{"id":25,"date":"2023-12-28T22:13:12","date_gmt":"2023-12-28T22:13:12","guid":{"rendered":"https:\/\/www.likeanythingelse.com\/?p=25"},"modified":"2023-12-28T23:04:30","modified_gmt":"2023-12-28T23:04:30","slug":"cybersecurity-and-where-to-find-it-before-its-too-late","status":"publish","type":"post","link":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/","title":{"rendered":"Cybersecurity and where to find it (before it&#8217;s too late)"},"content":{"rendered":"\n<p>From the business perspective, cybersecurity is quite tricky. As opposed to design and development, if the cybersec team performs at their best\u2026 nothing happens. And it\u2019s the best thing you could hope for.&nbsp;<\/p>\n\n\n\n<p>In a way, this is like buying insurance. You hope not to need it, but then a year passes and not using it feels a bit like wasted money. Especially if that\u2019s yet another year where you don\u2019t need it. And in many companies, where the excel sheet is a business oracle, this is how cybersec is perceived. A non-tangible cost.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"287\" src=\"https:\/\/lh7-us.googleusercontent.com\/eP0-9cKFrhYlWwBrBg_f_R6VaglXCFs6N4V8Jf8urgKfer9AZRzN7yu0D482wrCnbHbhzRyv_52seTqKmZfvuJbVMRh1LZeaI9_7PfPKCGGedpeRPkDU6E81tOx4-qFgW1zgzBJ10h-vXuEz8k7mE9k\"><\/p>\n\n\n\n<p>I would say that this shortsighted approach is a recipe for a disaster\u2026 But in the past, thinking that way, I found myself in the minority. Many companies \u2013 especially ones seeking investors \u2013 are short-term oriented. This is not necessarily always a bad thing \u2013 but you need to know what to trade off. Security and quality seems to me the worst possible choice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How important is cybersecurity?<\/strong><\/h2>\n\n\n\n<p>A security breach is a risk at many different levels. On the most basic, you need to restore your operations. And without proper business continuity protocols and backups this may take a lot of time. Time during which your company is not making money, but still has costs that have to be covered.<\/p>\n\n\n\n<p>Then, there\u2019s the matter of your reputation. You don\u2019t always know what the hacker\u2019s goal is. And it\u2019s not only money anymore. In <a href=\"https:\/\/www.theverge.com\/2022\/9\/16\/23356213\/uber-hack-teen-slack-google-cloud-credentials-powershell\">the case of the Uber security breach<\/a>, the hacker was seeking attention and admiration. So it was in his interest to advertise it as much as possible. Some customers will forgive you, but some will just go elsewhere.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"187\" src=\"https:\/\/lh7-us.googleusercontent.com\/1ConuUeIU28svB78nq9wM8eCI1Nh2MRXG6_R01xn9vSOoyoP6PigQIZg6gIjkNdXk9PCsb0it9mnGfnQv9RZamyd2tjWRqU3YJaMDIqf_vXrlyeJrM1FSa7iZWf2ewELEVi4QMCzRtF0o98TUXPwCNE\"><\/p>\n\n\n\n<p>Another thing is that with ransom attacks, your backups might not be enough, and you will have to suck it up and pay. Reportedly, because of a simple human error, <a href=\"https:\/\/terranovasecurity.com\/garmin-security-breach\/\">Garmin had to pay $10m to Russian hackers<\/a>. And they most likely did so through an intermediary, as the hacker group was subject to US sanctions. That would for sure mean a nice fat fee on the top of it.<\/p>\n\n\n\n<p>Last but not least, we live in times of GDPR. The breach alone is grounds for a fine, but failing to notify affected users will increase it. If your company operates in different EU countries, remember that each GDPR office is a separate institution. So those are 27 angry European countries kicking you in the face, while you\u2019re already on your knees.&nbsp;<\/p>\n\n\n\n<p>So, yeah \u2013 I\u2019d say that cybersecurity is pretty important.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What can you do as a product professional?<\/strong><\/h2>\n\n\n\n<p>We will go through many of those things in the Cybersecurity section of this blog. In fact the next article I\u2019ve planned is one on password managers. But to not leave you hanging for now, just remember this: stay alert.&nbsp;<\/p>\n\n\n\n<p>Not clicking links or opening attachments automatically is basically a good habit to develop. The other is using password managers and generating strong and random passwords for all services you use. Also those services you use in your private life.&nbsp;<\/p>\n\n\n\n<p>Talk with your development team about cybersecurity best practices, and ask them to implement them in their daily work. Do not assume that they\u2019re doing it. In one of the companies I worked with, the devops team for 6 years had one password to all clients\u2019 admin panels. Yes \u2013 both plural \u2013 many clients, many panels \u2013 one password. This was despite the fact I personally negotiated a licence for 1password for all team members with our CEO (again \u2013 yes \u2013 I needed to negotiate the $50\/month of licences). It took Russia\u2019s barbaric invasion of Ukraine, and the hacker attacks on EU infrastructure that accompanied it, to change that.&nbsp;<\/p>\n\n\n\n<p>And the last thing for now \u2013 read about it and share articles on your internal communication channels. A constant drip of water wears away even a mountain. Below I share my favourite cybersec pages and some of the tools I use in my private and professional life. As I\u2019m Polish, some of the portals are in that language (and they\u2019re exceptionally good). However my foreign colleagues have no problem reading them with Google automatic translation on.<\/p>\n\n\n\n<div class=\"wp-block-gutena-tabs gutena-tabs-block gutena-tabs-block-5d793c-cd\"><ul class=\"gutena-tabs-tab tab-flex\"><li class=\"gutena-tab-title active\" data-tab=\"1\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>English speakers<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"2\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Polish speakers<\/div><\/div><\/div><\/li><\/ul><div class=\"gutena-tabs-content is-layout-flow wp-block-gutena-tabs-is-layout-flow\">\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-afbc79-57 active\" data-tab=\"1\">\n<p><a href=\"https:\/\/cybersecurityventures.com\/research\/#\">Cybercrime Magazine<\/a> \u2013 They have a whole separate section on cyberattacks cases. As they\u2019re from US, they often describe schemes that later one are used in other parts of the world. I also recommend their podcast.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.tripwire.com\/state-of-security\">Tripwire<\/a> \u2013 They are CyberSec company running a blog. They have a rich library of \u201chow to\u201d articles. It\u2019s worth to take a look from time to time.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.darkreading.com\/\">Dark Reading<\/a> \u2013 I heard this is the best site for CyberSec. To be honest I prefer Cybercrime Magazine, but they have really good free reports. They have new articles everyday, so it\u2019s good place to stay up to date with cyber security.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.yubico.com\/blog\/\">Yubico Blog<\/a> \u2013 This is a product company running blog, so obviously they\u2019re circling around thing that YubiKey could be used for \u2013 but if you have one, you can learn how to use it more effectively.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-456e4e-f5 inactive\" data-tab=\"2\">\n<p><a href=\"https:\/\/niebezpiecznik.pl\/\">Niebezpiecznik<\/a> \u2013 One of the best Polish sites dedicated to Cyber Security. You will find here a lot of articles about threats, prevention and hints. They also have their own CyberSec alerts app that notifies users about active attacks in Poland.<\/p>\n\n\n\n<p><a href=\"https:\/\/zaufanatrzeciastrona.pl\/\">Zaufana Trzecia Strona<\/a> \u2013 Slightly smaller team, but delivering very good CyberSec content. You will find detailed described cases and articles about Cyber Security. They\u2019re also running a podcast, and their editor in chief organizes annual \u201cSecurity Confession\u201d webinar where he shows what tools he use in his private and work life.<\/p>\n\n\n\n<p><a href=\"https:\/\/sekurak.pl\/\">Sekurak<\/a> \u2013 A bit more technical website dedicated to Cyber Security issues. Here you will find much more about practical application and news about technology that indirectly affects security.<\/p>\n\n\n\n<p><a href=\"https:\/\/blog.szurek.tv\/\">Kacper Szurek<\/a> \u2013 a blog run by a Polish CyberSec profesional. He has produced a lot of \u201chow-to\u201d articles and YT videos. You can learn from him about tools and apps improving security, but also what to do if you were affected by the attack.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>My short list of recommendation<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/signal.org\/en\/\">Signal<\/a> \u2013 It\u2019s an encrypted end-to-end communicator, available for the most popular operating systems \u2013 including Android and iOS, not connected to any of the Big Tech companies and not selling your data. One serious con for people enjoying WhatsApp is that moving to a new device or reinstalling wipes the message history.<\/p>\n\n\n\n<p><a href=\"https:\/\/keepassxc.org\/\">KeePassXC <\/a>\u2013 Free and open-source password manager that I use in my private life. As I consider it one of the most important day-to-day security measures, there will be a separate article about it.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.yubico.com\/\">Yubico NFC and 5C NFC<\/a> \u2013 a hardware authentication device \u2013 my favourite cybersecurity measure. The only problem is that it is still not very popular. In 2023 the first Polish bank will start using it to authorise users. And that will probably also be the first bank worldwide. But each year there are more and more popular.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/security.googleblog.com\/2023\/04\/google-authenticator-now-supports.html\">Google Authenticator<\/a> \u2013 Wherever YubiKey is not available I use Google Authenticator. Recently they added an option to connect GA with your Google account \u2013 so changing or losing a device will not be that big a deal anymore.<\/p>\n\n\n\n<p><a href=\"https:\/\/blog.revolut.com\/a\/virtual-card\/\">Revolut (disposable virtual cards)<\/a> \u2013 The best option if you need to buy something from a source you don\u2019t know or trust much. I used it to buy the theme for this blog. You just top up your account with money, pay and in case it\u2019s hacked the card was one-use only. Additionally I don\u2019t keep any money on my Revolut account when I don\u2019t need to.<\/p>\n\n\n\n<p><a href=\"https:\/\/blik.com\/en\">BLIK<\/a> \u2013 Polish payment method based on a 6 digit code generated for 30 sec. You type in the code and confirm on your phone. You\u2019re not sharing a CC number, so even if someone fooled you, all that is at stake is the amount you\u2019re paying. I also use it to withdraw money from ATMs to avoid scammers.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Credits<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Photo by cottonbro studio: <a href=\"https:\/\/www.pexels.com\/photo\/a-memory-card-near-a-laptop-5474287\/\">https:\/\/www.pexels.com\/photo\/a-memory-card-near-a-laptop-5474287\/<\/a><\/li>\n\n\n\n<li>Dilbert comic strip by Scott Adams: <a href=\"https:\/\/scottadams.locals.com\/\">https:\/\/scottadams.locals.com\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>From the business perspective, cybersecurity is quite tricky. As opposed to design and development, if the cybersec team performs at their best\u2026 nothing happens. And it\u2019s the best thing you could hope for.&nbsp; In a way, this is like buying insurance. You hope not to need it, but then a year passes and not using&#8230;<\/p>\n","protected":false},"author":2,"featured_media":31,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-25","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity and where to find it (before it&#039;s too late) - Like Anything Else<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and where to find it (before it&#039;s too late) - Like Anything Else\" \/>\n<meta property=\"og:description\" content=\"From the business perspective, cybersecurity is quite tricky. As opposed to design and development, if the cybersec team performs at their best\u2026 nothing happens. And it\u2019s the best thing you could hope for.&nbsp; In a way, this is like buying insurance. You hope not to need it, but then a year passes and not using...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\" \/>\n<meta property=\"og:site_name\" content=\"Like Anything Else\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-28T22:13:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-28T23:04:30+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.likeanythingelse.com\/wp-content\/uploads\/2023\/12\/pexels-cottonbro-studio-5474287-scaled-e1703804111253.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1531\" \/>\n\t<meta property=\"og:image:height\" content=\"1271\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Maciek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maciek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\"},\"author\":{\"name\":\"Maciek\",\"@id\":\"https:\/\/www.likeanythingelse.com\/#\/schema\/person\/2049c24f9a9a0e92669067b7caf3d8a3\"},\"headline\":\"Cybersecurity and where to find it (before it&#8217;s too late)\",\"datePublished\":\"2023-12-28T22:13:12+00:00\",\"dateModified\":\"2023-12-28T23:04:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\"},\"wordCount\":1355,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/#organization\"},\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\",\"url\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\",\"name\":\"Cybersecurity and where to find it (before it's too late) - Like Anything Else\",\"isPartOf\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/#website\"},\"datePublished\":\"2023-12-28T22:13:12+00:00\",\"dateModified\":\"2023-12-28T23:04:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.likeanythingelse.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and where to find it (before it&#8217;s too late)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.likeanythingelse.com\/#website\",\"url\":\"https:\/\/www.likeanythingelse.com\/\",\"name\":\"Like Anything Else\",\"description\":\"The worst path to product management you can imagine\",\"publisher\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.likeanythingelse.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.likeanythingelse.com\/#organization\",\"name\":\"Like Anything Else\",\"url\":\"https:\/\/www.likeanythingelse.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.likeanythingelse.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.likeanythingelse.com\/wp-content\/uploads\/2023\/12\/cropped-logo-webpage-lae.png\",\"contentUrl\":\"https:\/\/www.likeanythingelse.com\/wp-content\/uploads\/2023\/12\/cropped-logo-webpage-lae.png\",\"width\":1973,\"height\":426,\"caption\":\"Like Anything Else\"},\"image\":{\"@id\":\"https:\/\/www.likeanythingelse.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.likeanythingelse.com\/#\/schema\/person\/2049c24f9a9a0e92669067b7caf3d8a3\",\"name\":\"Maciek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.likeanythingelse.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e734d116f6707e3039b3e2725d849580a769842e18c82e19f24e94cb9a65635?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e734d116f6707e3039b3e2725d849580a769842e18c82e19f24e94cb9a65635?s=96&d=mm&r=g\",\"caption\":\"Maciek\"},\"url\":\"https:\/\/www.likeanythingelse.com\/index.php\/author\/maciek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and where to find it (before it's too late) - Like Anything Else","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and where to find it (before it's too late) - Like Anything Else","og_description":"From the business perspective, cybersecurity is quite tricky. As opposed to design and development, if the cybersec team performs at their best\u2026 nothing happens. And it\u2019s the best thing you could hope for.&nbsp; In a way, this is like buying insurance. You hope not to need it, but then a year passes and not using...","og_url":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/","og_site_name":"Like Anything Else","article_published_time":"2023-12-28T22:13:12+00:00","article_modified_time":"2023-12-28T23:04:30+00:00","og_image":[{"width":1531,"height":1271,"url":"http:\/\/www.likeanythingelse.com\/wp-content\/uploads\/2023\/12\/pexels-cottonbro-studio-5474287-scaled-e1703804111253.jpg","type":"image\/jpeg"}],"author":"Maciek","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Maciek","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#article","isPartOf":{"@id":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/"},"author":{"name":"Maciek","@id":"https:\/\/www.likeanythingelse.com\/#\/schema\/person\/2049c24f9a9a0e92669067b7caf3d8a3"},"headline":"Cybersecurity and where to find it (before it&#8217;s too late)","datePublished":"2023-12-28T22:13:12+00:00","dateModified":"2023-12-28T23:04:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/"},"wordCount":1355,"commentCount":0,"publisher":{"@id":"https:\/\/www.likeanythingelse.com\/#organization"},"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/","url":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/","name":"Cybersecurity and where to find it (before it's too late) - Like Anything Else","isPartOf":{"@id":"https:\/\/www.likeanythingelse.com\/#website"},"datePublished":"2023-12-28T22:13:12+00:00","dateModified":"2023-12-28T23:04:30+00:00","breadcrumb":{"@id":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.likeanythingelse.com\/index.php\/2023\/12\/28\/cybersecurity-and-where-to-find-it-before-its-too-late\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.likeanythingelse.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and where to find it (before it&#8217;s too late)"}]},{"@type":"WebSite","@id":"https:\/\/www.likeanythingelse.com\/#website","url":"https:\/\/www.likeanythingelse.com\/","name":"Like Anything Else","description":"The worst path to product management you can imagine","publisher":{"@id":"https:\/\/www.likeanythingelse.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.likeanythingelse.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.likeanythingelse.com\/#organization","name":"Like Anything Else","url":"https:\/\/www.likeanythingelse.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.likeanythingelse.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.likeanythingelse.com\/wp-content\/uploads\/2023\/12\/cropped-logo-webpage-lae.png","contentUrl":"https:\/\/www.likeanythingelse.com\/wp-content\/uploads\/2023\/12\/cropped-logo-webpage-lae.png","width":1973,"height":426,"caption":"Like Anything Else"},"image":{"@id":"https:\/\/www.likeanythingelse.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.likeanythingelse.com\/#\/schema\/person\/2049c24f9a9a0e92669067b7caf3d8a3","name":"Maciek","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.likeanythingelse.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7e734d116f6707e3039b3e2725d849580a769842e18c82e19f24e94cb9a65635?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e734d116f6707e3039b3e2725d849580a769842e18c82e19f24e94cb9a65635?s=96&d=mm&r=g","caption":"Maciek"},"url":"https:\/\/www.likeanythingelse.com\/index.php\/author\/maciek\/"}]}},"_links":{"self":[{"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/posts\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":3,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/posts\/25\/revisions"}],"predecessor-version":[{"id":30,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/posts\/25\/revisions\/30"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/media\/31"}],"wp:attachment":[{"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/media?parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/categories?post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.likeanythingelse.com\/index.php\/wp-json\/wp\/v2\/tags?post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}