{"id":3635,"date":"2018-06-19T16:00:05","date_gmt":"2018-06-19T16:00:05","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=83710"},"modified":"2018-06-19T16:00:05","modified_gmt":"2018-06-19T16:00:05","slug":"driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/","title":{"rendered":"Driving data security is a shared responsibility, here\u2019s how you can protect yourself"},"content":{"rendered":"<p>You\u2019re driving a long, dark road on a rainy night. If you\u2019re driving 20 miles over the speed limit and you don\u2019t step on the brakes when the car in front of you comes to a sudden stop, is it your fault or your car manufacturer\u2019s fault if you rear-end the car that is in front of you?<\/p>\n<p>When we drive, we seamlessly understand that there are some things we depend on the manufacturer to provide (brakes that work, airbags that deploy) and some things we\u2019re responsible for (using the brakes when needed, not turning off the airbag protection).<\/p>\n<p>This is the concept of shared responsibility and was a core topic at this year\u2019s <a href=\"https:\/\/www.law.georgetown.edu\/continuing-legal-education\/programs\/cle\/cybersecurity\/\">Cybersecurity Law Institute<\/a> panel \u2013 <em>\u201cVendors and Cloud-Based Solutions: How Can All Stakeholders Protect Themselves?\u201d<\/em><\/p>\n<p>When it comes to cloud computing and data protection, it is a shared responsibility between the cloud service provider (CSP) and the customer that is analogous to the relationship between the car owner and car manufacturer.<\/p>\n<p>While the fundamentals of shared responsibility between drivers and car manufacturers seem relatively straightforward, it\u2019s not always as clear-cut when analyzing the responsibilities between customers and CSPs for protecting cloud data.<\/p>\n<p>The cloud, as a relatively new architectural model for many organizations, is unique because there are multiple organic models that can shift responsibilities between customers and CSPs. For example, customers can only configure the application layer software in Software as a Service (SaaS) applications. But when moving down the stack to Infrastructure as a Service (IaaS), customers have the responsibility for configuring and managing the servers they\u2019ve stood up in the cloud.<\/p>\n<p>While on the <a href=\"https:\/\/www.kroll.com\/en-us\/intelligence-center\/events\/6th-annual-cyber-security-law-institute-panel\">Georgetown Law Institute<\/a> panel in D.C., I explained how Microsoft views the shared responsibility model as a working partnership with customers to ensure they are clear on what we provide and what their responsibilities are across the stack. To be sure, there are some perceptible shifts in responsibility, which is illustrated in the graphic below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-83713 aligncenter\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/06\/perceptible-shifts-in-responsibility-graphic.png\" alt=\"\" width=\"750\" height=\"822\"\/><\/p>\n<p>The left-most column shows seven responsibilities that customers should consider when using different cloud service models. The model shows how customers are responsible for ensuring that data and its classification is done correctly and that the solution is compliant with regulatory obligations. Physical security falls to the CSP, and the rest of the responsibilities are shared. Note this a general rule of thumb, and every customer should talk to its CSP to ensure and understand the responsibilities are outlined and meet the organizational needs.<\/p>\n<p>Once a customer has a solid handle on what the CSP is providing, consider the three tips below for managing the shared responsibilities. These could include things like network controls, host infrastructure, end-point protection, application level controls, and access management.<\/p>\n<h2>Consult the STARs<\/h2>\n<p><a href=\"https:\/\/cloudsecurityalliance.org\/star\/#_overview\">The CSA STAR<\/a> registry consists of three levels of assurance, which cover four unique offerings based on a comprehensive list of cloud control objectives. Here customers can see what controls a provider has attested to. STAR also helps customers assess how different providers are using a harmonized model. It\u2019s also important to ask the CSP if it has completed a <a href=\"https:\/\/cloudsecurityalliance.org\/star\/attestation\/#_overview\">SOC 2 Type 2<\/a>. This assessment is based on a mature attest standard, and ensure that evaluation takes place over time rather than at a point in time, among other helpful standards.<\/p>\n<h2>(Really!) Read the contracts<\/h2>\n<p>Yes, it\u2019s tempting to skip over the long legalese, but the nuances of a contract between a customer and CSP can go a long way in helping each side understand its shared responsibilities. For example, if the contract allows for certain levels of transparency between the two in the form of allowing the customer to see an audit or compliance report. However, you should remember that seeing an overview isn\u2019t the same as being able to read every page of the report. A customer should know what level of transparency they\u2019re getting. Customers should be certain there are clear roles and escalation paths that make sense, so if something goes wrong or a decision needs to be made about shutting off a service or reporting a breach, it can be done without hesitation. And don\u2019t forget to engage your own counsel during contact review, no one understands legalese as well as a lawyer.<\/p>\n<h2>Follow the guides<\/h2>\n<p>To help organizations understand ways to protect their data in the cloud, Microsoft has blueprint guides for use cases like <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/blueprints\/financial-services-regulated-workloads\">FFIEC<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/blueprints\/azure-health\">HIPAA<\/a> regulations. We also have tools to help companies manage and improve their cloud controls, including Compliance manager and Secure score. Compliance manager enables organizations to manage their compliance activities from one place. Secure score is an assessment tool designed to make it easier for organizations to understand their security position in relation to other organizations while also providing advice on what controls they should consider enabling.<\/p>\n<p>Microsoft takes its side of the shared responsibility model seriously and is continually looking for ways to help the customer identify weaknesses and put action plans in place to shore them up. Not unlike how car manufacturers continually iterate to make cars safer, safety enhancements are meant to lessen the burden of driver responsibilities, not remove them entirely. When it comes to protecting data, if you keep your eyes on your data road, we\u2019ll make sure the brakes are working.<\/p>\n<p>For more information on shared responsibilities for cloud computing <a href=\"https:\/\/gallery.technet.microsoft.com\/Shared-Responsibilities-81d0ff91\">read this comprehensive white paper<\/a>.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/06\/19\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;re driving a long, dark road on a rainy night. If you&#8217;re driving 20 miles over the speed limit and you don&#8217;t step on the brakes when the car in front of you comes to a sudden stop, is it your fault or your car manufacturers fault if you rear-end the car that is in Read more READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[254],"class_list":["post-3635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Driving data security is a shared responsibility, here\u2019s how you can protect yourself 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Driving data security is a shared responsibility, here\u2019s how you can protect yourself 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-19T16:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"822\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Driving data security is a shared responsibility, here\u2019s how you can protect yourself\",\"datePublished\":\"2018-06-19T16:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/\"},\"wordCount\":916,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/\",\"name\":\"Driving data security is a shared responsibility, here\u2019s how you can protect yourself 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png\",\"datePublished\":\"2018-06-19T16:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png\",\"width\":750,\"height\":822},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uncategorized\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/uncategorized\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Driving data security is a shared responsibility, here\u2019s how you can protect yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Driving data security is a shared responsibility, here\u2019s how you can protect yourself 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"Driving data security is a shared responsibility, here\u2019s how you can protect yourself 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-19T16:00:05+00:00","og_image":[{"width":750,"height":822,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Driving data security is a shared responsibility, here\u2019s how you can protect yourself","datePublished":"2018-06-19T16:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/"},"wordCount":916,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/","url":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/","name":"Driving data security is a shared responsibility, here\u2019s how you can protect yourself 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png","datePublished":"2018-06-19T16:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself.png","width":750,"height":822},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/driving-data-security-is-a-shared-responsibility-heres-how-you-can-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/www.threatshub.org\/blog\/tag\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"Driving data security is a shared responsibility, here\u2019s how you can protect yourself"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3635"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3636"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}