{"id":3020,"date":"2024-11-01T22:18:41","date_gmt":"2024-11-01T22:18:41","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3020"},"modified":"2024-11-01T22:19:11","modified_gmt":"2024-11-01T22:19:11","slug":"%ec%82%ac%ec%9d%b4%eb%b2%84%ec%97%90%ec%84%bc%ec%85%9c-10%ec%a3%bc%eb%85%84-%ea%b8%b0%ec%97%85-%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b0%a9%ec%96%b4-%ea%b0%95%ed%99%94%ec%9d%98-10%eb%85%84","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90\/%ec%82%ac%ec%9d%b4%eb%b2%84%ec%97%90%ec%84%bc%ec%85%9c-10%ec%a3%bc%eb%85%84-%ea%b8%b0%ec%97%85-%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b0%a9%ec%96%b4-%ea%b0%95%ed%99%94%ec%9d%98-10%eb%85%84\/","title":{"rendered":"\uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c\uc758 10\uc8fc\ub144\uc744 \uae30\ub150\ud569\ub2c8\ub2e4: \ube44\uc988\ub2c8\uc2a4 \uc0ac\uc774\ubc84 \ubc29\uc5b4 \uac15\ud654\uc758 10\ub144"},"content":{"rendered":"<p>Cyber Essentials \ud504\ub85c\uadf8\ub7a8\uc740 \uc601\uad6d\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ub178\ub825\uc758 \ucd08\uc11d\uc774\uba70, \uae30\uc5c5\ub4e4\uc774 \uc0ac\uc774\ubc84 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uc790\uc2e0\uc744 \ubcf4\ud638\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4. <\/p>\n\n\n\n<p class=\"translation-block\">\ud604\uc7ac 10\uc8fc\ub144\uc744 \ub9de\uc774\ud55c <a href=\"https:\/\/www.ncsc.gov.uk\/news\/cyber-essentials-scheme-marks-a-decade-of-boosting-businesses-cyber-defences\" target=\"_self\">\uc774 \uc81c\ub3c4<\/a>\ub294 \uad6d\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc13c\ud130(NCSC)\uc5d0\uc11c \uac1c\ubc1c\ud558\uc600\uc73c\uba70, \ubaa8\ub4e0 \uaddc\ubaa8\uc758 \uc870\uc9c1\uc5d0 \uc0ac\uc774\ubc84 \uacf5\uaca9 \uc704\ud5d8\uc744 \uc904\uc774\uae30 \uc704\ud55c \uac04\ub2e8\ud558\uc9c0\ub9cc \ud6a8\uacfc\uc801\uc778 \ubcf4\uc548 \uc870\uce58\ub97c \ucde8\ud560 \uc218 \uc788\ub294 \ub3c4\uad6c\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uae30\ub150\uc77c\uc744 \ub9de\uc544 NCSC\ub294 \uacfc\ud559, \ud601\uc2e0 \ubc0f \uae30\uc220 \ubd80\uc11c\uc640 \ubc14\ud074\ub808\uc774\uc2a4, \ub85c\uc774\ub4dc \uc740\ud589 \uadf8\ub8f9, \ub124\uc774\uc158\uc640\uc774\ub4dc, \ub0b4\ud2b8\uc6e8\uc2a4\ud2b8, \uc0b0\ud0c4\ub370\ub974 UK, TSB\ub97c \ud3ec\ud568\ud55c \uc601\uad6d\uc758 \uc8fc\uc694 \uc740\ud589\ub4e4\uacfc \ud611\ub825\ud588\uc2b5\ub2c8\ub2e4. <\/p>\n\n\n\n<p class=\"translation-block\">\uadf8\ub4e4\uc740 \ud798\uc744 \ud569\uccd0 \ubaa8\ub4e0 \uc601\uad6d \uae30\uc5c5\uc774 \uacf5\uae09\ub9dd \uc804\ubc18\uc5d0 \uac78\uccd0 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uac1c\uc120\ud558\ub3c4\ub85d <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-impact-evaluation\/cyber-essentials-impact-evaluation\" target=\"_self\">Cyber Essentials<\/a>\ub97c \ucc44\ud0dd\ud560 \uac83\uc744 \ucd09\uad6c\ud588\uc2b5\ub2c8\ub2e4. \uc9c0\ub09c 1\ub144 \ub3d9\uc548\ub9cc \ud574\ub3c4 40,000\uac1c \uc774\uc0c1\uc758 \uc778\uc99d\uc774 \uc218\uc5ec\ub418\uc5c8\uc73c\uba70, \uc774\ub294 \uc99d\uac00\ud558\ub294 \ub514\uc9c0\ud138 \uc704\ud611 \uc18d\uc5d0\uc11c \uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubc29\uc5b4\uc5d0 \ub300\ud55c \uc218\uc694 \uc99d\uac00\ub97c \ubc18\uc601\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-research-underlines-impact-of-cyber-essentials\"><strong>\uc0c8\ub85c\uc6b4 \uc5f0\uad6c\ub294 \uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c\uc758 \uc601\ud5a5\uc744 \uac15\uc870\ud569\ub2c8\ub2e4<\/strong><\/h2>\n\n\n<p>\uae30\ub150\uc77c\uc744 \uae30\ub150\ud558\uc5ec \ubc1c\ud45c\ub41c \uc0c8\ub85c\uc6b4 \uc5f0\uad6c\uc5d0 \ub530\ub974\uba74 Cyber Essentials \uc778\uc99d\uc744 \ubc1b\uc740 \uae30\uc5c5\ub4e4\uc774 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc778\uc2dd\uacfc \ud68c\ubcf5\ub825 \uc218\uc900\uc774 \ud5a5\uc0c1\ub41c \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4. \uc778\uc99d\uc740 \uc9c1\uc811\uc801\uc778 \uc0ac\uc774\ubc84 \ubcf4\ud638\ub97c \uac15\ud654\ud558\uace0 \ubcf4\ub2e4 \uc548\uc804\ud55c \uacf5\uae09\ub9dd \ub124\ud2b8\uc6cc\ud06c\ub97c \uad6c\ucd95\ud558\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc8fc\uba70, \ub354 \ub9ce\uc740 \uc870\uc9c1\uc774 \uac15\ub825\ud55c \ubcf4\uc548 \uc870\uce58\ub97c \ucc44\ud0dd\ud558\ub3c4\ub85d \uc720\ub3c4\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>NCSC\uc758 \uc0ac\uc774\ubc84 \uc131\uc7a5 \ubd80\uad6d\uc7a5\uc778 Chris Ensor\ub294 \uc774 \uacc4\ud68d\uc774 \ucc98\uc74c \uc2dc\uc791\ub418\uc5c8\uc744 \ub54c\ub9cc\ud07c \uc624\ub298\ub0a0\uc5d0\ub3c4 \uc5ec\uc804\ud788 \uc911\uc694\ud55c \uc758\ubbf8\ub97c \uac00\uc9c4\ub2e4\uace0 \uac15\uc870\ud588\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\uc0ac\uc774\ubc84 \uc704\ud611 \ud658\uacbd\uc774 \uacc4\uc18d \uc9c4\ud654\ud568\uc5d0 \ub530\ub77c \uacf5\uaca9\uc790\ub4e4\uc740 2014\ub144\uc5d0 \uacf5\uaca9\ud588\ub358 \uac83\uacfc \ub3d9\uc77c\ud55c \ucde8\uc57d\uc810\uc744 \uacc4\uc18d \uc0ac\uc6a9\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub807\uae30 \ub54c\ubb38\uc5d0 \ubaa8\ub4e0 \uc870\uc9c1\uc774 \uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c\uc744 \uc0ac\uc774\ubc84 \ubcf5\uc6d0\ub825\uc758 \uae30\ubcf8 \uc694\uc18c\ub85c \uc0bc\uc744 \uac83\uc744 \ucd09\uad6c\ud569\ub2c8\ub2e4.\"<\/p>\n<\/blockquote>\n\n\n\n<p>\uadf8\ub294 \uc774 \uacc4\ud68d\uc758 \uc2e4\uc81c\uc801\uc778 \uc774\uc810\uc744 \uac15\uc870\ud588\uc2b5\ub2c8\ub2e4: \u201cCyber Essentials\uc758 \ub2e4\uc12f \uac00\uc9c0 \ud575\uc2ec \ud1b5\uc81c\ub97c \ucc44\ud0dd\ud55c \uae30\uc5c5\uc740 \uc0ac\uc774\ubc84 \uacf5\uaca9\uc5d0 \uc758\ud574 \uce68\ud574\ub420 \uac00\ub2a5\uc131\uc744 \ud06c\uac8c \uc904\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4.\u201d<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-security-minister-continued-vigilance-paramount\"><strong>\uc0ac\uc774\ubc84 \ubcf4\uc548 \uc7a5\uad00: \uc9c0\uc18d\uc801\uc778 \uacbd\uacc4\uac00 \uc911\uc694<\/strong><\/h2>\n\n\n<p>\uc0c1\uc6d0 \uc758\uc6d0\ub4e4\uc5d0\uac8c \uc5f0\uc124\ud558\uba74\uc11c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc7a5\uad00\uc778 \ud398\ub9ac\uc584 \ud074\ub77d\uc740 \uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c\uc2a4 \ud504\ub85c\uadf8\ub7a8\uc758 \uc131\uacf5\uc744 \uce6d\ucc2c\ud558\uace0 \uae30\uc5c5\ub4e4\uc774 \ub354 \uc548\uc804\ud55c \uc628\ub77c\uc778 \ud658\uacbd\uc744 \ub9cc\ub4e4 \uc218 \uc788\ub3c4\ub85d \ub3d5\uaca0\ub2e4\ub294 \uc815\ubd80\uc758 \uacb0\ub2e8\uc744 \ud655\uc778\ud588\uc2b5\ub2c8\ub2e4. <\/p>\n\n\n\n<p class=\"translation-block\">\uc7a5\uad00\uc740 \uc774\ub7ec\ud55c \uc778\uc99d\uc774 \ub0b4\ubd80 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uae30\uc220\uc774 \uc5c6\ub294 \ubaa8\ub4e0 \uae30\uc5c5\uc5d0\uac8c \ub9e4\uc6b0 \uc911\uc694\ud558\ub2e4\uace0 \uac15\uc870\ud588\uc2b5\ub2c8\ub2e4. \uadf8\ub140\ub294 \ub610\ud55c \uc778\uc99d\uacfc \ucd94\uac00 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc870\uce58\ub97c \ucc3e\uace0 \uc788\ub294 \uc870\uc9c1\uc5d0\uac8c \uc804\ubb38\uc801\uc778 \uc9c0\uce68\uc744 \uc81c\uacf5\ud558\ub294 NCSC\uc758 \uc0c8\ub85c\uc6b4 \uc778\uc99d\uc744 \ubc1b\uc740 <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview\" target=\"_self\">Cyber Advisor Service<\/a>\uc5d0 \uc5f0\ub77d\ud560 \uac83\uc744 \uc870\uc9c1\ub4e4\uc5d0\uac8c \ucd09\uad6c\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c\uc2a4 \ud504\ub85c\uadf8\ub7a8\uc774 \ub450 \ubc88\uc9f8 10\ub144\uc9f8\uc5d0 \uc811\uc5b4\ub4e4\uba74\uc11c, NCSC\uc640 \uadf8 \ud30c\ud2b8\ub108\ub4e4\uc740 \ubaa8\ub4e0 \uaddc\ubaa8\uc758 \uae30\uc5c5\ub4e4\uc774 \uac15\ub825\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uad00\ud589\uc744 \ucc44\ud0dd\ud558\ub3c4\ub85d \uacc4\uc18d\ud574\uc11c \uc7a5\ub824\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub294 \uc790\uc0b0\uc744 \ubcf4\ud638\ud560 \ubfd0\ub9cc \uc544\ub2c8\ub77c \uace0\uac1d, \ud30c\ud2b8\ub108, \uadf8\ub9ac\uace0 \ub354 \ub113\uc740 \uc601\uad6d \uacbd\uc81c\uc758 \uc790\uc0b0\ub3c4 \ubcf4\ud638\ud558\ub294 \uac83\uc785\ub2c8\ub2e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>\uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c \uc81c\ub3c4\ub294 \uc601\uad6d\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ub178\ub825\uc758 \ucd08\uc11d\uc73c\ub85c, \uae30\uc5c5\uc774 \uc0ac\uc774\ubc84 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \uc2a4\uc2a4\ub85c\ub97c \ubcf4\ud638\ud560 \uc218 \uc788\ub3c4\ub85d \uc9c0\uc6d0\ud569\ub2c8\ub2e4. \uc62c\ud574\ub85c 10\uc8fc\ub144\uc744 \ub9de\uc774\ud558\ub294 \uc774 \uc81c\ub3c4\ub294 \ub2e4\uc74c\uacfc \uac19\uc774 \uac1c\ubc1c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90\/%ec%82%ac%ec%9d%b4%eb%b2%84%ec%97%90%ec%84%bc%ec%85%9c-10%ec%a3%bc%eb%85%84-%ea%b8%b0%ec%97%85-%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b0%a9%ec%96%b4-%ea%b0%95%ed%99%94%ec%9d%98-10%eb%85%84\/\"><span class=\"screen-reader-text\">\uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c\uc758 10\uc8fc\ub144\uc744 \uae30\ub150\ud569\ub2c8\ub2e4: \ube44\uc988\ub2c8\uc2a4 \uc0ac\uc774\ubc84 \ubc29\uc5b4 \uac15\ud654\uc758 10\ub144<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":3021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,40],"tags":[],"class_list":["post-3020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","category-cyber-alerts","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc0ac\uc774\ubc84\uc5d0\uc13c\uc15c-10\uc8fc\ub144-\uae30\uc5c5-\uc0ac\uc774\ubc84-\ubc29\uc5b4-\uac15\ud654\uc758-10\ub144\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cyber Essentials scheme is a cornerstone of the UK&#8217;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats. Now celebrating its tenth year, the scheme, developed by the&hellip; Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses \uacc4\uc18d \uc77d\uae30\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc0ac\uc774\ubc84\uc5d0\uc13c\uc15c-10\uc8fc\ub144-\uae30\uc5c5-\uc0ac\uc774\ubc84-\ubc29\uc5b4-\uac15\ud654\uc758-10\ub144\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T22:18:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T22:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"articleSection\":[\"Cryptocurrency\",\"cyber alerts\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Celebrating 10 Years of Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c 10\uc8fc\ub144 \uae30\ub150: \ube44\uc988\ub2c8\uc2a4 \uc0ac\uc774\ubc84 \ubc29\uc5b4 \uac15\ud654\uc758 10\ub144 | \ubcf4\uc548 \ube0c\ub9ac\ud551","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc0ac\uc774\ubc84\uc5d0\uc13c\uc15c-10\uc8fc\ub144-\uae30\uc5c5-\uc0ac\uc774\ubc84-\ubc29\uc5b4-\uac15\ud654\uc758-10\ub144\/","og_locale":"ko_KR","og_type":"article","og_title":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing","og_description":"The Cyber Essentials scheme is a cornerstone of the UK&#8217;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats. Now celebrating its tenth year, the scheme, developed by the&hellip; Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses \uacc4\uc18d \uc77d\uae30","og_url":"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc0ac\uc774\ubc84\uc5d0\uc13c\uc15c-10\uc8fc\ub144-\uae30\uc5c5-\uc0ac\uc774\ubc84-\ubc29\uc5b4-\uac15\ud654\uc758-10\ub144\/","og_site_name":"Security Briefing","article_published_time":"2024-11-01T22:18:41+00:00","article_modified_time":"2024-11-01T22:19:11+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"2\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"wordCount":408,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","articleSection":["Cryptocurrency","cyber alerts"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","name":"\uc0ac\uc774\ubc84 \uc5d0\uc13c\uc15c 10\uc8fc\ub144 \uae30\ub150: \ube44\uc988\ub2c8\uc2a4 \uc0ac\uc774\ubc84 \ubc29\uc5b4 \uac15\ud654\uc758 10\ub144 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","width":1265,"height":422,"caption":"Celebrating 10 Years of Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/3020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=3020"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/3020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/3021"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=3020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=3020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=3020"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}