{"id":182,"date":"2020-02-08T06:22:29","date_gmt":"2020-02-08T06:22:29","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=182"},"modified":"2020-02-08T06:22:29","modified_gmt":"2020-02-08T06:22:29","slug":"data-security-where-weve-been-and-where-were-going","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/data-security-where-weve-been-and-where-were-going\/","title":{"rendered":"Data Security: Where We\u2019ve Been and Where We\u2019re Going"},"content":{"rendered":"\n<p>Cybersecurity threats are nothing new. There have been so many media  reports about data breaches and how they affect our daily lives that it  can be overwhelming. Can organizations stop these breaches before our  financial, health, and other personal information is compromised? How?  If a breach is occurring, how does an organization find out quickly? And  if a breach has already happened, how can we respond? <\/p>\n\n\n\n<p>Data security is the process of maintaining the confidentiality,  integrity, and availability of an organization\u2019s data in a manner  consistent with the organization\u2019s risk strategy. Preventing  unauthorized access, data corruption, and denial of service attacks are  all important tenets of data security and an essential aspect of IT for  organizations of every size and type. Consistent, reliable, and secure  access to database records, system files, user files, and customer data  is necessary to prevent data from becoming vulnerable to attack. Before  an incident begins, companies must have a security architecture and  response plan in place. Once an incident occurs, they must be able to  detect the event and respond accordingly. After the incident, the  company must be able to effectively and efficiently recover.  <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/building-blocks\/data-security\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity threats are nothing new. There have been so many media reports about data breaches and how they affect our daily lives that it can be overwhelming. Can organizations stop these breaches before our financial, health, and other personal information is compromised? How? If a breach is occurring, how does an organization find out quickly? &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/data-security-where-weve-been-and-where-were-going\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Data Security: Where We\u2019ve Been and Where We\u2019re Going&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18,19,7],"tags":[],"class_list":["post-182","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice","category-home-cyber-security","category-privacy"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/182\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}