{"id":3020,"date":"2024-11-01T22:18:41","date_gmt":"2024-11-01T22:18:41","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3020"},"modified":"2024-11-01T22:19:11","modified_gmt":"2024-11-01T22:19:11","slug":"firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet\/","title":{"rendered":"Vi firar 10 \u00e5r med Cyber Essentials: Ett decennium av st\u00e4rkande av f\u00f6retagens cyberf\u00f6rsvar"},"content":{"rendered":"<p>Cyber Essentials \u00e4r en h\u00f6rnsten i Storbritanniens arbete med cybers\u00e4kerhet och ger f\u00f6retag m\u00f6jlighet att skydda sig mot cyberhot. <\/p>\n\n\n\n<p class=\"translation-block\">Nu, n\u00e4r det firar sitt tionde \u00e5r, erbjuder <a href=\"https:\/\/www.ncsc.gov.uk\/news\/cyber-essentials-scheme-marks-a-decade-of-boosting-businesses-cyber-defences\" target=\"_self\">programmet<\/a>, utvecklat av National Cyber Security Centre, organisationer av alla storlekar verktyg f\u00f6r att minska risken f\u00f6r cyberattacker genom att vidta enkla men effektiva s\u00e4kerhets\u00e5tg\u00e4rder.<\/p>\n\n\n\n<p>F\u00f6r att markera jubileet samarbetade NCSC med Department of Science, Innovation and Technology och n\u00e5gra av Storbritanniens st\u00f6rsta banker, d\u00e4ribland Barclays, Lloyds Banking Group, Nationwide, NatWest, Santander UK och TSB. <\/p>\n\n\n\n<p class=\"translation-block\">Genom att g\u00e5 samman uppmuntrade de alla brittiska f\u00f6retag att f\u00f6rb\u00e4ttra cybers\u00e4kerheten \u00f6ver sina leveranskedjor genom att anta <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-impact-evaluation\/cyber-essentials-impact-evaluation\" target=\"_self\">Cyber Essentials<\/a>. Bara under det senaste \u00e5ret har mer \u00e4n 40 000 certifikat utf\u00e4rdats, vilket speglar den v\u00e4xande efterfr\u00e5gan p\u00e5 robusta cyberf\u00f6rsvar mitt i \u00f6kade digitala hot.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-research-underlines-impact-of-cyber-essentials\"><strong>Ny forskning understryker effekten av Cyber Essentials<\/strong><\/h2>\n\n\n<p>Ny forskning som publicerades f\u00f6r att markera \u00e5rsdagen visade att f\u00f6retag med Cyber Essentials-certifieringar uppvisar \u00f6kad medvetenhet och motst\u00e5ndskraft inom cybers\u00e4kerhet. Certifieringen f\u00f6rb\u00e4ttrar direkt cyberskydd och hj\u00e4lper till att skapa ett s\u00e4krare leverant\u00f6rskedjen\u00e4tverk, vilket uppmuntrar fler organisationer att anta starkare s\u00e4kerhets\u00e5tg\u00e4rder.<\/p>\n\n\n\n<p>Chris Ensor, Deputy Director for Cyber Growth p\u00e5 NCSC, betonade att programmet fortfarande \u00e4r lika relevant idag som n\u00e4r det f\u00f6rst lanserades:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>I takt med att cyberhotbilden forts\u00e4tter att utvecklas anv\u00e4nder angripare samma s\u00e5rbarheter som de riktade in sig p\u00e5 2014. Det \u00e4r d\u00e4rf\u00f6r jag uppmanar alla organisationer att g\u00f6ra Cyber Essentials till en grundl\u00e4ggande del av sin cyberresiliens.\"<\/p>\n<\/blockquote>\n\n\n\n<p>Han framh\u00f6ll de verkliga f\u00f6rdelarna med systemet: \"F\u00f6retag som antar Cyber Essentials fem k\u00e4rnkontroller kan avsev\u00e4rt minska sina chanser att uts\u00e4ttas f\u00f6r cyberattacker.\"<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-security-minister-continued-vigilance-paramount\"><strong>Minister f\u00f6r cybers\u00e4kerhet: Fortsatt vaksamhet \u00e4r av st\u00f6rsta vikt<\/strong><\/h2>\n\n\n<p>Cyber Security Minister Feryal Clark talade inf\u00f6r \u00f6verhusets ledam\u00f6ter och lovordade framg\u00e5ngen med Cyber Essentials och bekr\u00e4ftade regeringens beslutsamhet att hj\u00e4lpa f\u00f6retag att skapa en s\u00e4krare milj\u00f6 p\u00e5 n\u00e4tet. <\/p>\n\n\n\n<p class=\"translation-block\">Ministern understr\u00f6k att s\u00e5dan certifiering var avg\u00f6rande f\u00f6r alla f\u00f6retag som inte har intern cybers\u00e4kerhetsexpertis. Hon uppmanade ocks\u00e5 organisationerna att kontakta <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview\" target=\"_self\">Cyber Advisor Service<\/a>, nyligen ackrediterad av NCSC, som erbjuder professionell v\u00e4gledning till organisationer som s\u00f6ker certifiering och ytterligare cybers\u00e4kerhets\u00e5tg\u00e4rder.<\/p>\n\n\n\n<p>Nu n\u00e4r Cyber Essentials g\u00e5r in p\u00e5 sitt andra decennium forts\u00e4tter NCSC och dess partners att uppmuntra f\u00f6retag av alla storlekar att inf\u00f6ra starka cybers\u00e4kerhetsrutiner - f\u00f6r att skydda sina egna tillg\u00e5ngar, men ocks\u00e5 kundernas, partnernas och den brittiska ekonomin i stort.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber Essentials \u00e4r en h\u00f6rnsten i Storbritanniens cybers\u00e4kerhetsarbete och ger f\u00f6retag m\u00f6jlighet att skydda sig mot cyberhot. Systemet, som nu firar sitt tionde \u00e5r, har utvecklats av... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet\/\">Continue reading <span class=\"screen-reader-text\">Vi firar 10 \u00e5r med Cyber Essentials: Ett decennium av st\u00e4rkande av f\u00f6retagens cyberf\u00f6rsvar<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,40],"tags":[],"class_list":["post-3020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","category-cyber-alerts","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cyber Essentials scheme is a cornerstone of the UK&#8217;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats. Now celebrating its tenth year, the scheme, developed by the&hellip; Forts\u00e4tt l\u00e4sa Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T22:18:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T22:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"articleSection\":[\"Cryptocurrency\",\"cyber alerts\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Celebrating 10 Years of Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fira 10 \u00e5r av Cyber Essentials: Ett decennium av att st\u00e4rka f\u00f6retagens cyberf\u00f6rsvar | S\u00e4kerhetsgenomg\u00e5ng","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet\/","og_locale":"sv_SE","og_type":"article","og_title":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing","og_description":"The Cyber Essentials scheme is a cornerstone of the UK&#8217;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats. Now celebrating its tenth year, the scheme, developed by the&hellip; Forts\u00e4tt l\u00e4sa Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses","og_url":"https:\/\/securitybriefing.net\/sv\/kryptovaluta\/firar-10-ar-av-cyber-essentials-ett-artionde-av-starkande-av-foretagens-cybersakerhet\/","og_site_name":"Security Briefing","article_published_time":"2024-11-01T22:18:41+00:00","article_modified_time":"2024-11-01T22:19:11+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"2 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"wordCount":408,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","articleSection":["Cryptocurrency","cyber alerts"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","name":"Fira 10 \u00e5r av Cyber Essentials: Ett decennium av att st\u00e4rka f\u00f6retagens cyberf\u00f6rsvar | S\u00e4kerhetsgenomg\u00e5ng","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","width":1265,"height":422,"caption":"Celebrating 10 Years of Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/3020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=3020"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/3020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/3021"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=3020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=3020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=3020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}