{"id":13364,"date":"2022-04-17T16:21:49","date_gmt":"2022-04-17T16:21:49","guid":{"rendered":"https:\/\/faisalhoque.com\/?p=13364"},"modified":"2022-04-17T16:21:49","modified_gmt":"2022-04-17T16:21:49","slug":"the-dangers-of-outdated-or-inadequate-cyber-security","status":"publish","type":"post","link":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/","title":{"rendered":"The Dangers of Outdated or Inadequate Cyber Security"},"content":{"rendered":"<h2 id=\"24e1\" class=\"pw-subtitle-paragraph jq is it bn b jr js jt ju jv jw jx jy jz ka kb kc kd ke kf kg kh co\" data-selectable-paragraph=\"\">The cost, while enormous from a financial standpoint, goes beyond monetary issues \u2014 infrastructure, societal stability, national security and mental health, both group and individual, are also at risk.<\/h2>\n<p><strong>BY\u00a0<a title=\"View user profile.\" href=\"https:\/\/faisalhoque.com\" target=\"_blank\" rel=\"noopener\">FAISAL HOQUE<\/a>\u00a0<\/strong><\/p>\n<p id=\"4d82\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Government, business and society as a whole are increasingly relying on technology to manage everything from public services to business processes. As this migration into the digital universe continues and accelerates, the threats of cybercrime and security lapses of all sorts loom large.<\/p>\n<p id=\"2d53\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">The cost, while enormous from a financial standpoint, goes beyond monetary issues \u2014 infrastructure, societal stability, national security and mental health, both group and individual, are also at risk.<\/p>\n<p id=\"a246\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">If that seems like an overreaction, consider the issue from the most specific perspective possible. According to Javelin\u2019s 2020 Identity Fraud Survey, roughly one in every 20 Americans are impacted by identity theft every year. Monetarily speaking, that translates to roughly $17 billion in fraud.[1]<\/p>\n<p id=\"ef91\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Upping that scope just a bit, according to a recent report by IBM and the Ponemon Institute, the average cost of a data breach in 2021 in the United States was a shocking $4.24 million, a 10 percent jump from the prior year.[2] Security fails are particularly devastating to small businesses \u2014 an estimated 60 percent close within six months of being hacked.[3]<\/p>\n<p id=\"aeb1\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">There are a variety of reasons why cybercrime is exploding exponentially. First is simply the reality that an array of entities, from small privately run businesses to expansive government agencies, are using digital-based systems more and more. And greater use means a broader variety of targets.<\/p>\n<p id=\"3653\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Further, from an entrepreneurial standpoint, the bad guys are also doing a terrific job of coming up with new ways and tools to compromise all sorts of digital systems and networks. In mid-April 2022, U.S. officials announced thediscovery of an alarmingly comprehensive and effective system for attacking industrial facilities \u2014 including the ability to cause explosions.<\/p>\n<p id=\"ccbf\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Private security experts speculated it could take months or years to develop strong countermeasures.[4]<\/p>\n<p id=\"f3a9\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">That\u2019s discouragingly consistent. While those with malicious intent are proving to be alarmingly innovative, those on the other side have simply not been keeping pace with means with which to fend off such increasing attacks \u2014 even to the point of training an adequate number of people to join the fight. As detailed in the report, \u201cThe Life and Times of Cybersecurity Professionals 2021,\u201d the Information Systems Security Association found nearly 100 percent agreement among respondents that the so-called \u201ccyber skills gap\u201d \u2014 the number of people trained in cyber security \u2014 has not improved in the past five years.[5]<\/p>\n<p id=\"e727\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Those and other problems are reflected in the increasing frequency and aggressiveness of cybercrime. One glaring example \u2014 faltering supply chains \u2014 became particularly evident during the COVID-19 pandemic. As has occurred in other areas of commerce, increasing digitalization of physical supply chains created new soft security points. Moreover, supply chains\u2019 reliance on technology providers and other third parties made them equally vulnerable. And it showed \u2014 in December 2021, just one week after discovering a critical security flaw in a widely used software library, more than 100 attempts at exploiting the vulnerability were detected every minute.[6]<\/p>\n<p id=\"b763\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Another problematic issue is legal in nature. Phrased simply, there are few obstacles to getting into the ransomeware racket. So-called cyber mercenaries are eager to provide access to sophisticated cyber-intrusion tools to facilitate all sorts of attacks. And once you\u2019re in the game, it\u2019s fairly easy to stay. Cryptocurrencies have allowed cybercriminals to collect payments with only modest risk of detection, prosecution or monetary penalties.[7]<\/p>\n<p id=\"4593\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Greater sophistication has also allowed cybercriminals to pick targets of choice rather than simply settling for short lived opportunities. This can allow cyberattacks to be carried out at highly specific points with a greater potential payback while still letting them capitalize on short term opportunities such as natural disasters.<\/p>\n<p id=\"88a9\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">Outdated forms of technology also allow for an array of ready targets \u2014 even those on a relatively small scale. For example, the information that passes electronically from a work station to a printer can be readily attacked as hackers develop increasingly sophisticated tools for hijacking data bound for a printer. Looked at in another way, a system once seen as cutting edge and ultra-convenient can prove a vulnerable dinosaur to adept cybercriminals \u2014 yet another reason to ditch such tools in favor of digital platforms.<\/p>\n<p id=\"9a87\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\"><strong class=\"kr iu\"><em class=\"ll\">Copyright 2022 by Faisal Hoque. All rights reserved.<\/em><\/strong><\/p>\n<div class=\"ev ew ex ey ez l\">\n<div class=\"o dz\">\n<div class=\"eo cf fa fb fc fd fe ff fg fh fi\">\n<article>\n<div class=\"l\">\n<div class=\"l\">\n<section>\n<div>\n<div class=\"ib ic id ie if\">\n<h2 id=\"caad\" class=\"ls lt it bn lu lv lw lx ly lz ma mb mc ky md me mf lc mg mh mi lg mj mk ml mm gj\" data-selectable-paragraph=\"\">REFERENCES<\/h2>\n<p id=\"8ab1\" class=\"pw-post-body-paragraph kp kq it kr b ks mn ju ku kv mo jx kx ky mp la lb lc mq le lf lg mr li lj lk ib gj\" data-selectable-paragraph=\"\">[1] <a class=\"au lm\" href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/how-common-is-identity-theft\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/www.experian.com\/blogs\/ask-experian\/how-common-is-identity-theft\/<\/a><\/p>\n<p id=\"aeaa\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">[2] <a class=\"au lm\" href=\"https:\/\/www.upguard.com\/blog\/cost-of-data-breach#:~:text=The%20average%20data%20breach%20costs,IBM%20and%20Ponemon%20Institute%20report.\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/www.upguard.com\/blog\/cost-of-data-breach#:~:text=The%20average%20data%20breach%20costs,IBM%20and%20Ponemon%20Institute%20report.<\/a><\/p>\n<p id=\"ff2d\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">[3] <a class=\"au lm\" href=\"https:\/\/cybersecurityventures.com\/60-percent-of-small-companies-close-within-6-months-of-being-hacked\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/cybersecurityventures.com\/60-percent-of-small-companies-close-within-6-months-of-being-hacked\/<\/a><\/p>\n<p id=\"3155\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">[4] <a class=\"au lm\" href=\"https:\/\/www.washingtonpost.com\/technology\/2022\/04\/13\/pipedream-malware-russia-lng\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/www.washingtonpost.com\/technology\/2022\/04\/13\/pipedream-malware-russia-lng\/<\/a><\/p>\n<p id=\"f463\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">[5] <a class=\"au lm\" href=\"https:\/\/www.issa.org\/cybersecurity-skills-crisis-continues-for-fifth-year-perpetuated-by-lack-of-business-investment\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/www.issa.org\/cybersecurity-skills-crisis-continues-for-fifth-year-perpetuated-by-lack-of-business-investment\/<\/a><\/p>\n<p id=\"51ee\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">[6] <a class=\"au lm\" href=\"https:\/\/www.bbc.com\/news\/technology-59638308#:~:text=A%20flaw%20in%20widely%20used,40%25%20of%20corporate%20networks%20globally.\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/www.bbc.com\/news\/technology-59638308#:~:text=A%20flaw%20in%20widely%20used,40%25%20of%20corporate%20networks%20globally.<\/a><\/p>\n<p id=\"a35e\" class=\"pw-post-body-paragraph kp kq it kr b ks kt ju ku kv kw jx kx ky kz la lb lc ld le lf lg lh li lj lk ib gj\" data-selectable-paragraph=\"\">[7] <a class=\"au lm\" href=\"https:\/\/sociable.co\/government-and-policy\/wef-global-risks-report-cyber-pandemic-erosion-trust-social-cohesion\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/sociable.co\/government-and-policy\/wef-global-risks-report-cyber-pandemic-erosion-trust-social-cohesion\/<\/a><\/p>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"ms l\"><\/div>\n<div><\/div>\n<div class=\"dc rm o dz mu mv\">\n<div class=\"mw eb mx my mz o ao c\">\n<div class=\"o ao gl\">\n<div class=\"pw-multi-vote-icon dq na nb nc nd\">\n<div class=\"\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"752\" aria-labelledby=\"752\">\n<div class=\"bb ne dt nf so nh ni nd dg sp sq sr\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"nl nm nn l\"><\/div>\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"753\" aria-labelledby=\"753\"><\/div>\n<\/div>\n<div class=\"nl sn nn l\"><\/div>\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"754\" aria-labelledby=\"754\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"creatorActionOverflowMenu\" aria-labelledby=\"creatorActionOverflowMenu\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"collectionSubmissionPopover\" aria-labelledby=\"collectionSubmissionPopover\">\n<div class=\"sm l hi\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"l\"><\/div>\n<footer class=\"nq nr ns nt o ao nu dd c\">\n<div class=\"l nv\">\n<div class=\"o dz\">\n<div class=\"eo cf fa fb fc fd fe ff fg fh fi\">\n<div class=\"o u nw\">\n<div class=\"o ao gl\">\n<div class=\"nx l\">\n<div class=\"o ao gl\">\n<div class=\"pw-multi-vote-icon dq na nb nc nd\">\n<div class=\"\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"756\" aria-labelledby=\"756\">\n<div class=\"bb ne dt nf so nh ni nd dg sp sq sr\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"oc o\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"757\" aria-labelledby=\"757\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"o ao\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"postFooterSocialMenu\" aria-labelledby=\"postFooterSocialMenu\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"758\" aria-labelledby=\"758\"><\/div>\n<\/div>\n<\/div>\n<div class=\"og l hi\">\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"759\" aria-labelledby=\"759\">\n<div class=\"cj cf\" aria-hidden=\"false\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"cj\" role=\"tooltip\" aria-hidden=\"false\" aria-describedby=\"760\" aria-labelledby=\"760\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"creatorActionOverflowMenu\" aria-labelledby=\"creatorActionOverflowMenu\">\n<div class=\"cj\" aria-hidden=\"false\" aria-describedby=\"collectionSubmissionPopover\" aria-labelledby=\"collectionSubmissionPopover\">\n<div class=\"sm l hi\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/footer>\n<\/div>\n<div class=\"o dz\">\n<div class=\"eo cf fa fb fc fd fe ff fg fh fi\">\n<div class=\"ql qk l\">\n<div class=\"sv sw sx sy oh sz th\">\n<div class=\"tb l\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The cost, while enormous from a financial standpoint, goes beyond monetary issues \u2014 infrastructure, societal stability, national security and mental health, both group and individual, are also at risk.<\/p>\n","protected":false},"author":1,"featured_media":13365,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[556,531],"tags":[951,530,564,773,900,652,560,709,537],"class_list":["post-13364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-most-recent-blogs","category-leadership","tag-ai","tag-business","tag-business-agility","tag-digital-transformation","tag-growth-hacking","tag-leadership","tag-management","tag-strategy","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Dangers of Outdated or Inadequate Cyber Security - Faisal Hoque<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dangers of Outdated or Inadequate Cyber Security - Faisal Hoque\" \/>\n<meta property=\"og:description\" content=\"The cost, while enormous from a financial standpoint, goes beyond monetary issues \u2014 infrastructure, societal stability, national security and mental health, both group and individual, are also at risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Faisal Hoque\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-17T16:21:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"610\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Faisal Hoque\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Faisal Hoque\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/\"},\"author\":{\"name\":\"Faisal Hoque\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae\"},\"headline\":\"The Dangers of Outdated or Inadequate Cyber Security\",\"datePublished\":\"2022-04-17T16:21:49+00:00\",\"dateModified\":\"2022-04-17T16:21:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg\",\"keywords\":[\"AI\",\"Business\",\"Business Agility\",\"Digital Transformation\",\"Growth Hacking\",\"Leadership &amp; Management\",\"Management\",\"Strategy\",\"Technology\"],\"articleSection\":[\"Blogs I Articles\",\"Leadership | Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/\",\"name\":\"The Dangers of Outdated or Inadequate Cyber Security - Faisal Hoque\",\"isPartOf\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg\",\"datePublished\":\"2022-04-17T16:21:49+00:00\",\"dateModified\":\"2022-04-17T16:21:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg\",\"contentUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg\",\"width\":610,\"height\":350,\"caption\":\"Internet crime concept. Hacker working on a code on dark digital background with digital interface around.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.frameroinfotech.com\/fh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dangers of Outdated or Inadequate Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#website\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/\",\"name\":\"Faisal Hoque\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.frameroinfotech.com\/fh\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#organization\",\"name\":\"Faisal Hoque\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png\",\"contentUrl\":\"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png\",\"width\":246,\"height\":54,\"caption\":\"Faisal Hoque\"},\"image\":{\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae\",\"name\":\"Faisal Hoque\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g\",\"caption\":\"Faisal Hoque\"},\"sameAs\":[\"https:\/\/staging.frameroinfotech.com\/fh\"],\"url\":\"https:\/\/staging.frameroinfotech.com\/fh\/author\/faisal-hoque\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dangers of Outdated or Inadequate Cyber Security - Faisal Hoque","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Dangers of Outdated or Inadequate Cyber Security - Faisal Hoque","og_description":"The cost, while enormous from a financial standpoint, goes beyond monetary issues \u2014 infrastructure, societal stability, national security and mental health, both group and individual, are also at risk.","og_url":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/","og_site_name":"Faisal Hoque","article_published_time":"2022-04-17T16:21:49+00:00","og_image":[{"width":610,"height":350,"url":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg","type":"image\/jpeg"}],"author":"Faisal Hoque","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Faisal Hoque","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#article","isPartOf":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/"},"author":{"name":"Faisal Hoque","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae"},"headline":"The Dangers of Outdated or Inadequate Cyber Security","datePublished":"2022-04-17T16:21:49+00:00","dateModified":"2022-04-17T16:21:49+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/"},"wordCount":783,"publisher":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#organization"},"image":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg","keywords":["AI","Business","Business Agility","Digital Transformation","Growth Hacking","Leadership &amp; Management","Management","Strategy","Technology"],"articleSection":["Blogs I Articles","Leadership | Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/","url":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/","name":"The Dangers of Outdated or Inadequate Cyber Security - Faisal Hoque","isPartOf":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg","datePublished":"2022-04-17T16:21:49+00:00","dateModified":"2022-04-17T16:21:49+00:00","breadcrumb":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#primaryimage","url":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg","contentUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2022\/04\/shutterstock_578912143.jpg","width":610,"height":350,"caption":"Internet crime concept. Hacker working on a code on dark digital background with digital interface around."},{"@type":"BreadcrumbList","@id":"https:\/\/staging.frameroinfotech.com\/fh\/the-dangers-of-outdated-or-inadequate-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.frameroinfotech.com\/fh\/"},{"@type":"ListItem","position":2,"name":"The Dangers of Outdated or Inadequate Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#website","url":"https:\/\/staging.frameroinfotech.com\/fh\/","name":"Faisal Hoque","description":"","publisher":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.frameroinfotech.com\/fh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#organization","name":"Faisal Hoque","url":"https:\/\/staging.frameroinfotech.com\/fh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/","url":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png","contentUrl":"https:\/\/staging.frameroinfotech.com\/fh\/wp-content\/uploads\/2024\/09\/header_logo.png","width":246,"height":54,"caption":"Faisal Hoque"},"image":{"@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/c5dc3c9d27147a81ac2d242f7e0cccae","name":"Faisal Hoque","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.frameroinfotech.com\/fh\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c76e94a5e41cdf353d16911071eb8cef57feea832ed6ccc8e2c43039ee7071f6?s=96&d=mm&r=g","caption":"Faisal Hoque"},"sameAs":["https:\/\/staging.frameroinfotech.com\/fh"],"url":"https:\/\/staging.frameroinfotech.com\/fh\/author\/faisal-hoque\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/posts\/13364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/comments?post=13364"}],"version-history":[{"count":0,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/posts\/13364\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/media\/13365"}],"wp:attachment":[{"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/media?parent=13364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/categories?post=13364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.frameroinfotech.com\/fh\/wp-json\/wp\/v2\/tags?post=13364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}