{"id":15522,"date":"2020-04-14T17:47:50","date_gmt":"2020-04-14T21:47:50","guid":{"rendered":"https:\/\/www.cyberdrip.com\/?p=15522"},"modified":"2020-04-14T17:47:50","modified_gmt":"2020-04-14T21:47:50","slug":"myths-and-truths-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/","title":{"rendered":"Myths and Truths about Cybersecurity"},"content":{"rendered":"<h3><strong>5 Myths and truths about cybersecurity<\/strong><\/h3>\n<p><strong>1.Anti-Virus software and a firewall will protect your system.<\/strong><br \/>\nAnti-Virus software and firewalls are extremely important, but they won\u2019t protect you from every threat. 95% of successful cyber-attacks are caused by human error. Well-coordinated phishing campaign can penetrate business or organization defenses due to a lack of training.<\/p>\n<p><strong>2. Small businesses aren\u2019t big targets.<\/strong><br \/>\nPlenty of businesses around the world are thinking that they\u2019re immune to hackers because they\u2019re \u201ctoo small\u201d or don\u2019t have any valuable data to steal. What businesses fail to realize is that any data is valuable to a cybercriminal.<\/p>\n<p><strong>3. Just a strong password is enough.<\/strong><br \/>\nA strong password is enough to stand-up to multiple break-in attempts and, in some cases, hard to socially engineer. However, no matter how many numbers and special characters are used in your password, there is always a possibility that cybercriminals can bypass security protocols or that credentials can leak out in some way. It\u2019s very important to use different passwords on each account and keep changing your passwords on a regular basis.<\/p>\n<p><strong>4. Threats are only external.<\/strong><br \/>\nMost employees will say that cybersecurity threats come from the outside. Based on research statistics, nearly 75% of data breaches are an outcome of someone on the inside known as an \u201cInsider Threat\u201d. Therefore, training is essential.<\/p>\n<p><strong>5. IT department will take care everything.<\/strong><br \/>\nIT department will take care of everything. Some employees generally believe it\u2019s the IT specialist\u2019s or IT department\u2019s job to implement and review policies and take care of access management, but they cannot take care of everything. The responsibility lies on each employee\u2019s shoulder when it comes to cybersecurity. If employees haven\u2019t been trained enough, then they will end up clicking on unidentified links, download attachments, or in some cases, an employee will unknowingly give information to cybercriminals which is known as Social Engineering.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>5 Myths and truths about cybersecurity 1.Anti-Virus software and a firewall will protect your system. Anti-Virus software and firewalls are extremely important, but they won\u2019t protect you from every threat. 95% of successful cyber-attacks are caused by human error. Well-coordinated phishing campaign can penetrate business or organization defenses due to a lack of training. 2.&hellip;&nbsp;<\/p>\n","protected":false},"author":2,"featured_media":15523,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[5],"tags":[4,20,21,18,19,22,23],"class_list":["post-15522","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-training","tag-cyberdrip","tag-cybersecurity-training","tag-cybersecurity_myths","tag-cyber_security","tag-cyber_security_awareness","tag-security_awareness","tag-security_training"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Myths and Truths about Cybersecurity - cyberdrip security awareness<\/title>\n<meta name=\"description\" content=\"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry.Prevent cyberattack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Myths and Truths about Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry. Prevent cyberattack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"cyberdrip Technology Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-14T21:47:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2020\/04\/cmt-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tharindu Adikari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Myths and Truths about Cybersecurity\" \/>\n<meta name=\"twitter:description\" content=\"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry. Prevent cyberattack.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tharindu Adikari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/\"},\"author\":{\"name\":\"Tharindu Adikari\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#\\\/schema\\\/person\\\/9f602c06be45b273fb71632075aab30a\"},\"headline\":\"Myths and Truths about Cybersecurity\",\"datePublished\":\"2020-04-14T21:47:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/\"},\"wordCount\":320,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/cmt-1.jpg\",\"keywords\":[\"cyberdrip\",\"cybersecurity training\",\"cybersecurity_myths\",\"cyber_security\",\"cyber_security_awareness\",\"security_awareness\",\"security_training\"],\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/\",\"name\":\"Myths and Truths about Cybersecurity - cyberdrip security awareness\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/cmt-1.jpg\",\"datePublished\":\"2020-04-14T21:47:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#\\\/schema\\\/person\\\/9f602c06be45b273fb71632075aab30a\"},\"description\":\"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry.Prevent cyberattack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/cmt-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberdrip.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/cmt-1.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/2020\\\/04\\\/14\\\/myths-and-truths-about-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Myths and Truths about Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#website\",\"url\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/\",\"name\":\"cyberdrip Technology Solutions\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberdrip.wasmer.app\\\/#\\\/schema\\\/person\\\/9f602c06be45b273fb71632075aab30a\",\"name\":\"Tharindu Adikari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g\",\"caption\":\"Tharindu Adikari\"},\"url\":\"https:\\\/\\\/www.cyberdrip.com\\\/index.php\\\/author\\\/adi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Myths and Truths about Cybersecurity - cyberdrip security awareness","description":"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry.Prevent cyberattack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Myths and Truths about Cybersecurity","og_description":"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry. Prevent cyberattack.","og_url":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/","og_site_name":"cyberdrip Technology Solutions","article_published_time":"2020-04-14T21:47:50+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2020\/04\/cmt-1.jpg","type":"image\/jpeg"}],"author":"Tharindu Adikari","twitter_card":"summary_large_image","twitter_title":"Myths and Truths about Cybersecurity","twitter_description":"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry. Prevent cyberattack.","twitter_misc":{"Written by":"Tharindu Adikari","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/"},"author":{"name":"Tharindu Adikari","@id":"https:\/\/cyberdrip.wasmer.app\/#\/schema\/person\/9f602c06be45b273fb71632075aab30a"},"headline":"Myths and Truths about Cybersecurity","datePublished":"2020-04-14T21:47:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/"},"wordCount":320,"commentCount":0,"image":{"@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2020\/04\/cmt-1.jpg","keywords":["cyberdrip","cybersecurity training","cybersecurity_myths","cyber_security","cyber_security_awareness","security_awareness","security_training"],"articleSection":["cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/","url":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/","name":"Myths and Truths about Cybersecurity - cyberdrip security awareness","isPartOf":{"@id":"https:\/\/cyberdrip.wasmer.app\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2020\/04\/cmt-1.jpg","datePublished":"2020-04-14T21:47:50+00:00","author":{"@id":"https:\/\/cyberdrip.wasmer.app\/#\/schema\/person\/9f602c06be45b273fb71632075aab30a"},"description":"5 Myths and truths about cybersecurity. Why cybersecurity awareness is important for all businesses from small to large in any industry.Prevent cyberattack.","breadcrumb":{"@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#primaryimage","url":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2020\/04\/cmt-1.jpg","contentUrl":"https:\/\/www.cyberdrip.com\/wp-content\/uploads\/2020\/04\/cmt-1.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberdrip.com\/index.php\/2020\/04\/14\/myths-and-truths-about-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberdrip.wasmer.app\/"},{"@type":"ListItem","position":2,"name":"Myths and Truths about Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cyberdrip.wasmer.app\/#website","url":"https:\/\/cyberdrip.wasmer.app\/","name":"cyberdrip Technology Solutions","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberdrip.wasmer.app\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cyberdrip.wasmer.app\/#\/schema\/person\/9f602c06be45b273fb71632075aab30a","name":"Tharindu Adikari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b1d1fe397c02c4c77a8c7607bbed45fee24a419bf57e5b866ab51b47ea07761?s=96&d=mm&r=g","caption":"Tharindu Adikari"},"url":"https:\/\/www.cyberdrip.com\/index.php\/author\/adi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/posts\/15522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/comments?post=15522"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/posts\/15522\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/media\/15523"}],"wp:attachment":[{"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/media?parent=15522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/categories?post=15522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberdrip.com\/index.php\/wp-json\/wp\/v2\/tags?post=15522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}