{"id":2475,"date":"2016-02-19T00:00:00","date_gmt":"2016-02-19T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2016\/02\/19\/32-percent-of-companies-dont-evaluate-their-third-party-vendors\/"},"modified":"2021-01-28T16:18:49","modified_gmt":"2021-01-28T16:18:49","slug":"companies-dont-evaluate-their-third-party-vendors","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/","title":{"rendered":"32 Percent of Companies Don&#8217;t Evaluate Their Third Party Vendors"},"content":{"rendered":"<div id=\"article-content\">\n<p>According to the results of a <a href=\"https:\/\/www.navexglobal.com\/en-us\/resource-center\">recent NAVEX Global survey<\/a> of 321 professionals involved in third-party management, fully 32 percent of respondents don&#8217;t evaluate third parties at all before engaging with them, almost half of respondents have no dedicated budget for third party risk management, and 11 percent of respondents don&#8217;t even know how many third parties they manage.<\/p>\n<p>That&#8217;s in spite of several recent high-profile data breaches resulting from security flaws at third-party vendors, including those at <a href=\"https:\/\/www.esecurityplanet.com\/threats\/\/target-hackers-got-access-from-hvac-company.html\">Target<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/goodwill-data-breach-linked-to-third-party-vendor.html\">Goodwill<\/a>.<\/p>\n<p>Survey respondents said their top three concerns about third parties include bribery and corruption (39 percent), fraud (23 percent), and conflicts of interest (19 percent).<\/p>\n<p>&#8220;Though many organizations know which third party failures they should fear, they have not built sufficient programs and processes to identify and manage those risks,&#8221; NAVEX Global vice president for advisory services and report author Randy Stephens said in a <a href=\"https:\/\/www.prnewswire.com\/trends\/-releases\/companies-due-diligence-on-third-parties-lacking-according-to-navex-global-ethics--compliance-third-party-risk-management-benchmark-report-300217681.html\">statement<\/a>.<\/p>\n<p>&#8220;That may indicate a disconnect between performance of individual programs and accountability for the pain of a third party failure,&#8221; Stephens added. &#8220;Whoever is managing third parties and third party risk should understand the economic risk and impact of third party compliance on the company.&#8221;<\/p>\n<p>When asked to identify top objectives for their third party risk management programs, 90 percent said their key aim was to &#8220;protect our organization from risk and damage,&#8221; followed by &#8220;comply with laws and regulations&#8221; (82 percent), and to &#8220;meet legal and regulatory requirements&#8221; (71 percent).<\/p>\n<p>The leading internal issues that respondents believe are undermining their third party risk management programs&#8217; effectives are difficulty monitoring third party relationships (51 percent), limited resources for the program (51 percent), and inconsistent reporting on on third party issues (43 percent).<\/p>\n<p>The leading external challenges to third party risk management programs are getting third parties to certify compliance with a company&#8217;s policies (51 percent), training third parties on a company&#8217;s policies and compliance requirements (48 percent), getting third parties to enforce a company&#8217;s ethics and compliance policies in their organizations (41 percent), and getting third parties to enforce a company&#8217;s ethics and compliance structure with their own third parties (34 percent).<\/p>\n<p>Separately, a recent <a href=\"https:\/\/info.bitsight.com\/risk-degrees-of-separation-pr\">BitSight Technologies study<\/a> of 35,635 companies highlighted the risk from fourth parties, third party vendors&#8217; own third party vendors. &#8220;The effects of a breach may be felt well beyond the initial attack,&#8221; the report states. &#8220;This is often a result of the complex business relationships that exist.&#8221;<\/p>\n<p>&#8220;For example, let&#8217;s say Company 1 is a vendor for Company 2, and this vendor outsources their services to Company 3, who was the target of a breach,&#8221; the report adds. &#8220;This attack creates a knock-on effect, where vulnerabilities introduced through the compromised service provider now provides a backdoor to hackers.&#8221;<\/p>\n<p>&#8220;Organizations who ignore these interconnections leave themselves vulnerable to other attacks or system disruptions at some point in the future,&#8221; the report notes.<\/p>\n<p>Over 31 percent of the companies studied are linked to Adobe Systems, which <a href=\"https:\/\/www.esecurityplanet.com\/threats\/\/adobe-breach-was-source-code-real-target.html\">suffered a data breach in 2013<\/a>; almost 40 percent of media and entertainment companies use Amazon Web Services as their content delivery network; and more than 13 percent of the aerospace and defense companies studied use IIS 6, indicating that they use Windows Server 2003, which is no longer supported.<\/p>\n<p>&#8220;Though understanding your entire security ecosystem may seem like a lofty undertaking, appropriate identification, prioritization, and validation, paired with continuous monitoring, can simplify the process and eliminate the potential for a devastating disruption,&#8221; BitSight co-founder and CTO Stephen Boyer said in a <a href=\"https:\/\/www.bitsight.com\/press-releases\/new-report-underscores-risk-associated-with-4th-party-networks\">statement<\/a>.<\/p>\n<p>A recent <em>eSecurity Planet <\/em>offered <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-practices-for-reducing-third-party-security-risks\/\">five tips on reducing third-party security risks<\/a>.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d7031146737-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7031146737\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7031146737\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7031146737\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7031146737\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7031146737\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7031146737\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to the results of a recent NAVEX Global survey of 321 professionals involved in third-party management, fully 32 percent of respondents don&#8217;t evaluate third parties at all before engaging with them, almost half of respondents have no dedicated budget for third party risk management, and 11 percent of respondents don&#8217;t even know how many [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[730],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[377,380,143],"class_list":["post-2475","post","type-post","status-publish","format-standard","hentry","category-networks","tag-security","b2b_audience-awareness-and-consideration","b2b_product-gateway-and-network-security","b2b_product-policy-compliance","b2b_product-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>32 Percent of Companies Don&#039;t Evaluate Their Third Party Vendors<\/title>\n<meta name=\"description\" content=\"And 11 percent don&#039;t even know how many third party vendors they work with, a recent study found.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"32 Percent of Companies Don&#039;t Evaluate Their Third Party Vendors\" \/>\n<meta property=\"og:description\" content=\"And 11 percent don&#039;t even know how many third party vendors they work with, a recent study found.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:18:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"32 Percent of Companies Don&#8217;t Evaluate Their Third Party Vendors\",\"datePublished\":\"2016-02-19T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:18:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\"},\"wordCount\":583,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\",\"name\":\"32 Percent of Companies Don't Evaluate Their Third Party Vendors\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2016-02-19T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:18:49+00:00\",\"description\":\"And 11 percent don't even know how many third party vendors they work with, a recent study found.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"32 Percent of Companies Don&#8217;t Evaluate Their Third Party Vendors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"32 Percent of Companies Don't Evaluate Their Third Party Vendors","description":"And 11 percent don't even know how many third party vendors they work with, a recent study found.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/","og_locale":"en_US","og_type":"article","og_title":"32 Percent of Companies Don't Evaluate Their Third Party Vendors","og_description":"And 11 percent don't even know how many third party vendors they work with, a recent study found.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/","og_site_name":"eSecurity Planet","article_published_time":"2016-02-19T00:00:00+00:00","article_modified_time":"2021-01-28T16:18:49+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"32 Percent of Companies Don&#8217;t Evaluate Their Third Party Vendors","datePublished":"2016-02-19T00:00:00+00:00","dateModified":"2021-01-28T16:18:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/"},"wordCount":583,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["security"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/","url":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/","name":"32 Percent of Companies Don't Evaluate Their Third Party Vendors","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2016-02-19T00:00:00+00:00","dateModified":"2021-01-28T16:18:49+00:00","description":"And 11 percent don't even know how many third party vendors they work with, a recent study found.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/companies-dont-evaluate-their-third-party-vendors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"32 Percent of Companies Don&#8217;t Evaluate Their Third Party Vendors"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2475"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=2475"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2475\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=2475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=2475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=2475"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=2475"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=2475"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=2475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}