{"id":6825,"date":"2024-03-12T11:36:17","date_gmt":"2024-03-12T09:36:17","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=6825"},"modified":"2024-03-12T11:40:16","modified_gmt":"2024-03-12T09:40:16","slug":"when-an-employees-social-mindset-becomes-a-threat-to-business","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/","title":{"rendered":"When an employee\u2019s social mindset becomes a threat to business"},"content":{"rendered":"\n<p>As our lives settle ever deeper into online environments and digital behaviors, cybercriminals are leveraging new vectors that allow for phishing, data theft, and spreading malware. Recent incidents show that mixing people\u2019s professional and personal minds (an ever-present human factor) can create new weaknesses in a business\u2019s cybersecurity.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Imagine your employees browsing their favorite social media platform on their personal time; they might find an interesting picture or emoji and its embedded link, which they then share \u2014 no one would mind such a distraction. Now, imagine your employees checking their various professional chats and threads; something between their personal and professional interests sparks their minds. Hence, they react by sharing an article, an interesting picture, or an emoji and its embedded link. This time, they share with their colleagues on a cloud-based platform such as Microsoft Teams . . . just for fun or even for professional inspiration.&nbsp;<br><br>A pretty common thing in an office, right? Well, bad actors can abuse even these everyday activities. Putting it simply, behaviors common to navigating and enjoying social media platforms can raise risks for business platforms, which have now become ubiquitous for small and medium businesses (SMBs) and enterprises alike.<br>Fortunately, multilayered ESET cybersecurity technology has an answer for such incidents with ESET Cloud Office Security (ECOS), which is now expanding beyond Microsoft 365 applications to include the Google Workspace.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1381\" height=\"206\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/ecos.png\" alt=\"\" class=\"wp-image-6826\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/ecos.png 1381w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/ecos-190x28.png 190w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/ecos-768x115.png 768w\" sizes=\"auto, (max-width: 1381px) 100vw, 1381px\" \/><figcaption class=\"wp-element-caption\">Image 1. ECOS Dashboard with an overview of protected apps&nbsp;<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Sharing reports, jokes, and malware&nbsp;<\/h3>\n\n\n\n<p>Let\u2019s start with weaponized pictures, GIFs, and emojis. The technique of concealing a file, message, image, or video within another file, message, image, or video is called digital&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2016\/12\/06\/stegano-exploit-kit\/\" target=\"_blank\" rel=\"noreferrer noopener\">steganography<\/a>, and it is nothing new in cybersecurity.&nbsp;<\/p>\n\n\n\n<p>The first documented case of its use in a cyberattack dates back to 2011,<a href=\"https:\/\/www.technologyreview.com\/2014\/07\/18\/172037\/the-growing-threat-of-network-based-steganography\/\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;when the Duqu<\/a>&nbsp;malware was discovered. This malware gathers data about the infected device and transmits them back to the command-and-control (C&amp;C) server hidden in a JPEG file meant to look like an innocent picture. &nbsp;<\/p>\n\n\n\n<p>Since then,&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/05\/07\/turla-lightneuron-email-too-far\/\" target=\"_blank\" rel=\"noreferrer noopener\">ESET researchers<\/a>&nbsp;have analyzed numerous similar attacks.&nbsp;<\/p>\n\n\n\n<p>In 2022, BleepingComputer reported about a&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/gifshell-attack-creates-reverse-shell-using-microsoft-teams-gifs\/\" target=\"_blank\" rel=\"noreferrer noopener\">new attack technique called GIFShell<\/a>&nbsp;that allows threat actors to abuse Microsoft Teams for phishing attacks and executing commands to steal data using GIFs.<\/p>\n\n\n\n<p>Using numerous Teams vulnerabilities, GIFShell allows an attacker to create a reverse shell. This technique tricks users into installing malware that connects the victim\u2019s device to the attacker\u2019s command-and-control server. After the connection is established, the command-and-control server delivers malicious commands via weaponized GIFs in Teams. These commands can, for example, scan the device for sensitive data and then exfiltrate the output, again, through GIFs retrieved by Microsoft\u2019s own infrastructure.<\/p>\n\n\n\n<p>Large cloud-based platforms like Microsoft 365 with its Teams app saw rapid growth during the pandemic and, by Q1 2023, had approximately 280 million users. With such growth and new online behaviors, the scope for abuse on large platforms has only grown.&nbsp;<br><br>However, increasing attention has been shown to these threat vectors by researchers. In June 2023, UK-based security services provider&nbsp;<a href=\"https:\/\/labs.jumpsec.com\/advisory-idor-in-microsoft-teams-allows-for-external-tenants-to-introduce-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jumpsec&#8217;s<\/a>&nbsp;Red Team discovered an easy way to&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-teams-bug-allows-malware-delivery-from-external-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">deliver malware using Microsoft Teams<\/a>&nbsp;via an account outside the target organization. Even though Microsoft Teams has client-side protection preventing file delivery from external sources, Red Team\u2019s members bypassed it by changing the internal and external recipient ID in the POST request of a message.&nbsp;<\/p>\n\n\n\n<p>That way, researchers were able to fool the system into thinking that an external user was, in fact, an internal account. Specifically, they successfully delivered a command-and-control payload into a target organization\u2019s inbox. If this attack had happened in a real-life environment, bad actors could have taken over the control of a business\u2019s devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Users shielded via multilayered protection&nbsp;<\/h3>\n\n\n\n<p>To deal with threats coming from increasingly popular cloud-based applications, ESET created its&nbsp;<a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Office Security (ECOS)<\/a>&nbsp;solution. It is a powerful combination of spam filtering, anti\u2011malware scanning, anti\u2011phishing, and advanced threat defense capabilities able to mitigate even never-before-seen threat types.<\/p>\n\n\n\n<p>With this multitenant and scalable product, businesses can protect their entire Office 365 suite, including Exchange Online, MS Teams, OneDrive, and SharePoint Online. For example, one of the things that ECOS does is that it scans all files transmitted through MS Teams and those uploaded or downloaded to SharePoint Online, scanning it regardless of who the author of the content is.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>ECOS effectivity in numbers:&nbsp;<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In the first ten months of 2023, ECOS detected and blocked&nbsp;<strong>over 1 million email threats<\/strong>, over&nbsp;<strong>500,000 phishing emails<\/strong>, and over&nbsp;<strong>30 million spam emails<\/strong>.<\/li>\n\n\n\n<li><strong>Thousands of never-before-seen detections<\/strong>&nbsp;were made by the cloud analysis component of ESET LiveGuard Advanced.<\/li>\n\n\n\n<li><strong>ECOS detected and stopped tens of thousands of threats in cloud storage and collaboration tools<\/strong>like OneDrive, Teams, and SharePoint.<\/li>\n<\/ul>\n\n\n\n<p>In its latest offering, ESET goes even further, integrating ECOS with Google Workspace to protect users from the aforementioned threat types. This means that ESET now protects the major cloud email providers.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Adding more protection&nbsp;<\/h3>\n\n\n\n<p>The many functions outlined here are critical for security in large part because they scale easily and provide concrete improvements for businesses. However, ESET has sought to do even more for SMBs. In October 2022,&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=h-35jy2KIzs\" target=\"_blank\" rel=\"noreferrer noopener\">ESET endpoint security solutions integrated with Intel\u00ae<\/a>&nbsp;Threat Detection Technology (Intel\u00ae TDT), which went live for select vPro 9th Gen (and higher) powered laptops, with integrated functionalities providing improved hardware-based ransomware detection.&nbsp;<\/p>\n\n\n\n<p>This year has seen further improvements to the integration with the higher performance of the newly launched 13th Gen Intel\u00ae Core\u2122 processors, which further enable unique ransomware detections shared between ESET endpoint security and its layers, and Intel\u2019s performance monitoring unit (PMU) sitting beneath applications, the operating system, and virtualization layers gathering CPU telemetry as threats attempt to execute.&nbsp;<\/p>\n\n\n\n<p>This solution is&nbsp;<a href=\"https:\/\/www.eset.com\/us\/eset-and-intel-keep-smbs-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">especially advantageous for SMBs<\/a>&nbsp;because it further expands the comprehensive nature of our multilayered solution without the need for any direct management.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Preparing for attacks doesn\u2019t have to be complicated&nbsp;<\/h3>\n\n\n\n<p>Techniques that allow the breach of a business\u2019s security through its employees and their (in-app) behaviors demonstrate that cybercriminals use every possibility to circumvent standard cyber defenses.&nbsp;<\/p>\n\n\n\n<p>Via an ECOS\u2019s easy-to-use dashboard, its Cloud Management Console, businesses can not only manage their security but also rapidly detect, assess, and respond to cyber incidents, making it a perfect solution for businesses of any size.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As our lives settle ever deeper into online environments and digital behaviors, cybercriminals are leveraging new vectors that allow for phishing, data theft, and spreading malware. Recent incidents show that mixing people\u2019s professional and personal minds (an ever-present human factor) can create new weaknesses in a business\u2019s cybersecurity.&nbsp;&nbsp; Imagine your employees browsing their favorite social<\/p>\n","protected":false},"author":5,"featured_media":6835,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[151],"tags":[],"class_list":["post-6825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expert-opinion"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When an employee\u2019s social mindset becomes a threat to business - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When an employee\u2019s social mindset becomes a threat to business\" \/>\n<meta property=\"og:description\" content=\"As our lives settle ever deeper into online environments and digital behaviors, cybercriminals are leveraging new vectors that allow for phishing, data theft, and spreading malware. Recent incidents show that mixing people\u2019s professional and personal minds (an ever-present human factor) can create new weaknesses in a business\u2019s cybersecurity.&nbsp;&nbsp; Imagine your employees browsing their favorite social\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-12T09:36:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-12T09:40:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/1080x1080.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"When an employee\u2019s social mindset becomes a threat to business\",\"datePublished\":\"2024-03-12T09:36:17+00:00\",\"dateModified\":\"2024-03-12T09:40:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/\"},\"wordCount\":1086,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1080x1080.jpg\",\"articleSection\":[\"expert opinion\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/\",\"name\":\"When an employee\u2019s social mindset becomes a threat to business - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1080x1080.jpg\",\"datePublished\":\"2024-03-12T09:36:17+00:00\",\"dateModified\":\"2024-03-12T09:40:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1080x1080.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/1080x1080.jpg\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When an employee\u2019s social mindset becomes a threat to business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2024\\\/03\\\/12\\\/when-an-employees-social-mindset-becomes-a-threat-to-business\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"When an employee\u2019s social mindset becomes a threat to business - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/","og_locale":"en_US","og_type":"article","og_title":"When an employee\u2019s social mindset becomes a threat to business","og_description":"As our lives settle ever deeper into online environments and digital behaviors, cybercriminals are leveraging new vectors that allow for phishing, data theft, and spreading malware. Recent incidents show that mixing people\u2019s professional and personal minds (an ever-present human factor) can create new weaknesses in a business\u2019s cybersecurity.&nbsp;&nbsp; Imagine your employees browsing their favorite social","og_url":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2024-03-12T09:36:17+00:00","article_modified_time":"2024-03-12T09:40:16+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/1080x1080.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"When an employee\u2019s social mindset becomes a threat to business","datePublished":"2024-03-12T09:36:17+00:00","dateModified":"2024-03-12T09:40:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/"},"wordCount":1086,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/1080x1080.jpg","articleSection":["expert opinion"],"inLanguage":"en-US","copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/","url":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/","name":"When an employee\u2019s social mindset becomes a threat to business - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/1080x1080.jpg","datePublished":"2024-03-12T09:36:17+00:00","dateModified":"2024-03-12T09:40:16+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/1080x1080.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2024\/03\/1080x1080.jpg","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"When an employee\u2019s social mindset becomes a threat to business"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2024\/03\/12\/when-an-employees-social-mindset-becomes-a-threat-to-business\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=6825"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6825\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/6835"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=6825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=6825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=6825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}