{"id":3020,"date":"2024-11-01T22:18:41","date_gmt":"2024-11-01T22:18:41","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3020"},"modified":"2024-11-01T22:19:11","modified_gmt":"2024-11-01T22:19:11","slug":"%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%a8%e3%83%83%e3%82%bb%e3%83%b3%e3%82%b7%e3%83%a3%e3%83%ab%e3%82%ba10%e5%91%a8%e5%b9%b4-%e4%bc%81%e6%a5%ad%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ja\/%e6%9a%97%e5%8f%b7%e9%80%9a%e8%b2%a8\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%a8%e3%83%83%e3%82%bb%e3%83%b3%e3%82%b7%e3%83%a3%e3%83%ab%e3%82%ba10%e5%91%a8%e5%b9%b4-%e4%bc%81%e6%a5%ad%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc\/","title":{"rendered":"\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb10\u5468\u5e74\u8a18\u5ff5\uff1a\u4f01\u696d\u306e\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u5f37\u5316\u306e10\u5e74"},"content":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30fb\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba\u5236\u5ea6\u306f\u3001\u82f1\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306e\u8981\u3067\u3042\u308a\u3001\u4f01\u696d\u304c\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u304b\u3089\u81ea\u3089\u3092\u5b88\u308b\u529b\u3092\u4e0e\u3048\u308b\u3082\u306e\u3067\u3042\u308b\u3002 <\/p>\n\n\n\n<p class=\"translation-block\">\u73fe\u5728\u300110\u5468\u5e74\u3092\u8fce\u3048\u305f<a href=\"https:\/\/www.ncsc.gov.uk\/news\/cyber-essentials-scheme-marks-a-decade-of-boosting-businesses-cyber-defences\" target=\"_self\">\u3053\u306e\u5236\u5ea6<\/a>\u306f\u3001\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30f3\u30bf\u30fc\u306b\u3088\u3063\u3066\u958b\u767a\u3055\u308c\u3001\u3059\u3079\u3066\u306e\u898f\u6a21\u306e\u7d44\u7e54\u306b\u3001\u30b7\u30f3\u30d7\u30eb\u3067\u52b9\u679c\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u8b1b\u3058\u308b\u3053\u3068\u3067\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3059\u308b\u305f\u3081\u306e\u30c4\u30fc\u30eb\u3092\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n\n<p>\u3053\u306e\u8a18\u5ff5\u3059\u3079\u304d\u5e74\u306b\u3001NCSC\u306f\u79d1\u5b66\u6280\u8853\u9769\u65b0\u7701\u3068\u3001\u30d0\u30fc\u30af\u30ec\u30a4\u30ba\u3001\u30ed\u30a4\u30ba\u30fb\u30d0\u30f3\u30ad\u30f3\u30b0\u30fb\u30b0\u30eb\u30fc\u30d7\u3001\u30cd\u30fc\u30b7\u30e7\u30f3\u30ef\u30a4\u30c9\u3001\u30ca\u30c3\u30c8\u30a6\u30a8\u30b9\u30c8\u3001\u30b5\u30f3\u30bf\u30f3\u30c7\u30fc\u30ebUK\u3001TSB\u3068\u3044\u3063\u305f\u82f1\u56fd\u306e\u5927\u624b\u9280\u884c\u3068\u63d0\u643a\u3057\u305f\u3002 <\/p>\n\n\n\n<p class=\"translation-block\">\u4e00\u7dd2\u306b\u306a\u3063\u3066\u3001\u5f7c\u3089\u306f\u3059\u3079\u3066\u306e\u82f1\u56fd\u4f01\u696d\u306b\u5bfe\u3057\u3001\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u5168\u4f53\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5411\u4e0a\u3055\u305b\u308b\u3088\u3046\u4fc3\u3057\u307e\u3057\u305f\u3002\u305d\u306e\u65b9\u6cd5\u306f\u3001<a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-impact-evaluation\/cyber-essentials-impact-evaluation\" target=\"_self\">Cyber Essentials<\/a>\u306e\u5c0e\u5165\u3067\u3059\u3002\u6628\u5e74\u3060\u3051\u3067\u300140,000\u4ef6\u4ee5\u4e0a\u306e\u8a8d\u8a3c\u304c\u6388\u4e0e\u3055\u308c\u3066\u304a\u308a\u3001\u5897\u52a0\u3059\u308b\u30c7\u30b8\u30bf\u30eb\u8105\u5a01\u306e\u4e2d\u3067\u5f37\u56fa\u306a\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u306e\u9700\u8981\u304c\u9ad8\u307e\u3063\u3066\u3044\u308b\u3053\u3068\u3092\u53cd\u6620\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-research-underlines-impact-of-cyber-essentials\"><strong>\u30b5\u30a4\u30d0\u30fc\u30fb\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba\u306e\u5f71\u97ff\u3092\u5f37\u8abf\u3059\u308b\u65b0\u305f\u306a\u8abf\u67fb\u7d50\u679c<\/strong><\/h2>\n\n\n<p>\u8a18\u5ff5\u65e5\u3092\u795d\u3063\u3066\u767a\u8868\u3055\u308c\u305f\u65b0\u3057\u3044\u7814\u7a76\u306b\u3088\u308b\u3068\u3001Cyber Essentials\u8a8d\u8a3c\u3092\u53d7\u3051\u305f\u4f01\u696d\u306f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8a8d\u8b58\u3068\u56de\u5fa9\u529b\u306e\u30ec\u30d9\u30eb\u304c\u5411\u4e0a\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u793a\u3055\u308c\u307e\u3057\u305f\u3002\u8a8d\u8a3c\u306f\u76f4\u63a5\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u4fdd\u8b77\u3092\u5f37\u5316\u3057\u3001\u3088\u308a\u5b89\u5168\u306a\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u69cb\u7bc9\u3092\u52a9\u3051\u3001\u3088\u308a\u591a\u304f\u306e\u7d44\u7e54\u304c\u5f37\u529b\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u63a1\u7528\u3059\u308b\u3053\u3068\u3092\u4fc3\u9032\u3057\u307e\u3059\u3002<\/p>\n\n\n\n<p>NCSC\u306e\u30af\u30ea\u30b9\u30fb\u30a8\u30f3\u30b6\u30fc\u526f\u5c40\u9577\uff08\u30b5\u30a4\u30d0\u30fc\u30b0\u30ed\u30fc\u30b9\u62c5\u5f53\uff09\u306f\u3001\u3053\u306e\u5236\u5ea6\u306f\u767a\u8db3\u5f53\u6642\u3068\u5909\u308f\u3089\u305a\u73fe\u5728\u3082\u6709\u52b9\u3067\u3042\u308b\u3068\u5f37\u8abf\u3057\u305f\uff1a<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306e\u72b6\u6cc1\u304c\u9032\u5316\u3092\u7d9a\u3051\u308b\u4e2d\u3001\u653b\u6483\u8005\u306f2014\u5e74\u306b\u6a19\u7684\u3068\u3055\u308c\u305f\u306e\u3068\u540c\u3058\u8106\u5f31\u6027\u3092\u4f7f\u3044\u7d9a\u3051\u3066\u3044\u308b\u3002\u3060\u304b\u3089\u3053\u305d\u79c1\u306f\u3001\u3059\u3079\u3066\u306e\u7d44\u7e54\u304c\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u3092\u30b5\u30a4\u30d0\u30fc\u8010\u6027\u306e\u57fa\u672c\u7684\u306a\u90e8\u5206\u3068\u3059\u308b\u3053\u3068\u3092\u5f37\u304f\u52e7\u3081\u308b\u3002\"<\/p>\n<\/blockquote>\n\n\n\n<p>\u540c\u6c0f\u306f\u3001\u3053\u306e\u5236\u5ea6\u306e\u771f\u306e\u30e1\u30ea\u30c3\u30c8\u3092\u5f37\u8abf\u3057\u305f\uff1a\u300c\u30b5\u30a4\u30d0\u30fc\u30fb\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba\u306e5\u3064\u306e\u4e2d\u6838\u7684\u306a\u7ba1\u7406\u7b56\u3092\u63a1\u7528\u3059\u308b\u4f01\u696d\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u3088\u3063\u3066\u4fb5\u5bb3\u3055\u308c\u308b\u53ef\u80fd\u6027\u3092\u5927\u5e45\u306b\u6e1b\u3089\u3059\u3053\u3068\u304c\u3067\u304d\u308b\u3002<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-security-minister-continued-vigilance-paramount\"><strong>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5927\u81e3\u7d99\u7d9a\u7684\u306a\u8b66\u6212\u304c\u91cd\u8981<\/strong><\/h2>\n\n\n<p>\u30d5\u30a7\u30ea\u30a2\u30eb\u30fb\u30af\u30e9\u30fc\u30af\u30fb\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76f8\u306f\u8cb4\u65cf\u9662\u3067\u6f14\u8aac\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u30fb\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba\u30fb\u30b9\u30ad\u30fc\u30e0\u306e\u6210\u529f\u3092\u8cde\u8cdb\u3059\u308b\u3068\u3068\u3082\u306b\u3001\u4f01\u696d\u304c\u3088\u308a\u5b89\u5168\u306a\u30aa\u30f3\u30e9\u30a4\u30f3\u74b0\u5883\u3092\u69cb\u7bc9\u3067\u304d\u308b\u3088\u3046\u652f\u63f4\u3059\u308b\u653f\u5e9c\u306e\u6c7a\u610f\u3092\u78ba\u8a8d\u3057\u305f\u3002 <\/p>\n\n\n\n<p class=\"translation-block\">\u5927\u81e3\u306f\u3001\u305d\u306e\u3088\u3046\u306a\u8a8d\u8a3c\u304c\u793e\u5185\u306b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30b9\u30ad\u30eb\u3092\u6301\u305f\u306a\u3044\u3059\u3079\u3066\u306e\u4f01\u696d\u306b\u3068\u3063\u3066\u975e\u5e38\u306b\u91cd\u8981\u3067\u3042\u308b\u3053\u3068\u3092\u5f37\u8abf\u3057\u307e\u3057\u305f\u3002\u307e\u305f\u3001\u8a8d\u8a3c\u3092\u6c42\u3081\u308b\u7d44\u7e54\u3084\u8ffd\u52a0\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u6c42\u3081\u308b\u7d44\u7e54\u306b\u5c02\u9580\u7684\u306a\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u3001\u65b0\u305f\u306bNCSC\u306b\u8a8d\u5b9a\u3055\u308c\u305f<a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview\" target=\"_self\">Cyber Advisor Service<\/a>\u306b\u9023\u7d61\u3059\u308b\u3088\u3046\u7d44\u7e54\u306b\u547c\u3073\u304b\u3051\u307e\u3057\u305f\u3002<\/p>\n\n\n\n<p>Cyber Essentials\u30b9\u30ad\u30fc\u30e0\u304c2\u5e74\u76ee\u306e10\u5e74\u3092\u8fce\u3048\u308b\u306b\u3042\u305f\u308a\u3001NCSC\u3068\u305d\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u306f\u3001\u3042\u3089\u3086\u308b\u898f\u6a21\u306e\u4f01\u696d\u306b\u5bfe\u3057\u3001\u81ea\u793e\u306e\u8cc7\u7523\u3060\u3051\u3067\u306a\u304f\u3001\u9867\u5ba2\u3084\u30d1\u30fc\u30c8\u30ca\u30fc\u3001\u305d\u3057\u3066\u82f1\u56fd\u7d4c\u6e08\u5168\u4f53\u306e\u8cc7\u7523\u3092\u5b88\u308b\u305f\u3081\u306b\u3001\u5f37\u529b\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5b9f\u8df5\u3092\u5b9a\u7740\u3055\u305b\u308b\u3088\u3046\u5f15\u304d\u7d9a\u304d\u5968\u52b1\u3057\u3066\u3044\u308b\u3002<\/p>","protected":false},"excerpt":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30fb\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba\u30fb\u30b9\u30ad\u30fc\u30e0\u306f\u3001\u82f1\u56fd\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306e\u8981\u3067\u3042\u308a\u3001\u4f01\u696d\u304c\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u304b\u3089\u81ea\u3089\u3092\u5b88\u308b\u529b\u3092\u4e0e\u3048\u308b\u3082\u306e\u3067\u3042\u308b\u3002\u4eca\u5e74\u306710\u5e74\u76ee\u3092\u8fce\u3048\u308b\u3053\u306e\u5236\u5ea6\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u3088\u3063\u3066\u958b\u767a\u3055\u308c\u305f\u3002 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ja\/%e6%9a%97%e5%8f%b7%e9%80%9a%e8%b2%a8\/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%a8%e3%83%83%e3%82%bb%e3%83%b3%e3%82%b7%e3%83%a3%e3%83%ab%e3%82%ba10%e5%91%a8%e5%b9%b4-%e4%bc%81%e6%a5%ad%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc\/\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb10\u5468\u5e74\u8a18\u5ff5\uff1a\u4f01\u696d\u306e\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u5f37\u5316\u306e10\u5e74<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,40],"tags":[],"class_list":["post-3020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","category-cyber-alerts","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Celebrating 10 Years of Cyber Essentials: A Decade of<\/title>\n<meta name=\"description\" content=\"The Cyber Essentials scheme is a cornerstone of the UK&#039;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ja\/\u6697\u53f7\u901a\u8ca8\/\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba10\u5468\u5e74-\u4f01\u696d\u306e\u30b5\u30a4\u30d0\u30fc\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Celebrating 10 Years of Cyber Essentials: A Decade of\" \/>\n<meta property=\"og:description\" content=\"The Cyber Essentials scheme is a cornerstone of the UK&#039;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ja\/\u6697\u53f7\u901a\u8ca8\/\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba10\u5468\u5e74-\u4f01\u696d\u306e\u30b5\u30a4\u30d0\u30fc\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T22:18:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T22:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\"},\"headline\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"articleSection\":[\"Cryptocurrency\",\"cyber alerts\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"description\":\"The Cyber Essentials scheme is a cornerstone of the UK's cybersecurity efforts, empowering businesses to protect themselves from cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Celebrating 10 Years of Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptocurrency\",\"item\":\"https:\/\/securitybriefing.net\/cryptocurrency\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ja\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Celebrating 10 Years of Cyber Essentials: A Decade of","description":"The Cyber Essentials scheme is a cornerstone of the UK's cybersecurity efforts, empowering businesses to protect themselves from cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ja\/\u6697\u53f7\u901a\u8ca8\/\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba10\u5468\u5e74-\u4f01\u696d\u306e\u30b5\u30a4\u30d0\u30fc\/","og_locale":"ja_JP","og_type":"article","og_title":"Celebrating 10 Years of Cyber Essentials: A Decade of","og_description":"The Cyber Essentials scheme is a cornerstone of the UK's cybersecurity efforts, empowering businesses to protect themselves from cyber threats.","og_url":"https:\/\/securitybriefing.net\/ja\/\u6697\u53f7\u901a\u8ca8\/\u30b5\u30a4\u30d0\u30fc\u30a8\u30c3\u30bb\u30f3\u30b7\u30e3\u30eb\u30ba10\u5468\u5e74-\u4f01\u696d\u306e\u30b5\u30a4\u30d0\u30fc\/","og_site_name":"Security Briefing","article_published_time":"2024-11-01T22:18:41+00:00","article_modified_time":"2024-11-01T22:19:11+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"C\u00e9sar Daniel Barreto","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44"},"headline":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"wordCount":408,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","articleSection":["Cryptocurrency","cyber alerts"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","name":"Celebrating 10 Years of Cyber Essentials: A Decade of","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","description":"The Cyber Essentials scheme is a cornerstone of the UK's cybersecurity efforts, empowering businesses to protect themselves from cyber threats.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","width":1265,"height":422,"caption":"Celebrating 10 Years of Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cryptocurrency","item":"https:\/\/securitybriefing.net\/cryptocurrency\/"},{"@type":"ListItem","position":3,"name":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d6\u30ea\u30fc\u30d5\u30a3\u30f3\u30b0","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/0230d7aa907e63f4dde268df6f63ed44","name":"\u30bb\u30b5\u30eb\u30fb\u30c0\u30cb\u30a8\u30eb\u30fb\u30d0\u30ec\u30c3\u30c8","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30e9\u30a4\u30bf\u30fc\u3067\u3042\u308a\u5c02\u9580\u5bb6\u3068\u3057\u3066\u5c0a\u656c\u3092\u96c6\u3081\u3066\u304a\u308a\u3001\u305d\u306e\u6df1\u3044\u77e5\u8b58\u3068\u8907\u96d1\u306a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30c8\u30d4\u30c3\u30af\u3092\u5358\u7d14\u5316\u3059\u308b\u80fd\u529b\u3067\u77e5\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30c7\u30fc\u30bf\u4fdd\u8b77\u306e\u5206\u91ce\u3067\u8c4a\u5bcc\u306a\u7d4c\u9a13\u3092\u6301\u3061\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6700\u65b0\u52d5\u5411\u306b\u95a2\u3059\u308b\u6d1e\u5bdf\u306b\u6e80\u3061\u305f\u8a18\u4e8b\u3084\u5206\u6790\u3092\u5b9a\u671f\u7684\u306b\u5bc4\u7a3f\u3057\u3001\u5c02\u9580\u5bb6\u3068\u4e00\u822c\u5e02\u6c11\u306e\u4e21\u65b9\u3092\u6559\u80b2\u3057\u3066\u3044\u308b\u3002","url":"https:\/\/securitybriefing.net\/ja\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/3020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/comments?post=3020"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/posts\/3020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media\/3021"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/media?parent=3020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/categories?post=3020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ja\/wp-json\/wp\/v2\/tags?post=3020"}],"curies":[{"name":"\u30ef\u30fc\u30c9\u30d7\u30ec\u30b9","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}