{"id":32,"date":"2019-03-16T04:32:19","date_gmt":"2019-03-16T04:32:19","guid":{"rendered":"http:\/\/www.namorgy.com\/blog\/?p=32"},"modified":"2019-03-16T04:32:19","modified_gmt":"2019-03-16T04:32:19","slug":"8-key-steps-for-responding-to-a-cyber-breach","status":"publish","type":"post","link":"http:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/","title":{"rendered":"8 key steps for responding to a cyber breach"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/s0.wp.com\/i\/blank.jpg\" class=\"iii-article-image\" style=\"float: left; margin: 0 20px 20px 0; max-width: 250px; max-height: 150px;\"\/><\/p>\n<p class=\"iii-article-excerpt\">\n  Over half of American companies will be hacked or suffer loss from unauthorized loss this year. Companies need to prepare on the front end to prevent serious losses when a breach occurs. The problem cannot be eliminated. It can be managed. The key step for any business is to be prepared to deal with an incident before it happens, not to respond ad hoc when it does.\n<\/p>\n<p class=\"iii-article-source\">\n  Link: <a href=\"https:\/\/neworleanscitybusiness.com\/blog\/2019\/03\/13\/8-key-steps-for-responding-to-a-cyber-breach\/\">8 key steps for responding to a cyber breach<\/a><br \/>\n  via neworleanscitybusiness.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over half of American companies will be hacked or suffer loss from unauthorized loss this year. Companies need to prepare on the front end to prevent serious losses when a &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-32","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 key steps for responding to a cyber breach -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 key steps for responding to a cyber breach -\" \/>\n<meta property=\"og:description\" content=\"Over half of American companies will be hacked or suffer loss from unauthorized loss this year. Companies need to prepare on the front end to prevent serious losses when a &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-16T04:32:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s0.wp.com\/i\/blank.jpg\" \/>\n<meta name=\"author\" content=\"Namorgy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Namorgy\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/\"},\"author\":{\"name\":\"Namorgy\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\"},\"headline\":\"8 key steps for responding to a cyber breach\",\"datePublished\":\"2019-03-16T04:32:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/\"},\"wordCount\":87,\"image\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s0.wp.com\\\/i\\\/blank.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/\",\"url\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/\",\"name\":\"8 key steps for responding to a cyber breach -\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/s0.wp.com\\\/i\\\/blank.jpg\",\"datePublished\":\"2019-03-16T04:32:19+00:00\",\"author\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/s0.wp.com\\\/i\\\/blank.jpg\",\"contentUrl\":\"https:\\\/\\\/s0.wp.com\\\/i\\\/blank.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/03\\\/16\\\/8-key-steps-for-responding-to-a-cyber-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 key steps for responding to a cyber breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#website\",\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/\",\"name\":\"Namorgy.com\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\",\"name\":\"Namorgy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"caption\":\"Namorgy\"},\"sameAs\":[\"http:\\\/\\\/www.namorgy.com\"],\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/author\\\/namorgy_12uffn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 key steps for responding to a cyber breach -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/","og_locale":"en_US","og_type":"article","og_title":"8 key steps for responding to a cyber breach -","og_description":"Over half of American companies will be hacked or suffer loss from unauthorized loss this year. Companies need to prepare on the front end to prevent serious losses when a &hellip;","og_url":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/","article_published_time":"2019-03-16T04:32:19+00:00","og_image":[{"url":"https:\/\/s0.wp.com\/i\/blank.jpg","type":"","width":"","height":""}],"author":"Namorgy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Namorgy"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#article","isPartOf":{"@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/"},"author":{"name":"Namorgy","@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2"},"headline":"8 key steps for responding to a cyber breach","datePublished":"2019-03-16T04:32:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/"},"wordCount":87,"image":{"@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/s0.wp.com\/i\/blank.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/","url":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/","name":"8 key steps for responding to a cyber breach -","isPartOf":{"@id":"http:\/\/www.namorgy.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/s0.wp.com\/i\/blank.jpg","datePublished":"2019-03-16T04:32:19+00:00","author":{"@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2"},"breadcrumb":{"@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#primaryimage","url":"https:\/\/s0.wp.com\/i\/blank.jpg","contentUrl":"https:\/\/s0.wp.com\/i\/blank.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.namorgy.com\/blog\/2019\/03\/16\/8-key-steps-for-responding-to-a-cyber-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.namorgy.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 key steps for responding to a cyber breach"}]},{"@type":"WebSite","@id":"http:\/\/www.namorgy.com\/blog\/#website","url":"http:\/\/www.namorgy.com\/blog\/","name":"Namorgy.com","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.namorgy.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2","name":"Namorgy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","caption":"Namorgy"},"sameAs":["http:\/\/www.namorgy.com"],"url":"http:\/\/www.namorgy.com\/blog\/author\/namorgy_12uffn\/"}]}},"_links":{"self":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":1,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/32\/revisions"}],"predecessor-version":[{"id":33,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/32\/revisions\/33"}],"wp:attachment":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/media?parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/categories?post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/tags?post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}