{"id":2788,"date":"2022-05-01T12:00:00","date_gmt":"2022-05-01T10:00:00","guid":{"rendered":"https:\/\/www.hostrw.com\/kp\/?p=2788"},"modified":"2022-09-14T11:07:33","modified_gmt":"2022-09-14T09:07:33","slug":"top-5-cybersecurity-mistakes-that-leave-your-data-at-risk","status":"publish","type":"post","link":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/","title":{"rendered":"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk"},"content":{"rendered":"\r\n<p>The global damage of cybercrime has risen to an average of <a href=\"https:\/\/financesonline.com\/cybersecurity-statistics\/\">$11 million<\/a> USD per minute, which is a cost of $190,000 each second.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can\u2019t afford the costs. The costs of falling victim to a cyberattack can include loss of business, downtime\/productivity losses, reparation costs for customers that have had data stolen, and more.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>You may think that this means investing more in cybersecurity, and it is true that you need to have appropriate IT security safeguards in place (anti-malware, firewall, etc.). However, many of the most damaging breaches are due to common cybersecurity mistakes that companies and their employees make.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>The 2021 <a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/technical-papers\/sophos-2021-threat-report.pdf\">Sophos Threat Report<\/a>, which looked at thousands of global data breaches, found that what it termed \u201ceveryday threats\u201d were some of the most dangerous. The report stated, <em>\u201cA lack of attention to one or more aspects of basic security hygiene has been found to be at the root cause of many of the most damaging attacks we&#8217;ve investigated.\u201d<\/em><\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Is your company making a dangerous cybersecurity mistake that is leaving you at high risk for a data breach, cloud account takeover, or ransomware infection?<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Here are several of the most common missteps when it comes to basic IT security best practices.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Not Implementing Muti-Factor Authentication (MFA)<\/strong><\/h3>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Credential theft has become the <a href=\"https:\/\/www.ibm.com\/security\/data-breach\">top cause<\/a> of data breaches around the world, according to IBM Security. With most company processes and data now being cloud-based, login credentials hold the key to multiple types of attacks on company networks.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Not protecting your user logins with multi-factor authentication is a common mistake and one that leaves companies at a much higher risk of falling victim to a breach.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>MFA reduces fraudulent sign-in attempts by a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/\">staggering 99.9%.<\/a><\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Ignoring the Use of Shadow IT<\/strong><\/h3>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Shadow IT is the use of cloud applications by employees for business data that haven\u2019t been approved and may not even be known about by a company.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Shadow IT use leaves companies at risk for several reasons:<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Data may be used in a non-secure application<\/li>\r\n<li>Data isn\u2019t included in company backup strategies<\/li>\r\n<li>If the employee leaves, the data could be lost<\/li>\r\n<li>The app being used might not meet company compliance requirements<\/li>\r\n<\/ul>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Employees often begin using apps on their own because they\u2019re trying to fill a gap in their workflow and are unaware of the risks involved with using an app that hasn\u2019t been vetted by their company\u2019s IT team.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>It\u2019s important to have cloud use policies in place that spell out for employees the applications that can and cannot be used for work.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Thinking You\u2019re Fine With Only an Antivirus Application<\/strong><\/h3>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>No matter how small your business is, a simple antivirus application is not enough to keep you protected. In fact, many of today\u2019s threats don\u2019t use a malicious file at all.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Phishing emails will contain commands sent to legitimate PC systems that aren\u2019t flagged as a virus or malware. Phishing also overwhelmingly uses links these days rather than file attachments to send users to malicious sites. Those links won\u2019t get caught by simple antivirus solutions.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>You need to have a multi-layered strategy in place that includes things like:<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Next-gen anti-malware (uses AI and machine learning)<\/li>\r\n<li>Next-gen firewall<\/li>\r\n<li>Email filtering<\/li>\r\n<li>DNS filtering<\/li>\r\n<li>Automated application and cloud security policies<\/li>\r\n<li>Cloud access monitoring<\/li>\r\n<\/ul>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Not Having Device Management In Place<\/strong><\/h3>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>A majority of companies around the world have had employees working remotely from home since the pandemic, and they\u2019re planning to keep it that way. However, device management for those remote employee devices as well as smartphones used for business hasn\u2019t always been put in place.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>If you\u2019re not managing security or data access for all the endpoints (company and employee-owned) in your business, you\u2019re at a higher risk of a data breach.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>If you don\u2019t have one already, it\u2019s time to put a device management application in place, like Intune in Microsoft 365.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h3 class=\"has-text-align-center wp-block-heading\"><strong>Not Providing Adequate Training to Employees<\/strong><\/h3>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>An astonishing <a href=\"https:\/\/blog.usecure.io\/the-role-of-human-error-in-successful-cyber-security-breaches\">95% of<\/a> cybersecurity breaches are caused by human error. Too many companies don\u2019t take the time to continually train their employees, and thus users haven\u2019t developed the skills needed for a culture of good cybersecurity.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Employee IT security awareness training should be done throughout the year, not just annually or during an onboarding process. The more you keep IT security front and center, the better equipped your team will be to identify phishing attacks and follow proper data handling procedures.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Some ways to infuse cybersecurity training into your company culture include:<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Short training videos<\/li>\r\n<li>IT security posters<\/li>\r\n<li>Webinars<\/li>\r\n<li>Team training sessions<\/li>\r\n<li>Cybersecurity tips in company newsletters<\/li>\r\n<\/ul>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>When Did You Last Have a Cybersecurity Checkup?<\/strong><\/h2>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Don\u2019t stay in the dark about your IT security vulnerabilities. Schedule a cybersecurity audit to uncover vulnerabilities so they can be fortified to reduce your risk.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Here is another good article about CyberSecurity: <a href=\"https:\/\/www.privateinternetaccess.com\/blog\/hacking-the-world-part-1-hacking-basics\/\">Hacking the World &#8211; Part 1: Hacking Basics<\/a><\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>&#8212;<br \/><a href=\"https:\/\/pixabay.com\/illustrations\/computer-circuit-board-cpu-security-6560745\/\" target=\"_blank\" rel=\"noreferrer noopener\">Featured Image Credit<\/a><\/p>\r\n\r\n<p>This Article has been Republished with Permission from <a title=\"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk\" href=\"https:\/\/thetechnologypress.com\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/\" target=\"_blank\" rel=\"canonical noopener noreferrer\">The Technology Press.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. &nbsp; 60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can\u2019t afford the costs. The costs of falling victim &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2789,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[80],"tags":[],"class_list":["post-2788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 Cybersecurity Mistakes That Leave Your Data at Risk - HostRW Computer Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk - HostRW Computer Service\" \/>\n<meta property=\"og:description\" content=\"The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. &nbsp; 60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can\u2019t afford the costs. The costs of falling victim ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"HostRW Computer Service\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-01T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-14T09:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"894\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roelof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostrw\" \/>\n<meta name=\"twitter:site\" content=\"@hostrw\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roelof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/\"},\"author\":{\"name\":\"Roelof\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\"},\"headline\":\"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk\",\"datePublished\":\"2022-05-01T10:00:00+00:00\",\"dateModified\":\"2022-09-14T09:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/\"},\"wordCount\":896,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/\",\"name\":\"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk - HostRW Computer Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg\",\"datePublished\":\"2022-05-01T10:00:00+00:00\",\"dateModified\":\"2022-09-14T09:07:33+00:00\",\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg\",\"width\":1920,\"height\":894,\"caption\":\"Computer, Circuit Board, Cpu, Security, Digital\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"name\":\"HostRW Computer Service\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\",\"name\":\"HostRW Computer Service\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"width\":189,\"height\":57,\"caption\":\"HostRW Computer Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/hostrw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\",\"name\":\"Roelof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"caption\":\"Roelof\"},\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/author\\\/roelof\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk - HostRW Computer Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/","og_locale":"nl_NL","og_type":"article","og_title":"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk - HostRW Computer Service","og_description":"The global damage of cybercrime has risen to an average of $11 million USD per minute, which is a cost of $190,000 each second. &nbsp; 60% of small and mid-sized companies that have a data breach end up closing their doors within six months because they can\u2019t afford the costs. The costs of falling victim ...","og_url":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/","og_site_name":"HostRW Computer Service","article_published_time":"2022-05-01T10:00:00+00:00","article_modified_time":"2022-09-14T09:07:33+00:00","og_image":[{"width":1920,"height":894,"url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg","type":"image\/jpeg"}],"author":"Roelof","twitter_card":"summary_large_image","twitter_creator":"@hostrw","twitter_site":"@hostrw","twitter_misc":{"Geschreven door":"Roelof","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/"},"author":{"name":"Roelof","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc"},"headline":"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk","datePublished":"2022-05-01T10:00:00+00:00","dateModified":"2022-09-14T09:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/"},"wordCount":896,"publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg","articleSection":["Cybersecurity"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/","url":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/","name":"Top 5 Cybersecurity Mistakes That Leave Your Data at Risk - HostRW Computer Service","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg","datePublished":"2022-05-01T10:00:00+00:00","dateModified":"2022-09-14T09:07:33+00:00","inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/top-5-cybersecurity-mistakes-that-leave-your-data-at-risk\/#primaryimage","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/Top-5-Cybersecurity-Mistakes-That-Leave-Your-image.jpg","width":1920,"height":894,"caption":"Computer, Circuit Board, Cpu, Security, Digital"},{"@type":"WebSite","@id":"https:\/\/www.hostrw.com\/kp\/en\/#website","url":"https:\/\/www.hostrw.com\/kp\/en\/","name":"HostRW Computer Service","description":"","publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostrw.com\/kp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization","name":"HostRW Computer Service","url":"https:\/\/www.hostrw.com\/kp\/en\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","width":189,"height":57,"caption":"HostRW Computer Service"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/hostrw"]},{"@type":"Person","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc","name":"Roelof","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","caption":"Roelof"},"url":"https:\/\/www.hostrw.com\/kp\/author\/roelof\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/comments?post=2788"}],"version-history":[{"count":3,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2788\/revisions"}],"predecessor-version":[{"id":2961,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2788\/revisions\/2961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media\/2789"}],"wp:attachment":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media?parent=2788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/categories?post=2788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/tags?post=2788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}