{"id":14977,"date":"2020-10-29T12:36:00","date_gmt":"2020-10-29T12:36:00","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insight&#038;p=2503"},"modified":"2022-11-25T09:00:45","modified_gmt":"2022-11-25T09:00:45","slug":"cybersecurity-know-thyself-and-win-the-battle","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","title":{"rendered":"Cybersecurity: know thyself and win the battle"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14977\" class=\"elementor elementor-14977\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc55e0c gg-article-content  gg-standard-article-template gg-simple-text gg-container-small-pt-72 gg-pb-72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc55e0c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ee1b85a gg-tablet-view\" data-id=\"ee1b85a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe710fd gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"fe710fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks caused by the disruption of the COVID pandemic.<\/em><\/p><p>From a cyber criminal\u2019s perspective, the arrival of the COVID-19 pandemic was a welcome surprise. The sophistication of phishing scams and ransomware was already at a high level. With the rapid switch to work from home, the attack surface and vectors multiplied almost overnight.<\/p><p>Lockdown put companies in a precarious position. They had to keep their people working for obvious financial and operational reasons. But this came with an increased risk of attack. The change was all so sudden that many companies lacked the necessary remote access tools to fix vulnerabilities on employee devices. Inevitably, people made choices at home they wouldn\u2019t consider in the office. They installed software and tools, data storage solutions or personal devices that rendered the system vulnerable. The furloughing of employees also strained control measures.<\/p><p>In short, people let their guard down during the pandemic. For example, a 40% surge in machines running Remote Desktop Protocol (RDP) connections caused\u00a0<a href=\"https:\/\/securelist.com\/remote-spring-the-rise-of-rdp-bruteforce-attacks\/96820\/\" target=\"_blank\" rel=\"noreferrer noopener\">RDP Brute Force attacks to skyrocket<\/a>\u00a0in March and April alone. Users today are almost\u00a0<a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/articles\/analyzing-covid-19-data-breach-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\">three times more likely<\/a>\u00a0to click on a phishing link and then enter their credentials, than they were pre-COVID. Of course, many of those scams had a COVID-related theme, which played on their victims\u2019 hopes and fears.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a912215 elementor-widget elementor-widget-image\" data-id=\"a912215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"416\" src=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1-1024x533.jpg\" class=\"attachment-large size-large wp-image-1346\" alt=\"Person working on laptop\" srcset=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1-1024x533.jpg 1024w, https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1-300x156.jpg 300w, https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1-768x400.jpg 768w, https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e086ad gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"6e086ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk-based strategies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-026cef3 elementor-widget elementor-widget-text-editor\" data-id=\"026cef3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>So, what\u2019s to be done? How can companies regain control when the opposition is getting smarter and their defences are compromised by\u00a0<em>force majeure<\/em>? We are compelled to go back to basics. Identify what is important to the business and then focus security controls to optimise energy and effort from that position of clarity. This means Security by Design and a risk-based strategy. We must be exhaustive in the identification of different assets and embed security in the DNA of a new project. An internal audit to classify all assets is a good place to start.<\/p><p>In the Art of War, the Chinese general Sun Tzu wrote: \u201cKnow thy self, know thy enemy. A thousand battles, a thousand victories\u201d. This advice still stands 2,500 years later. What type of servers, network components, hardware or software do you have within the information system? What are your weak points? How would you attack yourself, if you were the enemy?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61766ba gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"61766ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Think two moves ahead\u2026<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e775bd0 elementor-widget elementor-widget-text-editor\" data-id=\"e775bd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If an organisation doesn\u2019t have full visibility of their entire security environment, or if they are unable to focus remediation on their most exposed vulnerabilities, then they may fall victim to attack. Security assessments and mitigation policies are both critical steps, whether you are a bank, retailer or manufacturer that\u2019s engineering embedded systems for connected cars.<\/p><p>The ex-FBI director Robert Mueller once noted that there only two kinds of company: those that have been hacked and those that will be. If attacks are inevitable, then we must focus on time of detection and time of response. Our capacity to limit the window of opportunity for hackers is a competitive advantage. If it\u2019s three days, that\u2019s manageable. If it\u2019s three years, then it could prove terminal.\u00a0<\/p><p>Think of cybersecurity as a game of chess. However well you play, you have to expect to lose a few pieces along the way. It\u2019s how you respond that matters \u2013 as close as possible to the moment of attack. The right reaction plan, backed by automation, will kick in to mediate the damage. By staying two moves ahead of the aggressor, you can quickly shore up your defences.<\/p><p>There\u2019s no good time to be hacked, but right now, when the need for business continuity, brand trust and fiscal stability are potentially make or break, companies must prioritise cybersecurity. Under-investment is simply asking for trouble.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks caused by the disruption of the COVID pandemic.<\/p>\n","protected":false},"featured_media":1346,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"topic":[123],"insights-single-templates":[386],"industry-taxonomy":[293],"content-type":[21],"country":[259],"service":[189,73],"class_list":["post-14977","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-iot","insights-single-templates-old-template","industry-taxonomy-all","content-type-blog","country-united-kingdom","service-produkt-und-prozessentwicklung","service-cybersicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo | Cybersecurity: know thyself and win the battle<\/title>\n<meta name=\"description\" content=\"In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: know thyself and win the battle\" \/>\n<meta property=\"og:description\" content=\"In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/\" \/>\n<meta property=\"og:site_name\" content=\"Global DE\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-25T09:00:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/\",\"name\":\"Expleo | Cybersecurity: know thyself and win the battle\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cybersecurity-1280x666-1.jpg\",\"datePublished\":\"2020-10-29T12:36:00+00:00\",\"dateModified\":\"2022-11-25T09:00:45+00:00\",\"description\":\"In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cybersecurity-1280x666-1.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cybersecurity-1280x666-1.jpg\",\"width\":1280,\"height\":666,\"caption\":\"Person working on laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/blog\\\/cybersecurity-know-thyself-and-win-the-battle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Einblicke\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity: know thyself and win the battle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\",\"name\":\"Expleo | DE\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#organization\",\"name\":\"Expleo | DE\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | DE\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo | Cybersecurity: know thyself and win the battle","description":"In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersecurity: know thyself and win the battle","og_description":"In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks","og_url":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","og_site_name":"Global DE","article_modified_time":"2022-11-25T09:00:45+00:00","og_image":[{"width":1280,"height":666,"url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","url":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","name":"Expleo | Cybersecurity: know thyself and win the battle","isPartOf":{"@id":"https:\/\/expleo.com\/global\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1.jpg","datePublished":"2020-10-29T12:36:00+00:00","dateModified":"2022-11-25T09:00:45+00:00","description":"In this article to mark #CybersecurityAwarenessMonth, Expleo\u2019s Helmi Rais recommends a back-to-basics approach to combat the recent surge of attacks","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/#primaryimage","url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1.jpg","contentUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2021\/10\/cybersecurity-1280x666-1.jpg","width":1280,"height":666,"caption":"Person working on laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/de\/"},{"@type":"ListItem","position":2,"name":"Einblicke","item":"https:\/\/expleo.com\/global\/de\/einblicke\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity: know thyself and win the battle"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/de\/#website","url":"https:\/\/expleo.com\/global\/de\/","name":"Expleo | DE","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/de\/#organization","name":"Expleo | DE","url":"https:\/\/expleo.com\/global\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/expleo.com\/global\/de\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | DE"},"image":{"@id":"https:\/\/expleo.com\/global\/de\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":2503,"url":"https:\/\/expleo.com\/global\/en\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","language":"en","default":true},{"blogId":6,"blogIsHidden":false,"postId":14977,"url":"https:\/\/expleo.com\/global\/de\/einblicke\/blog\/cybersecurity-know-thyself-and-win-the-battle\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights\/14977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/types\/insights"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights\/14977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/media\/1346"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/media?parent=14977"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/topic?post=14977"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights-single-templates?post=14977"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/industry-taxonomy?post=14977"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/content-type?post=14977"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/country?post=14977"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/service?post=14977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}