{"id":1132,"date":"2016-11-26T18:41:43","date_gmt":"2016-11-27T02:41:43","guid":{"rendered":"http:\/\/eridirect.com\/?page_id=1132"},"modified":"2024-08-13T22:59:47","modified_gmt":"2024-08-14T05:59:47","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/eridirect.com\/cyber-security\/","title":{"rendered":"Cybersecurity Knowledge Center"},"content":{"rendered":"<div class=\"definition\">\r\n    <p>\r\n        Responsible Cybersecurity practices include the process of helping our clients to mitigate their;\r\n    <\/p>\r\n    \r\n    <ol>\r\n        <li>\r\n            Operational risks\r\n        <\/li>\r\n        <li>\r\n            Litigation risks\r\n        <\/li>\r\n        <li>\r\n            Reputational risks\r\n        <\/li>\r\n    <\/ol>\r\n\t\r\n\t<p>\r\n\t\tWith regards to data breaches that can occur to any entity on this planet due to poor software or hardware management practices.\r\n\t<\/p>\r\n\t\r\n\t<p>\r\n\t\tERI can help your organization;\r\n\t<\/p>\r\n\t\r\n\t<ol>\r\n\t\t<li>Develop and implement a Cybersecurity Framework<\/li>\r\n\t\t<li>Manage your risks and vulnerabilities. And we will protect all the data in your electronic hardware.<\/li>\r\n\t\t<li>Employ threat model and detection.<\/li>\r\n\t\t<li>Establish supply chain controls for all your hardware and electronics.<\/li>\r\n\t\t<li>Help develop, implement and test an Incident Response Plan.<\/li>\r\n\t<\/ol>\r\n<\/div>\r\n\r\n<h2>Learn More With Our &#8220;Rise Of Cybercrime&#8221; Infographic<\/h2>\r\n\r\n<p>\r\n    <a href=\"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png\" class=\"fancybox\">\r\n    \t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png\" alt=\"\" width=\"1650\" height=\"1275\" class=\"img-fluid\" \/>\r\n    <\/a>\r\n<\/p>\r\n\r\n<h2>Important Resources<\/h2>\r\n\r\n<ul class=\"important-resources\">\r\n    <li>\r\n\t\t<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__website\">\r\n\t\t\t\t<svg class=\"icon--website\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M20,2H4v20h16V2z M9,19H7v-2h2V19z M9,15H7v-2h2V15z M9,11H7V9h2V11z M17,19h-6v-2h6V19z M17,15h-6v-2h6V15z M17,11h-6V9h6 V11z M17,7H7V5h10V7z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tVerizon Data Breach Investigations Report (DBIR)\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tVerizon\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tAn annual publication that provides analysis of information security incidents, with a specific focus on data breaches.\r\n\t\t<\/p>\r\n\t<\/li>\r\n\t\r\n\t<li>\r\n\t\t<a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/ciso-workshop\/ciso-workshop\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__website\">\r\n\t\t\t\t<svg class=\"icon--website\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M20,2H4v20h16V2z M9,19H7v-2h2V19z M9,15H7v-2h2V15z M9,11H7V9h2V11z M17,19h-6v-2h6V19z M17,15h-6v-2h6V15z M17,11h-6V9h6 V11z M17,7H7V5h10V7z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tChief Information Security Officer (CISO) Workshop Training\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tMicrosoft\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tFree training provided by Microsoft that includes a collection of security learnings, principles, and recommendations for modernizing security in your organization.\r\n\t\t<\/p>\r\n\t<\/li>\r\n\t\r\n\t<li>\r\n\t\t<a href=\"https:\/\/www.hacker101.com\/\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__website\">\r\n\t\t\t\t<svg class=\"icon--website\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M20,2H4v20h16V2z M9,19H7v-2h2V19z M9,15H7v-2h2V15z M9,11H7V9h2V11z M17,19h-6v-2h6V19z M17,15h-6v-2h6V15z M17,11h-6V9h6 V11z M17,7H7V5h10V7z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tHacker101\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tHackerOne\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tHacker101 is a free class for web security. Whether you&#8217;re a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.\r\n\t\t<\/p>\r\n\t<\/li>\r\n\t\r\n\t<li>\r\n\t\t<a target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__website\">\r\n\t\t\t\t<svg class=\"icon--website\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M20,2H4v20h16V2z M9,19H7v-2h2V19z M9,15H7v-2h2V15z M9,11H7V9h2V11z M17,19h-6v-2h6V19z M17,15h-6v-2h6V15z M17,11h-6V9h6 V11z M17,7H7V5h10V7z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tData Breaches\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tComplianceBoard\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tA community project where you can find information about data breaches, regulators and fines.\r\n\t\t<\/p>\r\n\t<\/li>\r\n\t\r\n\t<li>\r\n\t\t<a href=\"https:\/\/www.youtube.com\/watch?v=sdpxddDzXfE\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__video\">\r\n\t\t\t\t<svg class=\"icon--video\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M22,3H2v18h20V3z M9,16V8l7,4L9,16z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n            Cyber Security 101\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tPBS NOVA Labs\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tThe Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA\u2019s Cyber Security Lab.\r\n\t\t<\/p>\r\n\t<\/li>\r\n    \r\n    <li>\r\n\t\t<a href=\"https:\/\/www2.deloitte.com\/tl\/en\/pages\/risk\/articles\/cyber-security-evolved.html\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__video\">\r\n\t\t\t\t<svg class=\"icon--video\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M22,3H2v18h20V3z M9,16V8l7,4L9,16z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tCyber Security. Evolved.\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tDeloitte.\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tIn less than 300 seconds, experience the speed and intensity of a cyber attack. As the plot unfolds, learn how companies can defend themselves, take control of the situation, and effectively fight back.\r\n\t\t<\/p>\r\n\t<\/li>\r\n    \r\n    <li>\r\n\t\t<a href=\"https:\/\/www.dhs.gov\/topic\/cybersecurity\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__website\">\r\n\t\t\t\t<svg class=\"icon--website\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M20,2H4v20h16V2z M9,19H7v-2h2V19z M9,15H7v-2h2V15z M9,11H7V9h2V11z M17,19h-6v-2h6V19z M17,15h-6v-2h6V15z M17,11h-6V9h6 V11z M17,7H7V5h10V7z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tCyber Security Overview\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tHomeland Security\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tStrengthening the security and resilience of cyberspace has become an important homeland security mission.\r\n\t\t<\/p>\r\n\t<\/li>\r\n    \r\n    <li>\r\n\t\t<a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2016\/02\/09\/fact-sheet-cybersecurity-national-action-plan\" target=\"_blank\" class=\"resource-link\" rel=\"noopener noreferrer\">\r\n            <span class=\"resource-type__website\">\r\n\t\t\t\t<svg class=\"icon--website\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"><path d=\"M20,2H4v20h16V2z M9,19H7v-2h2V19z M9,15H7v-2h2V15z M9,11H7V9h2V11z M17,19h-6v-2h6V19z M17,15h-6v-2h6V15z M17,11h-6V9h6 V11z M17,7H7V5h10V7z\"><\/path><\/svg>\r\n\t\t\t<\/span>\r\n\t\t\tFACT SHEET: Cybersecurity National Action Plan\r\n        <\/a>\r\n\t\t<p class=\"resource-source\">\r\n\t\t\tThe White House\r\n\t\t<\/p>\r\n\t\t<p class=\"resource-description\">\r\n\t\t\tCybersecurity Act of 2015: important tools necessary to strengthen the Nation\u2019s cybersecurity, making it easier for private companies to share cyber threat information with each other and the Government.\r\n\t\t<\/p>\r\n\t<\/li>\r\n<\/ul>\r\n\r\n<script type=\"text\/javascript\">\r\n\tjQuery(document).ready(function($) {\r\n\t\t$(\".fancybox\").fancybox();\r\n\t});\r\n<\/script>","protected":false},"excerpt":{"rendered":"<p>Responsible Cybersecurity practices include the process of helping our clients to mitigate their; Operational risks Litigation risks Reputational risks With regards to data breaches that can occur to any entity on this planet due to poor software or hardware management practices. ERI can help your organization; Develop and implement a Cybersecurity Framework Manage your risks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-cyber-security.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1132","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Knowledge Center - ERI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eridirect.com\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Knowledge Center - ERI\" \/>\n<meta property=\"og:description\" content=\"Responsible Cybersecurity practices include the process of helping our clients to mitigate their; Operational risks Litigation risks Reputational risks With regards to data breaches that can occur to any entity on this planet due to poor software or hardware management practices. ERI can help your organization; Develop and implement a Cybersecurity Framework Manage your risks [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eridirect.com\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ERI\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T05:59:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eridirect.com\/cyber-security\/\",\"url\":\"https:\/\/eridirect.com\/cyber-security\/\",\"name\":\"Cybersecurity Knowledge Center - ERI\",\"isPartOf\":{\"@id\":\"https:\/\/eridirect.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eridirect.com\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eridirect.com\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png\",\"datePublished\":\"2016-11-27T02:41:43+00:00\",\"dateModified\":\"2024-08-14T05:59:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/eridirect.com\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eridirect.com\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eridirect.com\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png\",\"contentUrl\":\"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eridirect.com\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eridirect.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Knowledge Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eridirect.com\/#website\",\"url\":\"https:\/\/eridirect.com\/\",\"name\":\"ERI\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eridirect.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Knowledge Center - ERI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eridirect.com\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Knowledge Center - ERI","og_description":"Responsible Cybersecurity practices include the process of helping our clients to mitigate their; Operational risks Litigation risks Reputational risks With regards to data breaches that can occur to any entity on this planet due to poor software or hardware management practices. ERI can help your organization; Develop and implement a Cybersecurity Framework Manage your risks [&hellip;]","og_url":"https:\/\/eridirect.com\/cyber-security\/","og_site_name":"ERI","article_modified_time":"2024-08-14T05:59:47+00:00","og_image":[{"url":"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eridirect.com\/cyber-security\/","url":"https:\/\/eridirect.com\/cyber-security\/","name":"Cybersecurity Knowledge Center - ERI","isPartOf":{"@id":"https:\/\/eridirect.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eridirect.com\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/eridirect.com\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png","datePublished":"2016-11-27T02:41:43+00:00","dateModified":"2024-08-14T05:59:47+00:00","breadcrumb":{"@id":"https:\/\/eridirect.com\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eridirect.com\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eridirect.com\/cyber-security\/#primaryimage","url":"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png","contentUrl":"https:\/\/eridirect.com\/wp-content\/uploads\/2020\/07\/The-Rise-of-Cybercrime-v07.28.2020.png"},{"@type":"BreadcrumbList","@id":"https:\/\/eridirect.com\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eridirect.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Knowledge Center"}]},{"@type":"WebSite","@id":"https:\/\/eridirect.com\/#website","url":"https:\/\/eridirect.com\/","name":"ERI","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eridirect.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/pages\/1132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/comments?post=1132"}],"version-history":[{"count":2,"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/pages\/1132\/revisions"}],"predecessor-version":[{"id":7396,"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/pages\/1132\/revisions\/7396"}],"wp:attachment":[{"href":"https:\/\/eridirect.com\/wp-json\/wp\/v2\/media?parent=1132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}