{"id":186,"date":"2020-02-13T06:59:18","date_gmt":"2020-02-13T06:59:18","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=186"},"modified":"2020-02-13T06:59:18","modified_gmt":"2020-02-13T06:59:18","slug":"how-to-defend-your-attack-surface","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/how-to-defend-your-attack-surface\/","title":{"rendered":"How to Defend Your Attack Surface"},"content":{"rendered":"\n<p>Bad actors are constantly looking for ways to attack your organization. They hunt for vulnerabilities on websites, exposed servers in the cloud, and other systems and services that are connected directly to the Internet that have been forgotten about, or that have little or no protection. Organizations need to understand their attack surface, and all of the ways that their infrastructure is exposed and vulnerable to attack \u2014 and prioritize activities that can help make that attack surface smaller. <a href=\"https:\/\/dbac8a2e962120c65098-4d6abce208e5e17c2085b466b98c2083.ssl.cf1.rackcdn.com\/how-to-defend-your-attack-surface-pdf-8-w-5836.pdf\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed   solutions to automated, manage threat intelligence, forensic   investigations and cyber security training. Our objective is to support   organisations and consumers at every step of their cyber maturity   journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bad actors are constantly looking for ways to attack your organization. They hunt for vulnerabilities on websites, exposed servers in the cloud, and other systems and services that are connected directly to the Internet that have been forgotten about, or that have little or no protection. Organizations need to understand their attack surface, and all &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/how-to-defend-your-attack-surface\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to Defend Your Attack Surface&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[17,18],"tags":[],"class_list":["post-186","post","type-post","status-publish","format-standard","hentry","category-cyber-risk","category-cyber-security-best-practice"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/186\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/186\/revisions\/187"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}