{"id":4993,"date":"2017-12-14T16:43:43","date_gmt":"2017-12-14T16:43:43","guid":{"rendered":"https:\/\/www.silkstream.net\/blog\/?p=4993"},"modified":"2018-11-16T10:58:33","modified_gmt":"2018-11-16T10:58:33","slug":"cyber-security-making-headlines","status":"publish","type":"post","link":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html","title":{"rendered":"Cyber Security is Making Headlines"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5006\" src=\"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg\" alt=\"Cyber Security Headlines\" width=\"1278\" height=\"419\" srcset=\"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg 1278w, https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines-600x197.jpg 600w, https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines-768x252.jpg 768w, https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines-800x262.jpg 800w\" sizes=\"auto, (max-width: 1278px) 100vw, 1278px\" \/><\/p>\n<p>Over the last 12 months I\u2019ve noticed a significant increase in news headlines containing the word \u2018Cyber\u2019, in one form or another. It\u2019s possible I\u2019m experiencing the <a href=\"https:\/\/science.howstuffworks.com\/life\/inside-the-mind\/human-brain\/baader-meinhof-phenomenon.htm\">Baader-Meinhof phenomenon<\/a> &#8211; when someone repeatedly notices a newly learned word or phrase shortly after learning it &#8211; because I\u2019m currently studying for a cyber security certification. Although I\u2019m convinced this isn\u2019t the case; I\u2019ve been aware of marketing terms such as \u2018Cyber Monday\u2019, Cyber-space and its other forms for many years. I\u2019m specifically talking about the darker, more nefarious headlines which include a suffix to the word <strong>cyber<\/strong> such as: crime, attack and theft.<\/p>\n<p>So much so, I\u2019ve decided to create a \u2018Cyber Security\u2019 category within our blog, wherein we can update you with business relevant news and articles related to this emerging and, I think, fascinating subject.<\/p>\n<p>So to kick things off, for our first article under this topic I\u2019d like to point you in the direction of a report jointly published earlier this year by the National Cyber Security Centre (NCSC) and National Crime Agency\u00a0(NCA) called <strong>The Cyber Threat to UK Business<\/strong>. Whether you run a UK business or not I would recommend taking a look &#8211; it\u2019s written in plain english so you don\u2019t have to be a techie to understand it.<\/p>\n<p class=\"p1\"><span class=\"s1\">The report contains pivotal incidents of 2016 including a destructive attack on Ukrainian power supply, a Yahoo! data breach and hacking the US Democratic Party. There\u2019s insight into predicted future<\/span><span class=\"s1\">\u00a0threats to both business and consumers via ransomware and data leaks. Importantly the report offers common sense solutions on how\u00a0<\/span><span class=\"s1\">businesses can protect themselves against future cyber threats.<span class=\"Apple-converted-space\">\u00a0As the previous year&#8217;s headlines suggest, the report reveals &#8220;the past year has been punctuated by cyber attacks on a scale and boldness not seen before&#8221;. \u00a0<\/span><\/span><\/p>\n<p>You can read the PDF report on the NCSC&#8217;s website here:\u00a0\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/content\/files\/protected_files\/news_files\/The%20Cyber%20Threat%20to%20UK%20Business%20%28b%29.pdf\">The Cyber Threat to UK Business<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nOver the last 12 months I\u2019ve noticed a significant increase in news headlines containing the word \u2018Cyber\u2019, in one form or another. It\u2019s possible <\/p>\n","protected":false},"author":4,"featured_media":5006,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[135],"tags":[],"class_list":["post-4993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security is Making Headlines - Silkstream<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security is Making Headlines - Silkstream\" \/>\n<meta property=\"og:description\" content=\"Over the last 12 months I\u2019ve noticed a significant increase in news headlines containing the word \u2018Cyber\u2019, in one form or another. It\u2019s possible\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html\" \/>\n<meta property=\"og:site_name\" content=\"Silkstream\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/silkstream\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-14T16:43:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-16T10:58:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1278\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"L\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@silkstreamnet\" \/>\n<meta name=\"twitter:site\" content=\"@silkstreamnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"L\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html\"},\"author\":{\"name\":\"L\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/#\\\/schema\\\/person\\\/961cd99887ac8546e384f70e52b0a280\"},\"headline\":\"Cyber Security is Making Headlines\",\"datePublished\":\"2017-12-14T16:43:43+00:00\",\"dateModified\":\"2018-11-16T10:58:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html\"},\"wordCount\":331,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/cyber-security-headlines.jpg\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html\",\"url\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html\",\"name\":\"Cyber Security is Making Headlines - Silkstream\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/cyber-security-headlines.jpg\",\"datePublished\":\"2017-12-14T16:43:43+00:00\",\"dateModified\":\"2018-11-16T10:58:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/#\\\/schema\\\/person\\\/961cd99887ac8546e384f70e52b0a280\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#primaryimage\",\"url\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/cyber-security-headlines.jpg\",\"contentUrl\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/cyber-security-headlines.jpg\",\"width\":1278,\"height\":419,\"caption\":\"Cyber Security Headlines\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/2017\\\/12\\\/cyber-security-making-headlines.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.silkstream.net\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security is Making Headlines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/\",\"name\":\"Silkstream\",\"description\":\"Here you&#039;ll find the latest blogs, white papers and case studies from Silkstream experts.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.silkstream.net\\\/blog\\\/#\\\/schema\\\/person\\\/961cd99887ac8546e384f70e52b0a280\",\"name\":\"L\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1551ee166974ad7d8240f44dd3ac77a057fcc3f6d27d6d083fb38f1a3be63c4c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1551ee166974ad7d8240f44dd3ac77a057fcc3f6d27d6d083fb38f1a3be63c4c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1551ee166974ad7d8240f44dd3ac77a057fcc3f6d27d6d083fb38f1a3be63c4c?s=96&d=mm&r=g\",\"caption\":\"L\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security is Making Headlines - Silkstream","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html","og_locale":"en_GB","og_type":"article","og_title":"Cyber Security is Making Headlines - Silkstream","og_description":"Over the last 12 months I\u2019ve noticed a significant increase in news headlines containing the word \u2018Cyber\u2019, in one form or another. It\u2019s possible","og_url":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html","og_site_name":"Silkstream","article_publisher":"https:\/\/www.facebook.com\/silkstream","article_published_time":"2017-12-14T16:43:43+00:00","article_modified_time":"2018-11-16T10:58:33+00:00","og_image":[{"width":1278,"height":419,"url":"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg","type":"image\/jpeg"}],"author":"L","twitter_card":"summary_large_image","twitter_creator":"@silkstreamnet","twitter_site":"@silkstreamnet","twitter_misc":{"Written by":"L","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#article","isPartOf":{"@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html"},"author":{"name":"L","@id":"https:\/\/www.silkstream.net\/blog\/#\/schema\/person\/961cd99887ac8546e384f70e52b0a280"},"headline":"Cyber Security is Making Headlines","datePublished":"2017-12-14T16:43:43+00:00","dateModified":"2018-11-16T10:58:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html"},"wordCount":331,"commentCount":0,"image":{"@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#primaryimage"},"thumbnailUrl":"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg","articleSection":["Cyber Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html","url":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html","name":"Cyber Security is Making Headlines - Silkstream","isPartOf":{"@id":"https:\/\/www.silkstream.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#primaryimage"},"image":{"@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#primaryimage"},"thumbnailUrl":"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg","datePublished":"2017-12-14T16:43:43+00:00","dateModified":"2018-11-16T10:58:33+00:00","author":{"@id":"https:\/\/www.silkstream.net\/blog\/#\/schema\/person\/961cd99887ac8546e384f70e52b0a280"},"breadcrumb":{"@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#primaryimage","url":"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg","contentUrl":"https:\/\/www.silkstream.net\/blog\/wp-content\/uploads\/2017\/12\/cyber-security-headlines.jpg","width":1278,"height":419,"caption":"Cyber Security Headlines"},{"@type":"BreadcrumbList","@id":"https:\/\/www.silkstream.net\/blog\/2017\/12\/cyber-security-making-headlines.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.silkstream.net\/blog"},{"@type":"ListItem","position":2,"name":"Cyber Security is Making Headlines"}]},{"@type":"WebSite","@id":"https:\/\/www.silkstream.net\/blog\/#website","url":"https:\/\/www.silkstream.net\/blog\/","name":"Silkstream","description":"Here you&#039;ll find the latest blogs, white papers and case studies from Silkstream experts.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.silkstream.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.silkstream.net\/blog\/#\/schema\/person\/961cd99887ac8546e384f70e52b0a280","name":"L","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/1551ee166974ad7d8240f44dd3ac77a057fcc3f6d27d6d083fb38f1a3be63c4c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1551ee166974ad7d8240f44dd3ac77a057fcc3f6d27d6d083fb38f1a3be63c4c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1551ee166974ad7d8240f44dd3ac77a057fcc3f6d27d6d083fb38f1a3be63c4c?s=96&d=mm&r=g","caption":"L"}}]}},"_links":{"self":[{"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/posts\/4993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/comments?post=4993"}],"version-history":[{"count":24,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/posts\/4993\/revisions"}],"predecessor-version":[{"id":5603,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/posts\/4993\/revisions\/5603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/media\/5006"}],"wp:attachment":[{"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/media?parent=4993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/categories?post=4993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.silkstream.net\/blog\/wp-json\/wp\/v2\/tags?post=4993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}