete without contingency plans to respond to an incident or breach in your environment. Creating an incident response team is necessary, which might include a third-party forensic accountant.<\/p><\/li><\/ul><h3 class=\"Heading Heading-h3 text-dark-blue\">Roles of staff members<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Every individual in an organization has a part to play in mitigating risks associated with phishing emails, spyware, ransomware, and other threats to the company\u2019s critical information assets. Key methods for curbing social engineering and employee-related threats comprise:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Training<\/strong>: Participate in all staff training sessions on using company equipment and resources appropriately.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Awareness<\/strong>: Provide regular updates about cybercrime trends. Stronger awareness increases caution and lessens various risks.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Confirmation<\/strong>: Exercise caution before opening attachments or clicking on email links, especially those originating from unknown sources.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Each person in an organization plays a vital role in the cybersecurity risk management plan. The most effective of them considers defining the appropriate responsibilities and duties for every employee for small businesses and corporate entities alike.<\/p><h2 id=\"how-can-we-help-protect-your-employees\" class=\"Heading Heading-h2 text-dark-blue\">How can we help protect your employees?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cybersecurity threats follow your employees everywhere. A culture of cybersecurity can dramatically improve an organization&#8217;s resilience against various attack types, but it&#8217;s not enough. Unsecured Wi-Fi networks, file sharing, and phishing are real risks, and technological solutions combined with well-trained staff is the only cure.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This is why we\u2019ve teamed up with our friends at <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/sosafe-awareness.com\/product-demo\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SoSafe<\/a>, one of the leading cybersecurity awareness training providers. With behavioral science and enterprise focus in their DNA, SoSafe creates automated and engaging cyber security awareness training programs and phishing simulations at scale. Effectively handle your human risk with minimal involvement.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\"><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/secure-internet-access\/\">NordLayer can make internet access security easier<\/a>, protecting sensitive information in transit, mitigating cyber threats, ensuring regulatory compliance and business operations continuity. By blocking access to <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/blog\/what-are-malicious-websites\/\">malicious websites<\/a> and controlling entry to specific content categories, NordLayer allows global business exploration and guarantees the confidentiality of users&#8217; and resources&#8217; true location.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">As cyber threats evolve, so must our risk management strategies. <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/contact-sales\/\">Contact NordLayer<\/a> to reinforce your security protection.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In an era marked by increased digital dependence and re [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,973,1075,61],"tags":[1132,974,1076],"class_list":["post-68237","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-nord-security","category-year2023","category-press-release","tag-nordlayer","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Creating a culture of cybersecurity in the workplace - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Creating a culture of cybersecurity in the workplace - Version 2\" \/>\n<meta property=\"og:description\" content=\"In an era marked by increased digital dependence and re [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-19T03:38:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-19T04:05:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/creating-a-culture-of-cybersecurity-in-the-workplace\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Creating a culture of cybersecurity in the workplace\",\"datePublished\":\"2023-06-19T03:38:32+00:00\",\"dateModified\":\"2023-06-19T04:05:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/creating-a-culture-of-cybersecurity-in-the-workplace\\\/\"},\"wordCount\":1876,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5f5MZwVntZSAYXYGdD4wVB\\\/32838205820d1f418cda56a0080870b7\\\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"Nord Security\",\"2023\"],\"articleSection\":[\"NordLayer\",\"Nord Security\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/06\\\/creating-a-culture-of-cybersecurity-in-the-workplace\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/\",\"name\":\"Creating a culture of cybersecurity in the workplace - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5f5MZwVntZSAYXYGdD4wVB\\\/32838205820d1f418cda56a0080870b7\\\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-06-19T03:38:32+00:00\",\"dateModified\":\"2023-06-19T04:05:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5f5MZwVntZSAYXYGdD4wVB\\\/32838205820d1f418cda56a0080870b7\\\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5f5MZwVntZSAYXYGdD4wVB\\\/32838205820d1f418cda56a0080870b7\\\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/creating-a-culture-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Creating a culture of cybersecurity in the workplace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Creating a culture of cybersecurity in the workplace - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Creating a culture of cybersecurity in the workplace - Version 2","og_description":"In an era marked by increased digital dependence and re [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/","og_site_name":"Version 2","article_published_time":"2023-06-19T03:38:32+00:00","article_modified_time":"2023-06-19T04:05:14+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/06\/creating-a-culture-of-cybersecurity-in-the-workplace\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Creating a culture of cybersecurity in the workplace","datePublished":"2023-06-19T03:38:32+00:00","dateModified":"2023-06-19T04:05:14+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/06\/creating-a-culture-of-cybersecurity-in-the-workplace\/"},"wordCount":1876,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["NordLayer","Nord Security","2023"],"articleSection":["NordLayer","Nord Security","2023","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/06\/creating-a-culture-of-cybersecurity-in-the-workplace\/","url":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/","name":"Creating a culture of cybersecurity in the workplace - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-06-19T03:38:32+00:00","dateModified":"2023-06-19T04:05:14+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5f5MZwVntZSAYXYGdD4wVB\/32838205820d1f418cda56a0080870b7\/Creating_a_Culture_of_Cybersecurity_in_the_Workplace_cover_web_1400x800__1_.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/creating-a-culture-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Creating a culture of cybersecurity in the workplace"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hKB","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=68237"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68237\/revisions"}],"predecessor-version":[{"id":68241,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/68237\/revisions\/68241"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=68237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=68237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=68237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}