{"id":421,"date":"2019-06-12T23:13:06","date_gmt":"2019-06-12T23:13:06","guid":{"rendered":"http:\/\/www.namorgy.com\/blog\/?p=421"},"modified":"2019-06-12T23:13:06","modified_gmt":"2019-06-12T23:13:06","slug":"in-a-cyber-data-breach-preparation-is-key","status":"publish","type":"post","link":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/","title":{"rendered":"In a cyber data breach, preparation is key"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg\" class=\"iii-article-image\" style=\"float: left; margin: 0 20px 20px 0; max-width: 250px; max-height: 150px;\"\/><\/p>\n<p class=\"iii-article-excerpt\">\n  Through every stage of an effective cyber breach response, planning and preparation is essential, according to the technology team at international law firm DAC Beachcroft. Participants at the London Tech Week workshop were asked to consider what they would do in the same situation and &#8220;help&#8221; the CEO of the online dating firm by registering their response at each decision point.\n<\/p>\n<p class=\"iii-article-source\">\n  Link: <a href=\"https:\/\/www.computerweekly.com\/news\/252464922\/In-a-cyber-data-breach-preparation-is-key\">In a cyber data breach, preparation is key<\/a><br \/>\n  via www.computerweekly.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Through every stage of an effective cyber breach response, planning and preparation is essential, according to the technology team at international law firm DAC Beachcroft. Participants at the London Tech &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-421","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>In a cyber data breach, preparation is key -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In a cyber data breach, preparation is key -\" \/>\n<meta property=\"og:description\" content=\"Through every stage of an effective cyber breach response, planning and preparation is essential, according to the technology team at international law firm DAC Beachcroft. Participants at the London Tech &hellip;\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-12T23:13:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg\" \/>\n<meta name=\"author\" content=\"Namorgy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Namorgy\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/\"},\"author\":{\"name\":\"Namorgy\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\"},\"headline\":\"In a cyber data breach, preparation is key\",\"datePublished\":\"2019-06-12T23:13:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/\"},\"wordCount\":82,\"image\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.ttgtmedia.com\\\/visuals\\\/German\\\/article\\\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/\",\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/\",\"name\":\"In a cyber data breach, preparation is key -\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.ttgtmedia.com\\\/visuals\\\/German\\\/article\\\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg\",\"datePublished\":\"2019-06-12T23:13:06+00:00\",\"author\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\"},\"breadcrumb\":{\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.ttgtmedia.com\\\/visuals\\\/German\\\/article\\\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn.ttgtmedia.com\\\/visuals\\\/German\\\/article\\\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/2019\\\/06\\\/12\\\/in-a-cyber-data-breach-preparation-is-key\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In a cyber data breach, preparation is key\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#website\",\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/\",\"name\":\"Namorgy.com\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/#\\\/schema\\\/person\\\/7037cc04551c43ba5e74edd08fda91c2\",\"name\":\"Namorgy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g\",\"caption\":\"Namorgy\"},\"sameAs\":[\"http:\\\/\\\/www.namorgy.com\"],\"url\":\"http:\\\/\\\/www.namorgy.com\\\/blog\\\/author\\\/namorgy_12uffn\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"In a cyber data breach, preparation is key -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/","og_locale":"en_US","og_type":"article","og_title":"In a cyber data breach, preparation is key -","og_description":"Through every stage of an effective cyber breach response, planning and preparation is essential, according to the technology team at international law firm DAC Beachcroft. Participants at the London Tech &hellip;","og_url":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/","article_published_time":"2019-06-12T23:13:06+00:00","og_image":[{"url":"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg","type":"","width":"","height":""}],"author":"Namorgy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Namorgy"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#article","isPartOf":{"@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/"},"author":{"name":"Namorgy","@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2"},"headline":"In a cyber data breach, preparation is key","datePublished":"2019-06-12T23:13:06+00:00","mainEntityOfPage":{"@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/"},"wordCount":82,"image":{"@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/","url":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/","name":"In a cyber data breach, preparation is key -","isPartOf":{"@id":"http:\/\/www.namorgy.com\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#primaryimage"},"image":{"@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg","datePublished":"2019-06-12T23:13:06+00:00","author":{"@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2"},"breadcrumb":{"@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#primaryimage","url":"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg","contentUrl":"https:\/\/cdn.ttgtmedia.com\/visuals\/German\/article\/Data-breach-hacker-adobe_searchsitetablet_520X173.jpg"},{"@type":"BreadcrumbList","@id":"http:\/\/www.namorgy.com\/blog\/2019\/06\/12\/in-a-cyber-data-breach-preparation-is-key\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/www.namorgy.com\/blog\/"},{"@type":"ListItem","position":2,"name":"In a cyber data breach, preparation is key"}]},{"@type":"WebSite","@id":"http:\/\/www.namorgy.com\/blog\/#website","url":"http:\/\/www.namorgy.com\/blog\/","name":"Namorgy.com","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.namorgy.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/www.namorgy.com\/blog\/#\/schema\/person\/7037cc04551c43ba5e74edd08fda91c2","name":"Namorgy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e20986966f4472043ecdaf2cf41caaa3d2477283bd208dfc1d663755a5100b2c?s=96&d=mm&r=g","caption":"Namorgy"},"sameAs":["http:\/\/www.namorgy.com"],"url":"http:\/\/www.namorgy.com\/blog\/author\/namorgy_12uffn\/"}]}},"_links":{"self":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/comments?post=421"}],"version-history":[{"count":1,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/421\/revisions"}],"predecessor-version":[{"id":422,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/posts\/421\/revisions\/422"}],"wp:attachment":[{"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/media?parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/categories?post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.namorgy.com\/blog\/wp-json\/wp\/v2\/tags?post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}