{"id":1123,"date":"2019-09-05T00:29:01","date_gmt":"2019-09-05T00:29:01","guid":{"rendered":"https:\/\/hotlineit.com\/?p=1123"},"modified":"2019-09-05T00:29:03","modified_gmt":"2019-09-05T00:29:03","slug":"the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond","status":"publish","type":"post","link":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/","title":{"rendered":"The Cyber Threat Landscape – How it’s evolving and how we should respond"},"content":{"rendered":"\n

The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.

VIEW WEBINAR RECORDING<\/strong><\/a>

Please note, you will need to sign in with a name and email address to view the recording. <\/em><\/p>\n\n\n\n

If your business needs expert help with cyber security, contact us today<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them. VIEW WEBINAR RECORDING Please note, you will need to sign in with a name and email address to view the recording. If your business needs expert help with cyber security, contact us today.<\/p>\n","protected":false},"author":3,"featured_media":1124,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[6],"tags":[25,24],"acf":[],"yoast_head":"\nThe Cyber Threat Landscape - How it's Evolving and How to Respond<\/title>\n<meta name=\"description\" content=\"The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Cyber Threat Landscape - How it's Evolving and How to Respond\" \/>\n<meta property=\"og:description\" content=\"The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/\" \/>\n<meta property=\"og:site_name\" content=\"Hotline IT\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T00:29:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-05T00:29:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hotline IT Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hotline IT Staff\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/\"},\"author\":{\"name\":\"Hotline IT Staff\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c\"},\"headline\":\"The Cyber Threat Landscape – How it’s evolving and how we should respond\",\"datePublished\":\"2019-09-05T00:29:01+00:00\",\"dateModified\":\"2019-09-05T00:29:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/\"},\"wordCount\":68,\"publisher\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg\",\"keywords\":[\"Cyber Security\",\"Cyber Threat\"],\"articleSection\":[\"IT Risks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/\",\"url\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/\",\"name\":\"The Cyber Threat Landscape - How it's Evolving and How to Respond\",\"isPartOf\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg\",\"datePublished\":\"2019-09-05T00:29:01+00:00\",\"dateModified\":\"2019-09-05T00:29:03+00:00\",\"description\":\"The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage\",\"url\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg\",\"contentUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg\",\"width\":880,\"height\":600,\"caption\":\"Cyber Security\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.hotlineit.com\/#website\",\"url\":\"https:\/\/staging.hotlineit.com\/\",\"name\":\"Hotline IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.hotlineit.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\",\"name\":\"Hotline IT\",\"url\":\"https:\/\/staging.hotlineit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg\",\"contentUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg\",\"width\":1,\"height\":1,\"caption\":\"Hotline IT\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c\",\"name\":\"Hotline IT Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g\",\"caption\":\"Hotline IT Staff\"},\"url\":\"https:\/\/staging.hotlineit.com\/author\/hotline-it-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cyber Threat Landscape - How it's Evolving and How to Respond","description":"The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Cyber Threat Landscape - How it's Evolving and How to Respond","og_description":"The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.","og_url":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/","og_site_name":"Hotline IT","article_published_time":"2019-09-05T00:29:01+00:00","article_modified_time":"2019-09-05T00:29:03+00:00","og_image":[{"width":880,"height":600,"url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg","type":"image\/jpeg"}],"author":"Hotline IT Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hotline IT Staff"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#article","isPartOf":{"@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/"},"author":{"name":"Hotline IT Staff","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c"},"headline":"The Cyber Threat Landscape – How it’s evolving and how we should respond","datePublished":"2019-09-05T00:29:01+00:00","dateModified":"2019-09-05T00:29:03+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/"},"wordCount":68,"publisher":{"@id":"https:\/\/staging.hotlineit.com\/#organization"},"image":{"@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg","keywords":["Cyber Security","Cyber Threat"],"articleSection":["IT Risks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/","url":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/","name":"The Cyber Threat Landscape - How it's Evolving and How to Respond","isPartOf":{"@id":"https:\/\/staging.hotlineit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage"},"image":{"@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg","datePublished":"2019-09-05T00:29:01+00:00","dateModified":"2019-09-05T00:29:03+00:00","description":"The following webinar recording, run by Hotline IT, focuses on security threats and the most effective way to respond to them.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/the-cyber-threat-landscape-how-its-evolving-and-how-we-should-respond\/#primaryimage","url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg","contentUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/09\/cyber-threat-landscape.jpg","width":880,"height":600,"caption":"Cyber Security"},{"@type":"WebSite","@id":"https:\/\/staging.hotlineit.com\/#website","url":"https:\/\/staging.hotlineit.com\/","name":"Hotline IT","description":"","publisher":{"@id":"https:\/\/staging.hotlineit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.hotlineit.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.hotlineit.com\/#organization","name":"Hotline IT","url":"https:\/\/staging.hotlineit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/","url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg","contentUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg","width":1,"height":1,"caption":"Hotline IT"},"image":{"@id":"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c","name":"Hotline IT Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g","caption":"Hotline IT Staff"},"url":"https:\/\/staging.hotlineit.com\/author\/hotline-it-staff\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts\/1123"}],"collection":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/comments?post=1123"}],"version-history":[{"count":0,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts\/1123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/media\/1124"}],"wp:attachment":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/media?parent=1123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/categories?post=1123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/tags?post=1123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}