{"id":379,"date":"2017-01-01T13:48:46","date_gmt":"2017-01-01T13:48:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/cybersecurity-5-basic-lessons-for-everyone\/"},"modified":"2019-05-29T12:27:30","modified_gmt":"2019-05-29T12:27:30","slug":"cybersecurity-5-basic-lessons-for-everyone","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/","title":{"rendered":"Cybersecurity: 5 basic lessons for everyone"},"content":{"rendered":"<p class=\"wls-paragraph\">Recently we\u2019ve had the opportunity &nbsp;\u2013 quite a fun and interesting opportunity \u2013 to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively \u2018new\u2019 developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc. The fact that some of these terms have become \u2018hype\u2019 is not in itself a problem, but we did begin to wonder whether the security world may be looking at things in the wrong way and thereby missing the demands that need to be addressed.<\/p>\n<p class=\"wls-paragraph\">This article explores&nbsp;a new perspective&nbsp;on cybersecurity that views it as a goal in itself, rather than something that is directly connected to business needs. As it stands now, it seems that too many security organizations are missing the mark.<\/p>\n<h2><b>Lesson 1: Start with the business (and its risks)<\/b><\/h2>\n<p class=\"wls-paragraph\">Security in practice can be exceptionally complex, but its essence is quite simple. Security is nothing more than reducing or taking away risks, and making them visible so that the business can accept them and continue doing its work \u2013 nothing more, nothing less. To do this as effectively and efficiently as possible, we, as security people, have to understand the business and not see it solely from an IT perspective but from the broader perspective of the business itself.<\/p>\n<p><span class=\"block_quote_right\">\u201cExperience shows that most hacks (about 90%) are still using simple methods and weaknesses: phishing emails, malware attachments.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">When starting from the business, we first have to identify, map, and categorize the risks of the specific business. Second, we have to determine, together with the business itself, which risks need to be dealt with and in which order.<\/p>\n<p class=\"wls-paragraph\">When that\u2019s done, the person responsible for the security within the company has to set up a security plan that describes how these changes are to be executed. In doing so, there have to be clear goals and deadlines. Ideally, this should be done in a \u2018smart\u2019 way, one step at a time, so as not to engage in too many projects at once.<\/p>\n<h2><b>Lesson 2: Determine a security roadmap with a clear goal, step by step<\/b><\/h2>\n<p class=\"wls-paragraph\">Defining your security approach (or security roadmap) is essential and should be discussed with your business on an ongoing basis to make adjustments where and when necessary. During the creation and execution of the roadmap, the projects that are defined will all contribute to the reduction of risks and the achievement of the end goal.<\/p>\n<p class=\"wls-paragraph\">It\u2019s important to not lose sight of the business goals, because the people responsible for security shouldn\u2019t \u2018restrict or obstruct\u2019 the business with security measures. It\u2019s not rocket science, and shouldn\u2019t be treated like it is. The creation of a plan should be something that everyone, even without IT skills, can understand. Of course, IT plays a role, but only at the last moment when IT solutions are needed for the execution of the security projects.<\/p>\n<h2><b>Lesson 3: Cover the basics before implementing more advanced security solutions<\/b><\/h2>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88677\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_240564724-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_240564724-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_240564724-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_240564724-1-65x42.jpg 65w\" alt=\" Business Conference and Presentation. Audience at the conference hall.\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Looking back at the conferences we attended, we noticed that most organizations don\u2019t even have basic security measures in place, let alone advanced security solutions. Security company presentations on these technologies often look stunning and offer interesting content, but they are simply too advanced for most companies. Furthermore, experience shows that the most hacks (about 90%) are still using the simplest methods and weaknesses: phishing emails, malware attachments, etc. And, of course, there is the weakest link of all: the human being.<\/p>\n<p class=\"wls-paragraph\">Companies need to create basic security solutions for these simple risks first before they turn their attention to more advanced technologies. Of course, these are important as well and they should be implemented in the future, but only after the basics are fortified. Often during security conferences there is a focus on sophisticated threats and APTs (advanced persistent threats), but companies such as <a href=\"http:\/\/www.welivesecurity.com\/2015\/10\/27\/talktalk-cyberattack-story-far\/\" target=\"_blank\" rel=\"noopener noreferrer\">TalkTalk<\/a> and <a href=\"http:\/\/www.welivesecurity.com\/hot_topics\/ashley-madison\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ashley Madison<\/a> might have been protected from attack if even basic security was in place.<\/p>\n<h2><b>Lesson 4: Build the right partnerships \u2013 cooperation between IT Security professionals is essential &nbsp;<\/b><\/h2>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88682\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_424790479-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_424790479-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_424790479-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_424790479-1-65x42.jpg 65w\" alt=\"Business Meeting Team Brainstorming Corporate Concept\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">New developments arise quickly and malicious groups and individuals are using more varied and advanced attacks and tactics. Eventually, more advanced security solutions will become inseparable from our organizations\u2019 broader security roadmaps. However, the foundation has to be in place before the \u2018house\u2019 can be built. And to build this house, cooperation is needed between the architect, the realtor, the mason, the plasterer and of course the homeowner.<\/p>\n<p class=\"wls-paragraph\">This sense of building something together is exactly what needs to happen in the security world. We have to cooperate intensively because, much like building a house, there is no single owner or architect who is also the best in masonry, painting, or construction.<\/p>\n<p class=\"wls-paragraph\">No single security company has the best solution for each and every security risk, so working together is a must. Those who would cause your company harm are already doing this, so it\u2019s time security professionals do the same. We need to start with the owner (the business) and the foundation (the roadmap), and then forge relationships with the right contractors (security vendors). Only then can a strong, reliable, and safe house be built.<\/p>\n<p><span class=\"block_quote_right\">\u201cThis sense of building something together is exactly what needs to happen in the security world. We have to cooperate intensively.\u201d<\/span><\/p>\n<h2><b>Lesson 5: Get everyone involved \u2013 it\u2019s the only road to success<\/b><\/h2>\n<p class=\"wls-paragraph\">To make progress between security and the business, there has to be understanding and support from the business \u2013 and vice versa. The one(s) responsible for security has to be able to provide short and clear explanations in order to get all of the different stakeholders in the company to participate. If he or she can\u2019t, then the business (and the board) will never understand, and there won\u2019t be the necessary buy-in and support to implement your plans (no matter how good they may be). As Einstein once said: \u201cIf you can\u2019t explain it simply, you don\u2019t understand it well enough!\u201d<\/p>\n<p class=\"wls-paragraph\"><i>Author: Dave Maasland, CEO ESET Netherlands in cooperation with Fred Streefland, IT Security Manager at LeaseWeb. <\/i><\/p>\n<p>Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/01\/31\/cybersecurity-5-basic-lessons-everyone\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently we\u2019ve had the opportunity &nbsp;\u2013 quite a fun and interesting opportunity \u2013 to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively \u2018new\u2019 developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc. The fact that some of these terms have become<\/p>\n","protected":false},"author":5,"featured_media":1729,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[151,155,170],"tags":[],"class_list":["post-379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expert-opinion","category-how-to","category-small-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: 5 basic lessons for everyone - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: 5 basic lessons for everyone\" \/>\n<meta property=\"og:description\" content=\"Recently we\u2019ve had the opportunity &nbsp;\u2013 quite a fun and interesting opportunity \u2013 to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively \u2018new\u2019 developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc. The fact that some of these terms have become\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-01T13:48:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:27:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Cybersecurity: 5 basic lessons for everyone\",\"datePublished\":\"2017-01-01T13:48:46+00:00\",\"dateModified\":\"2019-05-29T12:27:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/\"},\"wordCount\":1022,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_382323871-1-623x410.jpg\",\"articleSection\":[\"expert opinion\",\"how to\",\"small business\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/\",\"name\":\"Cybersecurity: 5 basic lessons for everyone - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_382323871-1-623x410.jpg\",\"datePublished\":\"2017-01-01T13:48:46+00:00\",\"dateModified\":\"2019-05-29T12:27:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_382323871-1-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_382323871-1-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: 5 basic lessons for everyone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/cybersecurity-5-basic-lessons-for-everyone\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: 5 basic lessons for everyone - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: 5 basic lessons for everyone","og_description":"Recently we\u2019ve had the opportunity &nbsp;\u2013 quite a fun and interesting opportunity \u2013 to visit a number of information security and cybersecurity conferences. These conferences were flooded with relatively \u2018new\u2019 developments such as NextGen, the Internet of Things (IoT), IoT DDoS attacks, security intelligence platform, etc. The fact that some of these terms have become","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-01T13:48:46+00:00","article_modified_time":"2019-05-29T12:27:30+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Cybersecurity: 5 basic lessons for everyone","datePublished":"2017-01-01T13:48:46+00:00","dateModified":"2019-05-29T12:27:30+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/"},"wordCount":1022,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg","articleSection":["expert opinion","how to","small business"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/","name":"Cybersecurity: 5 basic lessons for everyone - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg","datePublished":"2017-01-01T13:48:46+00:00","dateModified":"2019-05-29T12:27:30+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_382323871-1-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: 5 basic lessons for everyone"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/cybersecurity-5-basic-lessons-for-everyone\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=379"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/379\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1729"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}