{"id":44327,"date":"2021-12-08T15:05:10","date_gmt":"2021-12-08T15:05:10","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32894\/Everyone-Is-Burned-Out.-Thats-Becoming-A-Security-Nightmare.html"},"modified":"2021-12-08T15:05:10","modified_gmt":"2021-12-08T15:05:10","slug":"everyone-is-burned-out-thats-becoming-a-security-nightmare","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/","title":{"rendered":"Everyone Is Burned Out. That&#8217;s Becoming A Security Nightmare"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybersecurity workers and other employees are suffering from a high level of burnout that is putting organisations at greater risks from cyberattacks and data breaches. <\/p>\n<p>Research by <a href=\"https:\/\/blog.1password.com\/state-of-access-report-burnout-breach\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">cybersecurity company 1Password<\/a> suggests that the challenge of <a href=\"https:\/\/www.zdnet.com\/topic\/working-from-home-how-to-get-remote-work-right\/\">remote working<\/a> two years into the <span class=\"link\"><a href=\"https:\/\/www.zdnet.com\/topic\/coronavirus-business-and-technology-in-a-pandemic\/\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;link_anchor&quot;, &quot;pageType&quot;: &quot;article&quot;}\">COVID-19 pandemic<\/a><\/span> is leaving staff feeling burned out and less likely to pay attention to security guidelines. <\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">ZDNet Recommends<\/span> <\/h3>\n<\/p><\/div>\n<p>According to the survey, burned-out employees are more apathetic about workplace cybersecurity measures and are three times more likely to ignore suggested best practices. <\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/?ftag=CMG-01-10aaa1b\"><strong>A winning strategy for cybersecurity<\/strong><\/a>&nbsp;<strong>(ZDNet special report)<\/strong><\/strong> <\/p>\n<p>Risky behaviours include downloading software and apps without IT&#8217;s express permission, and thus increasing the amount of <a href=\"https:\/\/www.zdnet.com\/article\/shadow-it-and-now-shadow-iot-challenge-technology-leaders\/\">shadow IT<\/a> on networks that&#8217;s difficult for the IT department to properly manage. There&#8217;s also the risk that these employees could <a href=\"https:\/\/www.zdnet.com\/article\/this-password-stealing-and-keylogging-malware-is-being-spread-through-fake-software-downloads\/\">download fake or malicious versions of apps<\/a>, which could potentially deliver <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\">malware<\/a>&nbsp;and other threats from hackers. <\/p>\n<p>The paper also warns that burned-out employees are much more likely to use <a href=\"https:\/\/www.zdnet.com\/article\/these-are-the-terrible-passwords-that-people-are-still-using-heres-how-to-do-better\/\">easy-to-guess passwords<\/a> to secure their corporate accounts. The use of weak passwords makes it much easier for cyber criminals to breach accounts and use that access to snoop around the network, steal information and lay down the foundation for wider malicious activity. <\/p>\n<p>&#8220;The biggest threat is internal apathy. When people don&#8217;t use security protocols properly, they leave our company vulnerable,&#8221; said one unnamed cybersecurity professional cited in the report. <\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>In many organisations, it&#8217;s cybersecurity staff who are there to counter activity that could make the network vulnerable to cyberattacks \u2013 but according to the paper, cybersecurity professionals are more burned out than other workers. The research suggests that 84% of <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-is-tough-work-so-beware-of-burnout\/\">security professionals are feeling burned out<\/a>, compared with 80% of other workers. <\/p>\n<p>And when cybersecurity employees are burned out, they&#8217;re more than likely to describe themselves as &#8220;completely checked out&#8221; and &#8220;doing the bare minimum at work&#8221; \u2013 something that one in 10 cybersecurity professionals described as their state of mind compared with one in 20 of other employees. <\/p>\n<p>That attitude could easily result in security threats being missed or flaws not being fixed in time, something that could put the whole company at risk from cyber incidents. <\/p>\n<p>&#8220;Pandemic-fueled burnout \u2013 and resultant workplace apathy and distraction \u2013 has emerged as the next significant security risk,&#8221; said Jeff Shiner, chief executive officer at 1Password. &#8220;It&#8217;s particularly surprising to find that burned-out security leaders, charged with protecting businesses, are doing a far worse job of following security guidelines \u2013 and putting companies at risk&#8221;. <\/p>\n<p>The rise of remote and\/or hybrid working has changed many workplaces in a permanent way and it&#8217;s vital that the correct cybersecurity strategies are put in place to manage risk. <\/p>\n<p>Additionally, managers need to talk to employees about the challenges working from home can bring in addition to the benefits \u2013 therefore, gaining a better understanding over why burnout happens and what can be done to counter both burnout and the associated security risks. <\/p>\n<p>&#8220;It&#8217;s now a business imperative for companies to engage the humans at the heart of security operations with tools, training and ongoing support to create a culture of security and care that helps us all stay safe at work,&#8221; said Shiner. <\/p>\n<h3> <strong>MORE ON CYBERSECURITY<\/strong> <\/h3>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32894\/Everyone-Is-Burned-Out.-Thats-Becoming-A-Security-Nightmare.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8633],"class_list":["post-44327","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headline"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Everyone Is Burned Out. That&#039;s Becoming A Security Nightmare 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everyone Is Burned Out. That&#039;s Becoming A Security Nightmare 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-08T15:05:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Everyone Is Burned Out. That&#8217;s Becoming A Security Nightmare\",\"datePublished\":\"2021-12-08T15:05:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/\"},\"wordCount\":548,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\\\/2021\\\/12\\\/08\\\/d845464a-5faf-4a24-a366-d61d299ea7b0\\\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"keywords\":[\"headline\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/\",\"name\":\"Everyone Is Burned Out. That's Becoming A Security Nightmare 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\\\/2021\\\/12\\\/08\\\/d845464a-5faf-4a24-a366-d61d299ea7b0\\\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2021-12-08T15:05:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\\\/2021\\\/12\\\/08\\\/d845464a-5faf-4a24-a366-d61d299ea7b0\\\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\\\/2021\\\/12\\\/08\\\/d845464a-5faf-4a24-a366-d61d299ea7b0\\\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/everyone-is-burned-out-thats-becoming-a-security-nightmare\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headline\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Everyone Is Burned Out. That&#8217;s Becoming A Security Nightmare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everyone Is Burned Out. That's Becoming A Security Nightmare 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/","og_locale":"en_US","og_type":"article","og_title":"Everyone Is Burned Out. That's Becoming A Security Nightmare 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-08T15:05:10+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Everyone Is Burned Out. That&#8217;s Becoming A Security Nightmare","datePublished":"2021-12-08T15:05:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/"},"wordCount":548,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","keywords":["headline"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/","url":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/","name":"Everyone Is Burned Out. That's Becoming A Security Nightmare 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2021-12-08T15:05:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/fb4d5631cae5c8aae82e41a27bbc31bce5146d16\/2021\/12\/08\/d845464a-5faf-4a24-a366-d61d299ea7b0\/a-stressed-man-working-from-home.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/everyone-is-burned-out-thats-becoming-a-security-nightmare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline","item":"https:\/\/www.threatshub.org\/blog\/tag\/headline\/"},{"@type":"ListItem","position":3,"name":"Everyone Is Burned Out. That&#8217;s Becoming A Security Nightmare"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44327"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44327\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}