{"id":37923,"date":"2020-10-29T18:00:14","date_gmt":"2020-10-29T18:00:14","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92144"},"modified":"2020-10-29T18:00:14","modified_gmt":"2020-10-29T18:00:14","slug":"its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/","title":{"rendered":"It\u2019s Cybersecurity Awareness Month and there is still a lot to do"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/10\/SEC20_Security_029-scaled.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<h3>October is National Cyber Security Awareness Month (NCSAM). And there is still a lot to do!<\/h3>\n<p>For the last 17&nbsp;years, the&nbsp;<a href=\"https:\/\/www.cisa.gov\/national-cyber-security-awareness-month\" target=\"_blank\" rel=\"noopener noreferrer\">National Cybersecurity Awareness Month (NCSAM)<\/a>&nbsp;campaign, driven by the Department of Homeland Security, has raised&nbsp;awareness about the importance of cyber&nbsp;security across&nbsp;the&nbsp;Nation&nbsp;with the mission of&nbsp;ensuring&nbsp;that&nbsp;all Americans have the resources they need to be safer and more secure online.<\/p>\n<p>In alignment with this noble mission, Microsoft Security is providing educational content and executive speakers to empower our customers, employees and families. Tune into the&nbsp;<a href=\"https:\/\/www.cyberscoop.com\/events\/cybertalks2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">CyberTalks<\/a>&nbsp;recap to listen to the keynoted delivered by <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/user\/viewprofilepage\/user-id\/158219\" target=\"_blank\" rel=\"noopener noreferrer\">@Ann Johnson<\/a>, Corporate Vice President&nbsp;of Security, Compliance and Identity,&nbsp;on how to future proof your security strategy.<\/p>\n<h2>Cyber security podcasts<\/h2>\n<p>In addition to the blog&nbsp;series that is taking over our blog in October, Microsoft Security is also sponsoring two security podcasts in&nbsp;CyberScoop.com&nbsp;we want to encourage our community to tune in and listen to both conversations.<\/p>\n<ul>\n<li><strong>Available now<\/strong>:&nbsp;<a href=\"https:\/\/www.cyberscoop.com\/enabling-secure-remote-work-embracing-zero-trust\/\" target=\"_blank\" rel=\"noopener noreferrer\">Enabling secure remote work by embracing Zero Trust<\/a>\u2014One of the greatest challenges we often hear from public and private sector CISOs, when it comes to achieving a Zero Trust IT operating environment, is the question of how to tackle such a massive undertaking\u2014and where to begin. Tune in to listen to CTO, Steve Faehl, to learn more about Microsoft\u2019s journey towards Zero Trust.<\/li>\n<li><strong>Available October 19: <\/strong><a href=\"https:\/\/www.fedscoop.com\/radio\/cloud-ai-key-managing-risk-management-compliance\/\">Risk Reduction\u2014Podcast<\/a>&nbsp;featuring GM, Alym Rayani who delivers an in-depth conversation about compliance and its connection to security.<\/li>\n<\/ul>\n<h2>Additional security blogs to read<\/h2>\n<h3>Government agency audit traceability<\/h3>\n<p>The reality&nbsp;today&nbsp;for many government agencies is there is no audit traceability to determine&nbsp;<em>which<\/em>&nbsp;email&nbsp;messages&nbsp;and content an attacker may have seen during a breached session into a user\u2019s mailbox.&nbsp;The standard level of&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/enable-mailbox-auditing?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Office 365 auditing<\/a>&nbsp;includes events&nbsp;that a user&nbsp;logged into&nbsp;their&nbsp;mailbox but&nbsp;does not include detailed information on the activity&nbsp;that occurs&nbsp;within the mailbox<em>.<\/em>&nbsp;As a result,&nbsp;organizations have no choice but to assume&nbsp;<em>all<\/em> content within&nbsp;the&nbsp;mailbox&nbsp;is compromised&nbsp;whether&nbsp;sensitive&nbsp;data or PII&nbsp;was&nbsp;viewed by the&nbsp;adversary. To learn more about how using Advanced Audit can help improve forensic investigation capability, read this blog from Matthew Littleton, Principal Technical Specialist on this <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/public-sector-blog\/using-advanced-audit-to-improve-your-forensic-investigation\/ba-p\/1799784\" target=\"_blank\" rel=\"noopener noreferrer\">Public Sector blog<\/a>.<\/p>\n<h3>Top 5 security questions asked by US Government customers<\/h3>\n<p>In an era of remote work, end users wanted to collaborate with outside agencies but in a way that meant their data was secure. IT Admins wanted to know which configuration options best fit their organization\u2019s security posture. CIO\u2019s wanted to lean in and give their workforce the best in class technology, all while following US Government accreditation standards. The common theme in most questions asked by our customers was around security. Read more about<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/public-sector-blog\/top-5-security-questions-asked-by-our-us-government-customers\/ba-p\/1751679\" target=\"_blank\" rel=\"noopener noreferrer\"> the top 5 security questions asked by our US Government customers for Microsoft Teams.<\/a><\/p>\n<p>October is my favorite time of year, between the change of season, Major League Baseball playoffs, and with football underway. It\u2019s also <a href=\"https:\/\/www.cisa.gov\/national-cyber-security-awareness-month\" target=\"_blank\" rel=\"noopener noreferrer\">National Cybersecurity Awareness Month<\/a>, though with so many cyberattacks and incidents in the news, one month of dedicated focus hardly seems sufficient. Learn how <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/public-sector-blog\/microsoft-s-end-to-end-security-commitments-to-our-customers\/ba-p\/1784105\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft delivers on an end-to-end security strategy to reduce risk and deliver on its commitment to customers.<\/a><\/p>\n<p>To learn more about how to be #Cybersmart visit the cybersecurity <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/cybersecurity-awareness\" target=\"_blank\" rel=\"noopener noreferrer\">website.<\/a> Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/10\/29\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is National Cyber Security Awareness Month (NCSAM). And there is still a lot to do! For the last 17\u00a0years, the\u00a0National Cybersecurity Awareness Month (NCSAM)\u00a0campaign, driven by the Department of Homeland Security, has raised\u00a0awareness about the importance of cyber\u00a0security across\u00a0the\u00a0Nation\u00a0with the mission of\u00a0ensuring\u00a0that\u00a0all Americans have the resources they need to be safer and more secure&#8230;<br \/>\nThe post It\u2019s Cybersecurity Awareness Month and there is still a lot to do appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37924,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-37923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>It\u2019s Cybersecurity Awareness Month and there is still a lot to do 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"It\u2019s Cybersecurity Awareness Month and there is still a lot to do 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-29T18:00:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1766\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"It\u2019s Cybersecurity Awareness Month and there is still a lot to do\",\"datePublished\":\"2020-10-29T18:00:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\"},\"wordCount\":645,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\",\"name\":\"It\u2019s Cybersecurity Awareness Month and there is still a lot to do 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg\",\"datePublished\":\"2020-10-29T18:00:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg\",\"width\":2560,\"height\":1766},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"It\u2019s Cybersecurity Awareness Month and there is still a lot to do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"It\u2019s Cybersecurity Awareness Month and there is still a lot to do 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/","og_locale":"en_US","og_type":"article","og_title":"It\u2019s Cybersecurity Awareness Month and there is still a lot to do 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-29T18:00:14+00:00","og_image":[{"width":2560,"height":1766,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"It\u2019s Cybersecurity Awareness Month and there is still a lot to do","datePublished":"2020-10-29T18:00:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/"},"wordCount":645,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/","url":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/","name":"It\u2019s Cybersecurity Awareness Month and there is still a lot to do 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg","datePublished":"2020-10-29T18:00:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do.jpg","width":2560,"height":1766},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/its-cybersecurity-awareness-month-and-there-is-still-a-lot-to-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"It\u2019s Cybersecurity Awareness Month and there is still a lot to do"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37923"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37923\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37924"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}