{"id":50435,"date":"2022-05-31T09:07:47","date_gmt":"2022-05-31T01:07:47","guid":{"rendered":"https:\/\/version-2.com\/?p=50435"},"modified":"2022-06-08T17:40:22","modified_gmt":"2022-06-08T09:40:22","slug":"the-new-us-cybersecurity-act-what-it-means","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/05\/the-new-us-cybersecurity-act-what-it-means\/","title":{"rendered":"The New US Cybersecurity Act &#038; What it Means"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50435\" class=\"elementor elementor-50435\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1\" alt=\"\" height=\"128\" width=\"204\"><\/p>\n<p>If you face a major cyber attack or pay ransom to attackers, you may have to report it to the Cybersecurity and Infrastructure Security Agency (<a href=\"http:\/\/cisa.gov\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">CISA<\/a>) within a certain timeframe under the new cybersecurity law .<\/p><p>The <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/senate-bill\/3600\/all-info#:~:text=Passed%20Senate%20(03%2F01%2F2022)&amp;text=This%20bill%20addresses%20cybersecurity%20threats,assessments%20of%20federal%20risk%20posture.\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Strengthening American Cybersecurity Act of 2022<\/a>, which became law in March 2022, imposes strict reporting obligations on critical infrastructure owners\/operators: Entities operating and\/or owning critical infrastructure have to notify the CISA of the ransomware payment within 24 hours and of the major cyber incidents within 72 hours.<\/p><p>Who is covered by the new requirements? When and how are cyber incidents reported under the new law? Keep reading to find out more.<\/p><h3><b>What is Strengthening American Cybersecurity Act of 2022?&nbsp;<\/b><\/h3><p>Although the new requirements on incident-reporting makes the headlines, the new cyber security law is composed of three separate regulations:<\/p><ol><li><b>The Cyber Incident Reporting for Critical Infrastructure Act of 2022: <\/b>This regulation imposes on critical infrastructure operators the obligation to notify the CISA of \u201ccovered cyber incidents\u201d and \u201cransom payments\u201d within a certain timeframe.<\/li><li><b>The Federal Information Security Modernization Act of 2022: <\/b>This regulation contains requirements on federal information security management and on reporting of cyber attacks and how these attacks will be remedied<\/li><li><b>The Federal Secure Cloud Improvement and Jobs Act of 2022: <\/b>This regulation deals with the security requirements for the use of cloud products.<\/li><\/ol><h3><b>What Entities Are Covered<\/b> in the Cybersecurity Act?<\/h3><p>Under the new law, the CISA will have the power to decide what types of entities will be subject to the new incident-reporting requirements.<\/p><p>While the CISA is provided with wide discretion, the law requires the CISA to consider the following three factors when determining the \u201ccovered entities\u201d:<\/p><ul><li>How would national security, public safety, and public health be affected if an entity\u2019s operations are disrupted or compromised<\/li><li>What is the likelihood that a malicious actor, such as a foreign country may target the entity?<\/li><li>\u201cthe extent to which damage, disruption, or unauthorized access to such an entity, including the accessing of sensitive cybersecurity vulnerability information or penetration testing tools or techniques, will likely enable the disruption of the reliable operation of critical infrastructure.\u201d<\/li><\/ul><p>Considering that these criteria refer to \u201cnational security\u201d, \u201cpublic safety\u201d and also to the possibility of being targeted by foreign state actors, the 16 critical infrastructure sectors defined by the <a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2013\/02\/12\/presidential-policy-directive-critical-infrastructure-security-and-resil\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">Presidential Directive 21<\/a> will likely be declared as \u201ccovered entity\u201d.<\/p><p><b>These sectors include, but are not limited to:<\/b><\/p><ul><li>Defense Industrial Base<\/li><li>Emergency Services<\/li><li>Energy<\/li><li>Financial Services<\/li><li>Healthcare and Public Health<\/li><\/ul><p>While it is reasonable to expect that these sectors will be defined as \u201ccovered entities,\u201d the CISA will likely go further and determine additional sectors as falling under the new law.<\/p><h3><b>What Incidents Should Be Reported<\/b><\/h3><p>Under the Act, there are two categories of attacks that needs to be reported:<\/p><h5>Cyber incidents<\/h5><p>The Act does not require all incidents to be reported to the CISA and provides CISA with the power to determine the criteria and threshold for cyber incidents to be covered by the Cybersecurity Act.<\/p><p>However, the Act lists three types of high-impact cyber incidents that is covered by the Act.&nbsp; For example, incidents that involves<i> \u201cunauthorized access or disruption of business or industrial operations\u201d due to a \u201ccompromise of a cloud service provider, managed service provider, or other third-party data hosting provider or by a supply chain compromise\u201d<\/i> must be reported under the Act.<\/p><p>A recent example of such a cyber attack is the <a href=\"https:\/\/www.businessinsider.com\/solarwinds-hack-explained-government-agencies-cyber-security-2020-12\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">SolarWinds attack<\/a>. After Russia-backed hackers inserted a malicious code into the SolarWinds\u2019 network monitoring software, they gained access to thousands of companies\u2019 networks, including <a href=\"https:\/\/theintercept.com\/2020\/12\/24\/solarwinds-hack-power-infrastructure\/\" target=\"_blank\" rel=\"noopener\" bis_skin_checked=\"1\">electricity, oil and manufacturing companies<\/a>.<\/p><h5>Ransom payments<\/h5><p>\u201cRansomware Attacks\u201d are defined broadly under the Act: Use or threatened use of all techniques aimed at hindering an entity\u2019s information processing operations falls under the definition of \u201cransomware attack\u201d. Alongside the traditional ransomware technique, encryption of data, the following types of mechanisms are also subject to the Cybersecurity Act:<\/p><ul><li>Distributed denial of service attacks<\/li><li>Insertion of malicious code.<\/li><\/ul><h3><b>When to Report the Incidents?&nbsp;<\/b><\/h3><p>The Act sets out two different deadlines for the reporting of incidents:<\/p><ol><li>Incidents falling under the \u201cransom attack\u201d category must be reported to the CISA within 24 hours after the entity operating\/owning the critical infrastructure makes a ransom payment.<\/li><li>\u201cCovered entity\u201d must report cyber incidents within 72 hours after it \u201creasonably believes that the covered cyber incident has occurred\u201d<\/li><\/ol><h3>Criticisms Against the Law<\/h3><p>Though the new law is welcomed by many in light of the growing numbers of cyber attacks targeting critical infrastructure and the rising geopolitical tension in Eastern Europe, it is also criticized for not addressing a few critical issues:<\/p><ul><li><b>No reporting to the FBI: <\/b>The Department of Justice publicly opposed the new law for not requiring \u201ccovered entities\u201d to report the incidents to the FBI. Some agree that direct notification of incidents to the FBI would enable the FBI to provide support to affected entities promptly and warn the other potential vulnerable entities against the risks.<\/li><li><b>DNS: <\/b>Another criticism directed at the new Act is that DNS information is not included in the reporting requirements. Some argue that DNS information is critical to law enforcement agencies and investigations and it would make it easier for the law enforcement to carry out investigations and determine the origin of the attacks.<\/li><\/ul><h3>What Should \u201cCovered Entities\u201d Do?<\/h3><h5><b>Monitor new developments<\/b><\/h5><p>It is far from certain what entities will be covered by the new reporting requirements, what the contents of the report will include or what types of incidents will fall under the applicability of the new Cybersecurity Act.The CISA will have the power to issue directives in these critical issues and organizations should closely monitor new directives and opinions issued by the CISA.<\/p><h5><b>Establish and Implement an Incident-Response Plan<\/b><\/h5><p>Given that the new Act sets 24-hour and 72-hour notification requirements and defines the minimum content the reporting must include, organizations must put in place a robust incident response plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>If you face a major cyber attack or pay ransom to attac [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,488,61],"tags":[352,423,489],"class_list":["post-50435","post","type-post","status-publish","format-standard","hentry","category-portnox","category-488","category-press-release","tag-network","tag-portnox","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The New US Cybersecurity Act &amp; What it Means - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The New US Cybersecurity Act &amp; What it Means - Version 2\" \/>\n<meta property=\"og:description\" content=\"If you face a major cyber attack or pay ransom to attac [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-31T01:07:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-08T09:40:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/the-new-us-cybersecurity-act-what-it-means\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"The New US Cybersecurity Act &#038; What it Means\",\"datePublished\":\"2022-05-31T01:07:47+00:00\",\"dateModified\":\"2022-06-08T09:40:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/the-new-us-cybersecurity-act-what-it-means\\\/\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cybersecurity-act-tile.png?w=958&amp;ssl=1\",\"keywords\":[\"Network\",\"Portnox\",\"2022\"],\"articleSection\":[\"Portnox\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/05\\\/the-new-us-cybersecurity-act-what-it-means\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/\",\"name\":\"The New US Cybersecurity Act & What it Means - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cybersecurity-act-tile.png?w=958&amp;ssl=1\",\"datePublished\":\"2022-05-31T01:07:47+00:00\",\"dateModified\":\"2022-06-08T09:40:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cybersecurity-act-tile.png?w=958&amp;ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cybersecurity-act-tile.png?w=958&amp;ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/the-new-us-cybersecurity-act-what-it-means\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The New US Cybersecurity Act &#038; What it Means\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The New US Cybersecurity Act & What it Means - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/","og_locale":"zh_HK","og_type":"article","og_title":"The New US Cybersecurity Act & What it Means - Version 2","og_description":"If you face a major cyber attack or pay ransom to attac [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/","og_site_name":"Version 2","article_published_time":"2022-05-31T01:07:47+00:00","article_modified_time":"2022-06-08T09:40:22+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/05\/the-new-us-cybersecurity-act-what-it-means\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"The New US Cybersecurity Act &#038; What it Means","datePublished":"2022-05-31T01:07:47+00:00","dateModified":"2022-06-08T09:40:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/05\/the-new-us-cybersecurity-act-what-it-means\/"},"wordCount":993,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1","keywords":["Network","Portnox","2022"],"articleSection":["Portnox","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/05\/the-new-us-cybersecurity-act-what-it-means\/","url":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/","name":"The New US Cybersecurity Act & What it Means - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1","datePublished":"2022-05-31T01:07:47+00:00","dateModified":"2022-06-08T09:40:22+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#primaryimage","url":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.portnox.com\/wp-content\/uploads\/2022\/05\/cybersecurity-act-tile.png?w=958&amp;ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/the-new-us-cybersecurity-act-what-it-means\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The New US Cybersecurity Act &#038; What it Means"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-d7t","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/50435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=50435"}],"version-history":[{"count":13,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/50435\/revisions"}],"predecessor-version":[{"id":50469,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/50435\/revisions\/50469"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=50435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=50435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=50435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}