{"id":3020,"date":"2024-11-01T22:18:41","date_gmt":"2024-11-01T22:18:41","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3020"},"modified":"2024-11-01T22:19:11","modified_gmt":"2024-11-01T22:19:11","slug":"ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/tien-dien-tu\/ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep\/","title":{"rendered":"K\u1ef7 ni\u1ec7m 10 n\u0103m Cyber Essentials: M\u1ed9t th\u1eadp k\u1ef7 t\u0103ng c\u01b0\u1eddng ph\u00f2ng th\u1ee7 m\u1ea1ng cho doanh nghi\u1ec7p"},"content":{"rendered":"<p>Ch\u01b0\u01a1ng tr\u00ecnh Cyber Essentials l\u00e0 n\u1ec1n t\u1ea3ng quan tr\u1ecdng trong n\u1ed7 l\u1ef1c an ninh m\u1ea1ng c\u1ee7a V\u01b0\u01a1ng qu\u1ed1c Anh, gi\u00fap c\u00e1c doanh nghi\u1ec7p b\u1ea3o v\u1ec7 ch\u00ednh m\u00ecnh kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng. <\/p>\n\n\n\n<p class=\"translation-block\">Hi\u1ec7n \u0111ang k\u1ef7 ni\u1ec7m n\u0103m th\u1ee9 m\u01b0\u1eddi, <a href=\"https:\/\/www.ncsc.gov.uk\/news\/cyber-essentials-scheme-marks-a-decade-of-boosting-businesses-cyber-defences\" target=\"_self\">ch\u01b0\u01a1ng tr\u00ecnh<\/a>, \u0111\u01b0\u1ee3c ph\u00e1t tri\u1ec3n b\u1edfi Trung t\u00e2m An ninh M\u1ea1ng Qu\u1ed1c gia, cung c\u1ea5p cho c\u00e1c t\u1ed5 ch\u1ee9c m\u1ecdi quy m\u00f4 c\u00f4ng c\u1ee5 \u0111\u1ec3 gi\u1ea3m thi\u1ec3u r\u1ee7i ro b\u1ecb t\u1ea5n c\u00f4ng m\u1ea1ng b\u1eb1ng c\u00e1ch th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt \u0111\u01a1n gi\u1ea3n nh\u01b0ng hi\u1ec7u qu\u1ea3.<\/p>\n\n\n\n<p>\u0110\u1ec3 \u0111\u00e1nh d\u1ea5u k\u1ef7 ni\u1ec7m, NCSC \u0111\u00e3 h\u1ee3p t\u00e1c v\u1edbi B\u1ed9 Khoa h\u1ecdc, \u0110\u1ed5i m\u1edbi v\u00e0 C\u00f4ng ngh\u1ec7 v\u00e0 m\u1ed9t s\u1ed1 ng\u00e2n h\u00e0ng l\u1edbn nh\u1ea5t c\u1ee7a V\u01b0\u01a1ng qu\u1ed1c Anh, bao g\u1ed3m Barclays, Lloyds Banking Group, Nationwide, NatWest, Santander UK v\u00e0 TSB. <\/p>\n\n\n\n<p class=\"translation-block\">C\u00f9ng nhau, h\u1ecd khuy\u1ebfn kh\u00edch t\u1ea5t c\u1ea3 c\u00e1c doanh nghi\u1ec7p \u1edf V\u01b0\u01a1ng qu\u1ed1c Anh c\u1ea3i thi\u1ec7n b\u1ea3o m\u1eadt m\u1ea1ng trong chu\u1ed7i cung \u1ee9ng c\u1ee7a h\u1ecd b\u1eb1ng c\u00e1ch \u00e1p d\u1ee5ng <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-impact-evaluation\/cyber-essentials-impact-evaluation\" target=\"_self\">Cyber Essentials<\/a>. Ch\u1ec9 ri\u00eang trong n\u0103m qua, h\u01a1n 40.000 ch\u1ee9ng nh\u1eadn \u0111\u00e3 \u0111\u01b0\u1ee3c trao, ph\u1ea3n \u00e1nh nhu c\u1ea7u ng\u00e0y c\u00e0ng t\u0103ng \u0111\u1ed1i v\u1edbi c\u00e1c bi\u1ec7n ph\u00e1p ph\u00f2ng th\u1ee7 m\u1ea1ng m\u1ea1nh m\u1ebd gi\u1eefa nh\u1eefng m\u1ed1i \u0111e d\u1ecda k\u1ef9 thu\u1eadt s\u1ed1 ng\u00e0y c\u00e0ng gia t\u0103ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-research-underlines-impact-of-cyber-essentials\"><strong>Nghi\u00ean C\u1ee9u M\u1edbi Nh\u1ea5n M\u1ea1nh T\u00e1c \u0110\u1ed9ng c\u1ee7a Cyber Essentials<\/strong><\/h2>\n\n\n<p>Nghi\u00ean c\u1ee9u m\u1edbi \u0111\u01b0\u1ee3c c\u00f4ng b\u1ed1 nh\u00e2n d\u1ecbp k\u1ef7 ni\u1ec7m cho th\u1ea5y c\u00e1c doanh nghi\u1ec7p c\u00f3 ch\u1ee9ng nh\u1eadn Cyber Essentials th\u1ec3 hi\u1ec7n m\u1ee9c \u0111\u1ed9 nh\u1eadn th\u1ee9c v\u00e0 kh\u1ea3 n\u0103ng ph\u1ee5c h\u1ed3i v\u1ec1 an ninh m\u1ea1ng cao h\u01a1n. Ch\u1ee9ng nh\u1eadn n\u00e2ng cao c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o v\u1ec7 an ninh m\u1ea1ng tr\u1ef1c ti\u1ebfp v\u00e0 gi\u00fap t\u1ea1o ra m\u1ed9t m\u1ea1ng l\u01b0\u1edbi chu\u1ed7i cung \u1ee9ng an to\u00e0n h\u01a1n, khuy\u1ebfn kh\u00edch c\u00e1c t\u1ed5 ch\u1ee9c \u00e1p d\u1ee5ng c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt m\u1ea1nh m\u1ebd h\u01a1n.<\/p>\n\n\n\n<p>Chris Ensor, Ph\u00f3 Gi\u00e1m \u0111\u1ed1c Ph\u00e1t tri\u1ec3n An ninh M\u1ea1ng t\u1ea1i NCSC, nh\u1ea5n m\u1ea1nh r\u1eb1ng ch\u01b0\u01a1ng tr\u00ecnh n\u00e0y v\u1eabn gi\u1eef \u0111\u01b0\u1ee3c t\u00ednh ph\u00f9 h\u1ee3p cho \u0111\u1ebfn ng\u00e0y nay nh\u01b0 khi n\u00f3 l\u1ea7n \u0111\u1ea7u ti\u00ean \u0111\u01b0\u1ee3c ra m\u1eaft:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Khi b\u1ed1i c\u1ea3nh m\u1ed1i \u0111e d\u1ecda m\u1ea1ng ti\u1ebfp t\u1ee5c ph\u00e1t tri\u1ec3n, k\u1ebb t\u1ea5n c\u00f4ng v\u1eabn s\u1eed d\u1ee5ng nh\u1eefng l\u1ed7 h\u1ed5ng m\u00e0 ch\u00fang \u0111\u00e3 nh\u1eafm t\u1edbi t\u1eeb n\u0103m 2014. \u0110\u00f3 l\u00e0 l\u00fd do t\u1ea1i sao t\u00f4i k\u00eau g\u1ecdi t\u1ea5t c\u1ea3 c\u00e1c t\u1ed5 ch\u1ee9c l\u00e0m cho Cyber Essentials tr\u1edf th\u00e0nh m\u1ed9t ph\u1ea7n c\u01a1 b\u1ea3n c\u1ee7a kh\u1ea3 n\u0103ng ph\u1ee5c h\u1ed3i m\u1ea1ng c\u1ee7a h\u1ecd.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>\u00d4ng \u0111\u00e3 nh\u1ea5n m\u1ea1nh nh\u1eefng l\u1ee3i \u00edch th\u1ef1c s\u1ef1 c\u1ee7a k\u1ebf ho\u1ea1ch: \u201cC\u00e1c doanh nghi\u1ec7p \u00e1p d\u1ee5ng n\u0103m ki\u1ec3m so\u00e1t c\u1ed1t l\u00f5i c\u1ee7a Cyber Essentials c\u00f3 th\u1ec3 gi\u1ea3m \u0111\u00e1ng k\u1ec3 kh\u1ea3 n\u0103ng b\u1ecb t\u1ea5n c\u00f4ng m\u1ea1ng.\u201d<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-security-minister-continued-vigilance-paramount\"><strong>B\u1ed9 tr\u01b0\u1edfng An ninh M\u1ea1ng: S\u1ef1 C\u1ea3nh gi\u00e1c Li\u00ean t\u1ee5c l\u00e0 Quan tr\u1ecdng<\/strong><\/h2>\n\n\n<p>Khi ph\u00e1t bi\u1ec3u tr\u01b0\u1edbc c\u00e1c th\u00e0nh vi\u00ean trong House of Lords, B\u1ed9 tr\u01b0\u1edfng An ninh m\u1ea1ng Feryal Clark \u0111\u00e3 khen ng\u1ee3i th\u00e0nh c\u00f4ng c\u1ee7a ch\u01b0\u01a1ng tr\u00ecnh Cyber Essentials v\u00e0 x\u00e1c nh\u1eadn quy\u1ebft t\u00e2m c\u1ee7a ch\u00ednh ph\u1ee7 trong vi\u1ec7c gi\u00fap c\u00e1c doanh nghi\u1ec7p t\u1ea1o ra m\u1ed9t m\u00f4i tr\u01b0\u1eddng tr\u1ef1c tuy\u1ebfn an to\u00e0n h\u01a1n. <\/p>\n\n\n\n<p class=\"translation-block\">B\u1ed9 tr\u01b0\u1edfng nh\u1ea5n m\u1ea1nh r\u1eb1ng ch\u1ee9ng nh\u1eadn nh\u01b0 v\u1eady l\u00e0 r\u1ea5t quan tr\u1ecdng \u0111\u1ed1i v\u1edbi t\u1ea5t c\u1ea3 c\u00e1c doanh nghi\u1ec7p kh\u00f4ng c\u00f3 k\u1ef9 n\u0103ng an ninh m\u1ea1ng n\u1ed9i b\u1ed9. B\u00e0 c\u0169ng k\u00eau g\u1ecdi c\u00e1c t\u1ed5 ch\u1ee9c li\u00ean h\u1ec7 v\u1edbi <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview\" target=\"_self\">Cyber Advisor Service<\/a>, m\u1edbi \u0111\u01b0\u1ee3c NCSC c\u00f4ng nh\u1eadn, cung c\u1ea5p h\u01b0\u1edbng d\u1eabn chuy\u00ean nghi\u1ec7p cho c\u00e1c t\u1ed5 ch\u1ee9c t\u00ecm ki\u1ebfm ch\u1ee9ng nh\u1eadn v\u00e0 c\u00e1c bi\u1ec7n ph\u00e1p an ninh m\u1ea1ng b\u1ed5 sung.<\/p>\n\n\n\n<p>Khi ch\u01b0\u01a1ng tr\u00ecnh Cyber Essentials b\u01b0\u1edbc v\u00e0o th\u1eadp k\u1ef7 th\u1ee9 hai, NCSC v\u00e0 c\u00e1c \u0111\u1ed1i t\u00e1c c\u1ee7a m\u00ecnh ti\u1ebfp t\u1ee5c khuy\u1ebfn kh\u00edch c\u00e1c doanh nghi\u1ec7p m\u1ecdi quy m\u00f4 \u00e1p d\u1ee5ng c\u00e1c th\u1ef1c h\u00e0nh b\u1ea3o m\u1eadt m\u1ea1ng m\u1ea1nh m\u1ebd \u2014 b\u1ea3o v\u1ec7 t\u00e0i s\u1ea3n c\u1ee7a h\u1ecd c\u0169ng nh\u01b0 t\u00e0i s\u1ea3n c\u1ee7a kh\u00e1ch h\u00e0ng, \u0111\u1ed1i t\u00e1c v\u00e0 n\u1ec1n kinh t\u1ebf r\u1ed9ng l\u1edbn c\u1ee7a V\u01b0\u01a1ng qu\u1ed1c Anh.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ch\u01b0\u01a1ng tr\u00ecnh Cyber Essentials l\u00e0 n\u1ec1n t\u1ea3ng cho c\u00e1c n\u1ed7 l\u1ef1c an ninh m\u1ea1ng c\u1ee7a V\u01b0\u01a1ng qu\u1ed1c Anh, trao quy\u1ec1n cho c\u00e1c doanh nghi\u1ec7p t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi c\u00e1c m\u1ed1i \u0111e d\u1ecda tr\u00ean m\u1ea1ng. Hi\u1ec7n \u0111ang k\u1ef7 ni\u1ec7m n\u0103m th\u1ee9 m\u01b0\u1eddi, ch\u01b0\u01a1ng tr\u00ecnh do\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/tien-dien-tu\/ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">K\u1ef7 ni\u1ec7m 10 n\u0103m Cyber Essentials: M\u1ed9t th\u1eadp k\u1ef7 t\u0103ng c\u01b0\u1eddng ph\u00f2ng th\u1ee7 m\u1ea1ng cho doanh nghi\u1ec7p<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3021,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,40],"tags":[],"class_list":["post-3020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","category-cyber-alerts","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/tien-dien-tu\/ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cyber Essentials scheme is a cornerstone of the UK&#8217;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats. Now celebrating its tenth year, the scheme, developed by the&hellip; Continue reading Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/tien-dien-tu\/ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T22:18:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T22:19:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"},\"wordCount\":408,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"articleSection\":[\"Cryptocurrency\",\"cyber alerts\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\",\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"datePublished\":\"2024-11-01T22:18:41+00:00\",\"dateModified\":\"2024-11-01T22:19:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg\",\"width\":1265,\"height\":422,\"caption\":\"Celebrating 10 Years of Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K\u1ef7 ni\u1ec7m 10 n\u0103m Cyber Essentials: M\u1ed9t th\u1eadp k\u1ef7 c\u1ee7ng c\u1ed1 ph\u00f2ng th\u1ee7 m\u1ea1ng cho doanh nghi\u1ec7p | T\u00f3m t\u1eaft an ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/tien-dien-tu\/ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep\/","og_locale":"vi_VN","og_type":"article","og_title":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses | Security Briefing","og_description":"The Cyber Essentials scheme is a cornerstone of the UK&#8217;s cybersecurity efforts, empowering businesses to protect themselves from cyber threats. Now celebrating its tenth year, the scheme, developed by the&hellip; Continue reading Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses","og_url":"https:\/\/securitybriefing.net\/vi\/tien-dien-tu\/ky-niem-10-nam-cyber-essentials-mot-thap-ky-tang-cuong-phong-thu-cyber-cho-doanh-nghiep\/","og_site_name":"Security Briefing","article_published_time":"2024-11-01T22:18:41+00:00","article_modified_time":"2024-11-01T22:19:11+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"2 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"},"wordCount":408,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","articleSection":["Cryptocurrency","cyber alerts"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/","name":"K\u1ef7 ni\u1ec7m 10 n\u0103m Cyber Essentials: M\u1ed9t th\u1eadp k\u1ef7 c\u1ee7ng c\u1ed1 ph\u00f2ng th\u1ee7 m\u1ea1ng cho doanh nghi\u1ec7p | T\u00f3m t\u1eaft an ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","datePublished":"2024-11-01T22:18:41+00:00","dateModified":"2024-11-01T22:19:11+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/Celebrating-10-Years-of-Cyber.jpg","width":1265,"height":422,"caption":"Celebrating 10 Years of Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/celebrating-10-years-of-cyber-essentials-a-decade-of-strengthening-business-cyber-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Celebrating 10 Years of Cyber Essentials: A Decade of Strengthening Business Cyber Defenses"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/3020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=3020"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/3020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/3021"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=3020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=3020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=3020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}