{"id":16082,"date":"2018-10-17T13:05:17","date_gmt":"2018-10-17T13:05:17","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542152"},"modified":"2018-10-17T13:05:17","modified_gmt":"2018-10-17T13:05:17","slug":"its-everyones-job-to-ensure-online-safety-at-work","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/","title":{"rendered":"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work"},"content":{"rendered":"<div class=\"post-text\" readability=\"62.07874015748\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-300x251.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-300x251.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-768x644.png 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-640x537.png 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-900x754.png 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-440x369.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1-380x319.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/educate-all-employees-v1.png 940w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.\u00a0 Let\u2019s discuss some of the areas where we see existing organizations employees may be lacking in their efforts:<\/p>\n<p><strong>1. Email Security<\/strong> \u2013 Email is by far the biggest threat to organizations and their employees still today. Cybercriminals are inherently lazy and don\u2019t want to have to exert a lot of effort in creating attacks. Also, email is still the predominate communication tool used by businesses. That is why we continue to see email being abused and used by threat actors. One of the challenges is the authenticity of socially engineered emails today makes it difficult for employees to identify them as malicious. A few things that they can do:<\/p>\n<table>\n<tbody readability=\"4.5\">\n<tr readability=\"9\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>Check the domain the email is coming from. Many times these are spoofed domains to look similar to the legitimate one. So look closely at the from address.<\/li>\n<li>If there are any embedded URLs, hover the mouse over them to see if the URL matches what is used within the email message. For example, the company domain sending the email message may not be the same domain used in the URL.<\/li>\n<li>Check the message itself, if it is urgently trying to get you to open the attachment or click on the URL, it may be suspicious<\/li>\n<li>Save any attachments and scan them versus simply opening them from within the email message<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>2. Web Security<\/strong> \u2013 The web is the next way many employees and organizations get compromised. Many threat actors will use popular websites or advertisements within webpages to infect users. Phishing webpages are very popular right now as cybercriminals look to steal user login credentials for popular applications. A few things users can do:<\/p>\n<table>\n<tbody readability=\"3\">\n<tr readability=\"6\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li>If you receive a pop-up login page you weren\u2019t expecting, be wary of it and don\u2019t log in. Use a bookmarked page you\u2019ve saved instead.<\/li>\n<li>Be wary of advertisements as many threat actors use malvertisements to infect users.<\/li>\n<li>Make sure your system or organization has web filtering in place to block access to malicious sites and pages.<\/li>\n<li>Use bookmarked sites as much as possible or type in the URL versus clicking on a link within an email or text message.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>3. Training Employees<\/strong> \u2013 Many organizations are seeing improved security when they make an investment in training their employees around cybersecurity. This needs to be continuous training both new employees and long term employees since the threat landscape changes quite frequently. This can be done with regular video training on how threats work or using a phishing simulation program that regularly tests employees clicking on phishing emails crafted by the organization. Another thing organizations can do is create a standard email address where employees can submit suspicious emails to IT. The only thing with this, the organization needs to ensure a fast response to the users to show them that they will be alerted if one is in fact malicious.<\/p>\n<p>All employees need to remember that they could at any time be the subject of an attack. Many employees may think they won\u2019t be targeted, but threat actors are persistent and if they cannot get an employee to take their bait, they will try others until one happens to fall for their socially engineered attack. Organizations, especially small businesses need to remember this too, they will be targeted at some point.<\/p>\n<p>Threat actors and cybercriminals continue to target organizations and their employees around the world and this means everyone within an organization needs to be rigorous in examining their online actions to ensure they try to stay safe. But Trend Micro also knows that we need to do more and so we continue to invest in newer technologies to protect our customers against the threats targeting them as we look to make the world safe for exchanging digital information.<\/p>\n<\/p><\/div>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/its-everyones-job-to-ensure-online-safety-at-work\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of our effort to support National Cyber Security Awareness Month I wanted to provide information on the need for everyone within a business to be aware of their role in keeping the organization safe from cyber attacks.\u00a0 Let\u2019s discuss some of the areas where we see existing organizations employees may be lacking in&#8230;<br \/>\nThe post It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16083,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[328,375,390,4032,1658,3947,1801,307],"class_list":["post-16082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-bec","tag-business","tag-consumer","tag-cyberaware","tag-internet-safety","tag-ncsam","tag-online-safety","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-17T13:05:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/its-everyones-job-to-ensure-online-safety-at-work.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"251\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work\",\"datePublished\":\"2018-10-17T13:05:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/\"},\"wordCount\":676,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/its-everyones-job-to-ensure-online-safety-at-work.png\",\"keywords\":[\"BEC\",\"Business\",\"Consumer\",\"CyberAware\",\"Internet Safety\",\"ncsam\",\"online safety\",\"Security\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/\",\"name\":\"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/its-everyones-job-to-ensure-online-safety-at-work.png\",\"datePublished\":\"2018-10-17T13:05:17+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/its-everyones-job-to-ensure-online-safety-at-work.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/its-everyones-job-to-ensure-online-safety-at-work.png\",\"width\":300,\"height\":251},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/its-everyones-job-to-ensure-online-safety-at-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BEC\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/bec\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/","og_locale":"en_US","og_type":"article","og_title":"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-17T13:05:17+00:00","og_image":[{"width":300,"height":251,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/its-everyones-job-to-ensure-online-safety-at-work.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work","datePublished":"2018-10-17T13:05:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/"},"wordCount":676,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/its-everyones-job-to-ensure-online-safety-at-work.png","keywords":["BEC","Business","Consumer","CyberAware","Internet Safety","ncsam","online safety","Security"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/","url":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/","name":"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/its-everyones-job-to-ensure-online-safety-at-work.png","datePublished":"2018-10-17T13:05:17+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/its-everyones-job-to-ensure-online-safety-at-work.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/its-everyones-job-to-ensure-online-safety-at-work.png","width":300,"height":251},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/its-everyones-job-to-ensure-online-safety-at-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"BEC","item":"https:\/\/www.threatshub.org\/blog\/tag\/bec\/"},{"@type":"ListItem","position":3,"name":"It\u2019s Everyone\u2019s Job to Ensure Online Safety at Work"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16082"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16082\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16083"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}