{"id":128,"date":"2020-01-22T06:05:23","date_gmt":"2020-01-22T06:05:23","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=128"},"modified":"2020-02-05T08:26:17","modified_gmt":"2020-02-05T08:26:17","slug":"website-security","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/website-security\/","title":{"rendered":"Website Security"},"content":{"rendered":"\n<p>Website security refers to the protection of personal and organizational public-facing websites from cyberattacks. <\/p>\n\n\n\n<p>These threats affect all aspects of information  security\u2014confidentiality, integrity, and availability\u2014and can gravely  damage the reputation of the website and its owner. For example,  organization and personal websites that fall victim to defacement, DoS,  or data breach may experience financial loss due to eroded user trust or  a decrease in website visitors. <a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST18-006\"> Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed    solutions to automated, manage threat intelligence, forensic    investigations and cyber security training. Our objective is to support    organisations and consumers at every step of their cyber maturity    journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a>  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Website security refers to the protection of personal and organizational public-facing websites from cyberattacks. These threats affect all aspects of information security\u2014confidentiality, integrity, and availability\u2014and can gravely damage the reputation of the website and its owner. For example, organization and personal websites that fall victim to defacement, DoS, or data breach may experience financial loss &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/website-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Website Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18],"tags":[],"class_list":["post-128","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/128\/revisions"}],"predecessor-version":[{"id":157,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/128\/revisions\/157"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}