{"id":31,"date":"2018-06-18T10:39:54","date_gmt":"2018-06-18T10:39:54","guid":{"rendered":"http:\/\/kngpartnership.co.uk\/?page_id=31"},"modified":"2018-06-19T13:10:24","modified_gmt":"2018-06-19T13:10:24","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div id=\"pl-31\"  class=\"panel-layout\" ><div id=\"pg-31-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-31-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-31-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4>The popular thought is that cyber security threats, such as malware attacks, hacking, denial-of-service attacks and ransomware, are much more frequent than insider attacks. The unpopular reality is that workforce complacency is the single most frequent root cause of all of the challenges faced in today's cyber security world.<\/h4>\n<\/div>\n<\/div><\/div><div id=\"panel-31-0-0-1\" class=\"so-panel widget widget_sow-image\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-8b5b6f678277-31\"\n\t\t\t\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tdata-src=\"https:\/\/kngpartnership.co.uk\/wp-content\/uploads\/2018\/06\/Young-Users-960x480.jpg\" width=\"960\" height=\"480\" data-sizes=\"(max-width: 960px) 100vw, 960px\" alt=\"\" \t\tclass=\"so-widget-image lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 960px; --smush-placeholder-aspect-ratio: 960\/480;\" \/>\n\t<\/div>\n\n<\/div><\/div><div id=\"panel-31-0-0-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4>Your employees are your greatest asset. They can also inadvertently be the primary cause of corporate data breaches and leaks. The vast majority of these leaks are not malicious but are purely down to complacency or a lack of understanding.\u00a0\u00a0<span class=\"wysiwyg-font-size-large\">No Company can afford any one of the following :-<\/span><\/h4>\n<ul>\n<li>\n<h4><span class=\"wysiwyg-font-size-large\">Loss of customer or staff information<\/span><\/h4>\n<\/li>\n<li>\n<h4><span class=\"wysiwyg-font-size-large\">Loss of reputation<\/span><\/h4>\n<\/li>\n<li>\n<h4><span class=\"wysiwyg-font-size-large\">Loss of financial information<\/span><\/h4>\n<\/li>\n<li>\n<h4><span class=\"wysiwyg-font-size-large\">Loss of intellectual property<\/span><\/h4>\n<\/li>\n<li>\n<h4><span class=\"wysiwyg-font-size-large\">Loss of marketing advantage<\/span><\/h4>\n<\/li>\n<\/ul>\n<h4><strong>KNG Partnership - a Micro Focus Premier Partner,\u00a0<\/strong>can help you control access to directories, systems and data - from the inside - 24\/7 - at the right price.\u00a0 We\u00a0<span class=\"wysiwyg-font-size-large\">have over 40 years experience at Senior Management \/ CIO \/ ITD level and specialise in providing consulting delivery services guiding our customers from the feasibility, design and planning stage through to solution delivery and project sign-off.<\/span><\/h4>\n<h4><strong>Micro Focus\u00a0IAM Services<\/strong> deliver a complete, yet affordable solution to control who has access to what across\u00a0<span class=\"wysiwyg-font-size-large\">your enterprise\u2014both inside the firewall and into the cloud.\u00a0 It enables you to provide\u00a0<\/span><a href=\"https:\/\/www.netiq.com\/solutions\/identity-access-management\/secure-access.html\"><span class=\"wysiwyg-font-size-large\">secure and convenient access<\/span><\/a><span class=\"wysiwyg-font-size-large\">\u00a0to critical information for business users, while meeting compliance demands.<\/span><\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The popular thought is that cyber security threats, such as malware attacks, hacking, denial-of-service attacks and ransomware, are much more frequent than insider attacks. The unpopular reality is that workforce complacency is the single most frequent root cause of all of the challenges faced in today&#8217;s cyber security world. Your employees are your greatest asset. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31","page","type-page","status-publish","hentry","post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security -\" \/>\n<meta property=\"og:description\" content=\"The popular thought is that cyber security threats, such as malware attacks, hacking, denial-of-service attacks and ransomware, are much more frequent than insider attacks. The unpopular reality is that workforce complacency is the single most frequent root cause of all of the challenges faced in today&#039;s cyber security world. Your employees are your greatest asset. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-19T13:10:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kngpartnership.co.uk\\\/index.php\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/kngpartnership.co.uk\\\/index.php\\\/cyber-security\\\/\",\"name\":\"Cyber Security -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kngpartnership.co.uk\\\/#website\"},\"datePublished\":\"2018-06-18T10:39:54+00:00\",\"dateModified\":\"2018-06-19T13:10:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kngpartnership.co.uk\\\/index.php\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kngpartnership.co.uk\\\/index.php\\\/cyber-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kngpartnership.co.uk\\\/index.php\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kngpartnership.co.uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kngpartnership.co.uk\\\/#website\",\"url\":\"https:\\\/\\\/kngpartnership.co.uk\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kngpartnership.co.uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security -","og_description":"The popular thought is that cyber security threats, such as malware attacks, hacking, denial-of-service attacks and ransomware, are much more frequent than insider attacks. The unpopular reality is that workforce complacency is the single most frequent root cause of all of the challenges faced in today's cyber security world. Your employees are your greatest asset. [&hellip;]","og_url":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/","article_modified_time":"2018-06-19T13:10:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/","url":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/","name":"Cyber Security -","isPartOf":{"@id":"https:\/\/kngpartnership.co.uk\/#website"},"datePublished":"2018-06-18T10:39:54+00:00","dateModified":"2018-06-19T13:10:24+00:00","breadcrumb":{"@id":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kngpartnership.co.uk\/index.php\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kngpartnership.co.uk\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/kngpartnership.co.uk\/#website","url":"https:\/\/kngpartnership.co.uk\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kngpartnership.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":59,"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":1147,"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/31\/revisions\/1147"}],"wp:attachment":[{"href":"https:\/\/kngpartnership.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}