{"id":2126,"date":"2020-12-08T09:00:26","date_gmt":"2020-12-08T09:00:26","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=2126"},"modified":"2021-04-12T02:40:30","modified_gmt":"2021-04-12T02:40:30","slug":"are-you-cybersecurity-ready-for-2021","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/","title":{"rendered":"Are You Cybersecurity-Ready For 2021?"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Which of the following is more likely in your organization? A Fire, Theft, or a cybersecurity incident?\u00a0 According to the latest <a href=\"https:\/\/www.hiscox.co.uk\/cyberreadiness\" target=\"_blank\" rel=\"noopener noreferrer\">Hiscox Cyber Readiness Report<\/a>, a cybersecurity incident leads the threat landscape at 30%, compared to a 2% likelihood of a fire. Viewed another way, the likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire. The most startling statistic is that most firms still only carry general coverage, rather than a stand-alone cybersecurity insurance policy.<\/p>\n<p>As a cybersecurity professional, the details of an insurance report may not be first on your reading list. Most cybersecurity people await reports by companies that are specific to the cybersecurity industry, such as the Verizon Data Breach Investigations Report (DBIR), Symantec\u2019s Threat Landscape, and others. However, more cybersecurity personnel are looking at the holistic view of the security landscape. The figures provided in a cyber-focused insurance report provide the cost associated with potential threats and can be useful in considering how to allocate the resources of the business and provide leadership with a tangible threat assessment. As has been the advice of many experts, the ability <a href=\"http:\/\/72.52.228.46\/~itegriti\/2020\/blog\/communicating-cybersecurity-board-tips\/\">to understand and speak the language of the C-Suite<\/a> is the best way to get the point of security converted into budgets for a more robust program for a company. Your CEO has probably not even heard of the Verizon DBIR but has definitely had numerous meetings about insurance to protect the organization.<\/p>\n<h2 class=\"navy\">Latest Threat Findings<\/h2>\n<p>Whilst companies that were part of this report were questioned prior to the coronavirus pandemic, the findings reflect their perspectives in more certain times, the Hiscox report still offers interesting details about how cybersecurity has changed over the last year.\u00a0 It seems that many organizations are becoming more cyber aware, resulting in fewer attacks, however, the costs are much higher for that smaller number of attack victims.\u00a0 For example, while only 39% of firms reported an attack in 2020, compared to a 61% attack account in 2019, the losses increased by over $50,000.\u00a0 The sum of all reported attacks exceeded 1.8 billion dollars, which is over half a billion more than reported in 2019.<\/p>\n<p>Some trends seem to continue year over year, such as the fact that large companies are still targeted more frequently than smaller companies. However, this does not mean that smaller companies are not attractive targets, as they suffered attacks as well. In part, it is assumed that they are vulnerable because they took no measures to protect themselves. A more \u201cworrying\u201d statistic is that many of the largest companies were unaware of being targeted at all. It is reasonable to conclude that if the largest companies with more than 1,000 employees are unaware of attack attempts, smaller companies are probably in a much worse position to not only anticipate, but recover from such incidents.<\/p>\n<p>The big word in cybersecurity over the last few years has been \u201cransomware\u201d.\u00a0 It is shocking to note that, according to the Hiscox report, ransomware came in third on the list of most common causes of breaches.\u00a0 Virus and worm activity, followed by business email compromise were the top two events.\u00a0 Considering how the <a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/ransomware-gangs-not-honoring-ransom-payments-for-stolen-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">new model of ransomware<\/a> is to steal data and hold it hostage, this is still not the most common method of attack.\u00a0 Perhaps next year\u2019s report will show a different trend, moving ransomware higher on the list.<\/p>\n<h2 class=\"navy\">Enhancing Cybersecurity Teams<\/h2>\n<p>The best news from the report is that most firms are taking cybersecurity very seriously, and this has resulted in more preparation, as well as resilience. Many medium, large, and enterprise companies have increased spending and staff numbers to become more resilient and prepared in the event of a cybersecurity incident. However, smaller companies which constitutes a majority of all respondents, continue to lag in preparation and resilience.\u00a0 But not all businesses can have an extensive in-house team and <a href=\"http:\/\/72.52.228.46\/~itegriti\/managed-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">virtual resourcing models<\/a> can provide an essential pathway to becoming more cyber secure. Nothing is better than being able to access an enhanced team, especially if you find yourself in the midst of a cyber-event.<\/p>\n<h2 class=\"navy\">Do You Know Your Cybersecurity Risk Baseline?<\/h2>\n<p>You can understand your current risk exposure by taking our <a href=\"https:\/\/www.research.net\/r\/cyberriskbaseline\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Risk Assessment.<\/a> These risk assessment questions are based on the essential cybersecurity controls that help companies avoid hacks and minimize business impact during cybersecurity events. You will receive a copy of the risk baseline report along with a cybersecurity maturity score, based solely on this attestation, along with control implications in areas where cybersecurity controls may need improvement.<\/p>\n<p>One of the hardest parts of a self-assessment is the candor required for an honest appraisal.\u00a0 When reviewing some areas of the risk assessment tool, some of the responses can be very difficult to face.\u00a0 For example, how thoroughly could you respond to topics surrounding these areas:<\/p>\n<ul>\n<li>Security Awareness and Training<\/li>\n<li>Asset Baselines, Hardening and Change Management<\/li>\n<li>Vulnerability Management<\/li>\n<li>Incident Management and Review<\/li>\n<li>Information Management and Protection<\/li>\n<li>Access and Account Management<\/li>\n<\/ul>\n<p>Similarly, how comprehensive is your data classification program?\u00a0 Is your network truly segmented?\u00a0 Not only should these questions cause honest reflection, but they should also encourage deeper conversations.<\/p>\n<p>Many assessment questions are reminiscent of a security audit.\u00a0 Can your cybersecurity plans and controls withstand the scrutiny of an audit?\u00a0 With that in mind, one recurring wish of penetration testers and red teamers is that the client not make the engagement so easy.\u00a0 Most real-world exercises result in fairly quick success for the attacking teams infiltrating a network.\u00a0 Can your plans stand up to an actual in-depth exercise?<\/p>\n<h2 class=\"navy\">How ITEGRITI can help<\/h2>\n<p>As the HISCOX report shows, Cybersecurity risk is real. While industries cannot protect against all attacks, a risk-based approach based on vulnerability assessments and controls to measure and manage security health is the way to mitigate business-critical risks. To discover more about how ITEGRITI can help protect your business take a look at <a href=\"http:\/\/72.52.228.46\/~itegriti\/services\/\">our key services<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire. So what can you do to ensure your business is fit for the cybersecurity challenges of 2021?<\/p>\n","protected":false},"author":13,"featured_media":2130,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,2180],"tags":[1169,633],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are You Cybersecurity-Ready For 2021? - kw022024<\/title>\n<meta name=\"description\" content=\"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are You Cybersecurity-Ready For 2021?\" \/>\n<meta property=\"og:description\" content=\"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire. So what can you do to ensure your business is fit for the cybersecurity challenges of 2021?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-08T09:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T02:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Covello\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire. So what can you do to ensure your business is fit for the cybersecurity challenges of 2021?\" \/>\n<meta name=\"twitter:creator\" content=\"@BobCovello\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Covello\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\"},\"author\":{\"name\":\"Bob Covello\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978\"},\"headline\":\"Are You Cybersecurity-Ready For 2021?\",\"datePublished\":\"2020-12-08T09:00:26+00:00\",\"dateModified\":\"2021-04-12T02:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\"},\"wordCount\":1229,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg\",\"keywords\":[\"9 Minute Read\",\"Recent\"],\"articleSection\":[\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\",\"name\":\"Are You Cybersecurity-Ready For 2021? - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg\",\"datePublished\":\"2020-12-08T09:00:26+00:00\",\"dateModified\":\"2021-04-12T02:40:30+00:00\",\"description\":\"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are You Cybersecurity-Ready For 2021?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978\",\"name\":\"Bob Covello\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g\",\"caption\":\"Bob Covello\"},\"description\":\"Bob Covello (@BobCovello) is a 20-year technology veteran and InfoSec analyst with a passion for security topics. He is also a volunteer for various organizations focused on advocating for and advising others about staying safe and secure online. Author for Security and Technology sites, including: AT&amp;T Cybersecurity (formerly Alienvault), Tripwire, LawTechnology News, LegalTech, Graham Cluley's Security News, LivingSecurity, Venafi, InformationSecurity Buzz, InformationWeek, (ISC)2 \u2605 Security Strategy: Design and implement strategic cybersecurity solutions that strengthen security controls, remedy endpoint security vulnerabilities, and transform end-user behaviors for reduced risk exposure. \u2605 Presenter and Contributor to (ISC)2\u2019s Safe and Secure Online Program as part of isc2cares.org. Author for certification test-prep site. \u2605 Executive Training &amp; Consulting: Initiate and foster strong, lasting relationships with security industry experts as well as C-Suite business executives, including CIO, CTO, and CISO, to communicate cybersecurity trends and solutions. ---------------------------------- Qualifications &amp; Credentials ---------------------------------- \u2611 Over 20 Years of Technology Leadership &amp; IT Security Excellence \u2611 Early Career Experience in Physical Security with the Westchester County Department of Corrections \u2611 Understanding and Practical Application of Emerging Data Security Solutions &amp; Techniques \u2611 Uncovering &amp; Preventing Potential Security Vulnerabilities \u2611 Bachelor\u2019s Degree, Iona College \u2611 CISSP \u2013 Certified Information Systems Security Professional \u2611 CEH \u2013 Certified Ethical Hacker\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bobcovello\/\",\"https:\/\/x.com\/BobCovello\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/bob-covello\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are You Cybersecurity-Ready For 2021? - kw022024","description":"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/","og_locale":"en_US","og_type":"article","og_title":"Are You Cybersecurity-Ready For 2021?","og_description":"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire. So what can you do to ensure your business is fit for the cybersecurity challenges of 2021?","og_url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2020-12-08T09:00:26+00:00","article_modified_time":"2021-04-12T02:40:30+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg","type":"image\/jpeg"}],"author":"Bob Covello","twitter_card":"summary_large_image","twitter_description":"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire. So what can you do to ensure your business is fit for the cybersecurity challenges of 2021?","twitter_creator":"@BobCovello","twitter_site":"@itegriti","twitter_misc":{"Written by":"Bob Covello","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/"},"author":{"name":"Bob Covello","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978"},"headline":"Are You Cybersecurity-Ready For 2021?","datePublished":"2020-12-08T09:00:26+00:00","dateModified":"2021-04-12T02:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/"},"wordCount":1229,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg","keywords":["9 Minute Read","Recent"],"articleSection":["Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/","url":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/","name":"Are You Cybersecurity-Ready For 2021? - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg","datePublished":"2020-12-08T09:00:26+00:00","dateModified":"2021-04-12T02:40:30+00:00","description":"The likelihood of a cybersecurity incident against an organization is 15 times greater than that of a fire.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2020\/12\/Itegriti_Blog38_Hero.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2020\/cybersecurity\/are-you-cybersecurity-ready-for-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Are You Cybersecurity-Ready For 2021?"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/21c4dc93eac8349704f909323a534978","name":"Bob Covello","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f7818cc9c64f3243c8b9fea1bb82616?s=96&d=mm&r=g","caption":"Bob Covello"},"description":"Bob Covello (@BobCovello) is a 20-year technology veteran and InfoSec analyst with a passion for security topics. He is also a volunteer for various organizations focused on advocating for and advising others about staying safe and secure online. Author for Security and Technology sites, including: AT&amp;T Cybersecurity (formerly Alienvault), Tripwire, LawTechnology News, LegalTech, Graham Cluley's Security News, LivingSecurity, Venafi, InformationSecurity Buzz, InformationWeek, (ISC)2 \u2605 Security Strategy: Design and implement strategic cybersecurity solutions that strengthen security controls, remedy endpoint security vulnerabilities, and transform end-user behaviors for reduced risk exposure. \u2605 Presenter and Contributor to (ISC)2\u2019s Safe and Secure Online Program as part of isc2cares.org. Author for certification test-prep site. \u2605 Executive Training &amp; Consulting: Initiate and foster strong, lasting relationships with security industry experts as well as C-Suite business executives, including CIO, CTO, and CISO, to communicate cybersecurity trends and solutions. ---------------------------------- Qualifications &amp; Credentials ---------------------------------- \u2611 Over 20 Years of Technology Leadership &amp; IT Security Excellence \u2611 Early Career Experience in Physical Security with the Westchester County Department of Corrections \u2611 Understanding and Practical Application of Emerging Data Security Solutions &amp; Techniques \u2611 Uncovering &amp; Preventing Potential Security Vulnerabilities \u2611 Bachelor\u2019s Degree, Iona College \u2611 CISSP \u2013 Certified Information Systems Security Professional \u2611 CEH \u2013 Certified Ethical Hacker","sameAs":["https:\/\/www.linkedin.com\/in\/bobcovello\/","https:\/\/x.com\/BobCovello"],"url":"https:\/\/itegriti.com\/kw022024\/author\/bob-covello\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2126"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2126"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2126\/revisions"}],"predecessor-version":[{"id":2131,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2126\/revisions\/2131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2130"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}