{"id":709,"date":"2022-10-05T20:20:36","date_gmt":"2022-10-05T20:20:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=709"},"modified":"2022-10-05T20:20:36","modified_gmt":"2022-10-05T20:20:36","slug":"vigtigheden-af-cybersikkerhed","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/vigtigheden-af-cybersikkerhed\/","title":{"rendered":"Vigtigheden af cybersikkerhed"},"content":{"rendered":"<p>Gennem historien har de, der har v\u00e6ret involveret i konflikter, altid brugt den mest moderne teknologi til at fremme deres sag og n\u00e5 specifikke m\u00e5l. I hver krig er gennembrud blevet udnyttet til at bek\u00e6mpe faktiske eller opfattede fjender ved hj\u00e6lp af videnskabelige fremskridt.<\/p>\n\n\n\n<p>Konflikter er i dag ikke l\u00e6ngere begr\u00e6nset til traditionelle slagmarker; i stedet kan de findes p\u00e5 internettet\u2014en fjende, der b\u00e5de er smidig og hurtig. Cyberangribere ved, at vores samfund er afh\u00e6ngige af den digitale verden, og hvis de kan forstyrre og destabilisere den, kan de sikre en betydelig sejr med et enkelt museklik.<\/p>\n\n\n\n<h2><strong>Stuxnet-ormen<\/strong><\/h2>\n\n\n\n<p>If\u00f8lge eksperter beskadigede Stuxnet mange centrifuger p\u00e5 Irans Natanz uranberigelsesanl\u00e6g ved at br\u00e6nde dem ud. Andre organisationer modificerede virussen over tid og fokuserede p\u00e5 elgeneratorer, vandbehandlingsanl\u00e6g og gasledninger.<\/p>\n\n\n\n<p>Stuxnet var en virus i flere dele, som infiltrerede Windows-computere, spredte sig via USB-drev og beskadigede industrielle kontrolsystemer. Malwaren unders\u00f8gte hver enkelt hacket maskine for tegn p\u00e5 Siemens Step 7-software, som industrimaskiner med PLC'er bruger til at automatisere og styre elektromekanisk udstyr.<\/p>\n\n\n\n<p>Efter at malwaren opdagede en PLC-computer, downloadede den ny kode fra internettet og begyndte at udsende skadelige instruktioner til den PC-styrede enhed. Samtidig blev der sendt falske data til kontrolsystemet. Hvis det ikke stoppes, kan det for\u00e5rsage alvorlig skade.<\/p>\n\n\n\n<p>If\u00f8lge kilder i cyberefterretningstjenesten blev Stuxnet i 2012 downloadet til Natanz-uranberigningsanl\u00e6ggets systemer. \"Ormen\" infiltrerede netv\u00e6rk og gik m\u00e5lrettet efter maskiner, der k\u00f8rte Windows-software til at automatisere og styre elektromekanisk udstyr.<\/p>\n\n\n\n<p>Da virussen var f\u00e6rdig med uranm\u00e5lingerne, begyndte den at \u00f8del\u00e6gge sig selv og g\u00f8re uranet ubrugeligt.<\/p>\n\n\n\n<p>Programmets m\u00e5l var at s\u00e6nke kvaliteten af uran, og derfor var virussen f\u00f8rst rettet mod centrifugaludstyrets hastighed p\u00e5 anl\u00e6gget. Det ville derefter virke normalt for dem, der overv\u00e5gede det, hvilket resulterede i en \"steady state\". Uranets \u00f8del\u00e6ggelse ville f\u00f8rst blive afsl\u00f8ret, n\u00e5r anl\u00e6ggets udstyr begyndte at selvdestruere. P\u00e5 det tidspunkt ville Stuxnet have fuldf\u00f8rt sit m\u00e5l.<\/p>\n\n\n\n<p>Men koden til denne virus blev offentliggjort. Andre har siden modificeret den til at ramme andre infrastrukturinstallationer, herunder vandbehandlingsanl\u00e6g, gasledninger, kraftv\u00e6rker og kommunikationsnetv\u00e6rk.<\/p>\n\n\n\n<h2><strong>I m\u00f8rket: Vigtige industrier konfronteres med cyberangreb<\/strong><\/h2>\n\n\n\n<p>If\u00f8lge <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/in-the-dark-crucial-industries-confront-cyberattacks\/\">McAfee<\/a>I 2011 tyede virksomheder til at ans\u00e6tte tidligere hackere, fordi de ikke kunne finde nok folk med de rette f\u00e6rdigheder til at beskytte deres netv\u00e6rk. Center for Strategic &amp; International Studies fremh\u00e6vede f\u00f8lgende bekymrende fakta:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Afpresning er den mest udbredte cybertrussel, som den verdensomsp\u00e6ndende energiindustri st\u00e5r over for.<\/li>\n<li>Cyberangreb har v\u00e6ret rettet mod ca. 80% af de mexicanske elselskaber.<\/li>\n<li>Mere end en fjerdedel af verdens energileverand\u00f8rer er blevet afpresset.<\/li>\n<li>60% af elselskaberne i Indien er blevet infiltreret.<\/li>\n<li>\"Duqu\", en variant af Stuxnet, er blevet fundet i energianl\u00e6g i otte lande.<\/li>\n<\/ul>\n\n\n\n<h2><strong>Den digitale verden er en slagmark<\/strong><\/h2>\n\n\n\n<p>Historisk set har angribere angrebet vand- og f\u00f8devarekilder for at sv\u00e6kke deres fjender. Under Anden Verdenskrig blev forsyningsv\u00e6rker og industribyer f.eks. \u00f8delagt for at h\u00e6mme de invaderende h\u00e6res krigsindsats. Disse metoder anvendes stadig i dag, fordi de er effektive; vores modstandere kan befinde sig tusindvis af kilometer v\u00e6k bag computersk\u00e6rme, men de kan alligevel iv\u00e6rks\u00e6tte angreb i den virkelige verden, som p\u00e5virker os alle.<\/p>\n\n\n\n<p>Vi er i krig og m\u00e5 \u00e6ndre vores m\u00e5de at t\u00e6nke p\u00e5 for at tilpasse os denne nye slagmark. Enhver af os kan v\u00e6re et m\u00e5l. Hvis vi skal sl\u00e5 vores fjende, m\u00e5 vi f\u00f8rst forst\u00e5 det nye landskab og de nye regler.<\/p>\n\n\n\n<h2><strong>Cybersikkerhed er vigtigere end nogensinde<\/strong><\/h2>\n\n\n\n<p>Behovet for cybersikkerhed har aldrig v\u00e6ret st\u00f8rre. Med internettets fremkomst er vores liv blevet mere og mere afh\u00e6ngige af teknologi. Vi er afh\u00e6ngige af computere til alt fra kommunikation til bankforretninger og underholdning. Men denne afh\u00e6ngighed har en pris. I takt med at vores liv flytter online, bliver vi mere s\u00e5rbare over for cyberangreb.<\/p>\n\n\n\n<p>Og den slags trusler bliver mere og mere almindelige og sofistikerede. Hackere n\u00f8jes ikke l\u00e6ngere med at stj\u00e6le vores oplysninger; de \u00f8nsker nu at forstyrre vores liv og vores \u00f8konomi. I 2017 oplevede vi et stort cyberangreb, som lammede Storbritanniens nationale sundhedsv\u00e6sen. WannaCry-ransomwareangrebet krypterede data og kr\u00e6vede l\u00f8sepenge for at f\u00e5 dem tilbage. Angrebet for\u00e5rsagede omfattende forstyrrelser og kostede NHS millioner af pund.<\/p>\n\n\n\n<p>I 2018 oplevede vi det st\u00f8rste cyberangreb i historien. NotPetya-virussen inficerede computere verden over og for\u00e5rsagede skader for milliarder af dollars. Virussen krypterede data og kr\u00e6vede en l\u00f8sesum, men angriberne kunne ikke finde en m\u00e5de at dekryptere dataene p\u00e5. Som f\u00f8lge heraf mistede mange virksomheder adgang til deres vitale data.<\/p>\n\n\n\n<p>Disse angreb viser os, at vi er s\u00e5rbare. De viser os ogs\u00e5, at vores nuv\u00e6rende tilgang til cybersikkerhed ikke fungerer. Vi er n\u00f8dt til at g\u00f8re mere for at beskytte os mod cyberangreb.<\/p>\n\n\n\n<p>Vi kan tage mange skridt for at forbedre vores cybersikkerhed, men vi er n\u00f8dt til at starte med en grundl\u00e6ggende \u00e6ndring af, hvordan vi t\u00e6nker p\u00e5 sikkerhed. Vi m\u00e5 f\u00f8rst bev\u00e6ge os v\u00e6k fra forestillingen om, at sikkerhed er noget, der kan opn\u00e5s med teknologi alene. Teknologi er vigtig, men det er ikke nok. Vi er ogs\u00e5 n\u00f8dt til at \u00e6ndre vores tankegang.<\/p>\n\n\n\n<h2><strong>Forst\u00e5 truslen<\/strong><\/h2>\n\n\n\n<p>Det f\u00f8rste skridt er at forst\u00e5 truslen. Vi skal uddanne os i truslens natur og de mennesker, der st\u00e5r bag den. Vi skal v\u00e6re opm\u00e6rksomme p\u00e5 de teknikker, de bruger til at angribe os. Og vi skal forst\u00e5 de s\u00e5rbarheder, de udnytter.<\/p>\n\n\n\n<h2><strong>\u00c6ndre vores tankegang<\/strong><\/h2>\n\n\n\n<p>Det andet skridt er at \u00e6ndre vores tankegang. Vi er n\u00f8dt til at t\u00e6nke p\u00e5 sikkerhed som en proces, ikke et produkt, og indarbejde det i alt, hvad vi g\u00f8r. Med andre ord skal vi v\u00e6re proaktive, ikke reaktive. Og vi skal arbejde sammen om at g\u00f8re vores verden til et mere sikkert sted.<\/p>\n\n\n\n<h2><strong>G\u00f8r noget ved det<\/strong><\/h2>\n\n\n\n<p>Det tredje skridt er at handle. Vi er n\u00f8dt til at gennemf\u00f8re de \u00e6ndringer, vi har talt om, og investere i cybersikkerhed for at sikre, at vi er i stand til at reagere hurtigt og effektivt p\u00e5 cybertrusler.<\/p>\n\n\n\n<h2><strong>Den nederste linje<\/strong><\/h2>\n\n\n\n<p>Cybersikkerhed er vigtig, fordi vi er i krig. Vores fjende er adr\u00e6t og bev\u00e6ger sig hurtigt, og de bruger teknologi til at lancere angreb i en skala, som vi aldrig har set f\u00f8r. Vi er n\u00f8dt til at \u00e6ndre vores tankegang og vores tilgang til sikkerhed. Og vi er n\u00f8dt til at arbejde sammen for at g\u00f8re vores verden til et mere sikkert sted.<\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Gennem historien har de, der er involveret i konflikter, altid brugt den mest moderne teknologi til at fremme deres sag og n\u00e5 specifikke m\u00e5l. I alle krige er gennembrud blevet brugt til at bek\u00e6mpe... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/vigtigheden-af-cybersikkerhed\/\">Read more <span class=\"screen-reader-text\">Vigtigheden af cybersikkerhed<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of cyber security | Security Briefing<\/title>\n<meta name=\"description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/vigtigheden-af-cybersikkerhed\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of cyber security | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/vigtigheden-af-cybersikkerhed\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T20:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The importance of cyber security\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"wordCount\":1046,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"name\":\"The importance of cyber security | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"description\":\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"width\":558,\"height\":500,\"caption\":\"The importance of cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/da\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vigtigheden af cybersikkerhed | Sikkerhedsbriefing","description":"Cybersikkerhed er vigtigere end nogensinde. L\u00e6r, hvorfor du skal tage din onlinesikkerhed alvorligt, og hvordan du beskytter dig selv.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/vigtigheden-af-cybersikkerhed\/","og_locale":"da_DK","og_type":"article","og_title":"The importance of cyber security | Security Briefing","og_description":"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.","og_url":"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/vigtigheden-af-cybersikkerhed\/","og_site_name":"Security Briefing","article_published_time":"2022-10-05T20:20:36+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"security","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The importance of cyber security","datePublished":"2022-10-05T20:20:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"wordCount":1046,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","name":"Vigtigheden af cybersikkerhed | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","datePublished":"2022-10-05T20:20:36+00:00","description":"Cybersikkerhed er vigtigere end nogensinde. L\u00e6r, hvorfor du skal tage din onlinesikkerhed alvorligt, og hvordan du beskytter dig selv.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","width":558,"height":500,"caption":"The importance of cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The importance of cyber security"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sikkerhed","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin er seniorskribent for Government Technology. Hun har tidligere skrevet for PYMNTS og The Bay State Banner og har en BA i kreativ skrivning fra Carnegie Mellon. Hun bor uden for Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/da\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/998"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}