{"id":4754,"date":"2011-05-04T00:00:00","date_gmt":"2011-05-04T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2011\/05\/04\/top-5-pdf-risks-and-how-to-avoid-them\/"},"modified":"2021-11-04T15:59:42","modified_gmt":"2021-11-04T15:59:42","slug":"pdf-risks","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/","title":{"rendered":"Top 5 PDF Risks and How to Avoid Them"},"content":{"rendered":"<p>In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47 percent of all Q1 infections tracked by Kaspersky Labs. By mid-year, PDF exploits had fallen to 30 percent, overtaken by Java. However, PDF remains the world&#8217;s second most popular target.<\/p>\n<p>For those running PDF software \u2013 lead by Adobe Reader and its commercial counterpart Acrobat \u2013 these attacks have triggered a seemingly nonstop stream of updates. Why do malware writers love to exploit PDF and how you can avoid becoming a casualty of this on-going arms race?<\/p>\n<ol>\n<li><strong>Low-hanging fruit:<\/strong> One of the biggest reasons that PDF exploits blossomed in 2009 was Adobe Reader&#8217;s ubiquity. According to Kaspersky researcher Roul Schouwenberg, hardening techniques like Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) had been rolled into Windows, making OS exploits less attractive. Malware writers searching for more fertile fields seized upon PDF as a wildly popular monoculture ripe for attack. Just about every desktop has a PDF reader installed &#8212; usually Adobe Reader or Acrobat. This enormous pool of potential victims translates into a financially lucrative attack target worthy of investment in malware development.<\/li>\n<li><strong>Push-button exploits:<\/strong> In reality, as malware kits that exploited PDF vulnerabilities became readily available, little effort or expense was actually needed to tap this opportunity. According to M86 Security Labs, malware kits such as LuckySploit, CrimePack, and Fragus can be purchased for as little as $100 &#8212; and commonly top out around $1,000. This trend started with MPack but really ramped up in 2008; today, most new malware kits include Adobe Flash, Java classes and PDF-based exploits. Those kits made it trivial to create obfuscated automated attacks that leveraged Adobe Reader&#8217;s many well-known code vulnerabilities.<\/li>\n<li><strong>Large attack surface:<\/strong> PDF is an industry standard portable document format, implemented by many free and commercial programs. But Adobe&#8217;s Reader and Acrobat products are driven by an extremely large and complex code base which includes numerous proprietary extensions. This translates into functionality and flexibility &#8212; characteristics that have made PDF a &#8220;universal language&#8221; for document exchange. But it also means an extremely large attack surface that has proven difficult for Adobe and anti-malware vendors to defend. One example: Adobe Reader supports embedded Javascript objects &#8212; yet another foothold that malware writers can use to gain traction.<\/li>\n<li><strong>Slow moving mitigation:<\/strong> According to a Microsoft Security Intelligence Report, three Adobe Reader vulnerabilities &#8212; patched in May 2008, November 2008 and March 2009 &#8212; accounted for more than 46 percent of all browser-based attacks. Vulnerabilities such as these were so widely exploited because, until mid-2010, Adobe did not have an auto-update infrastructure. Soon after an updater was released, PDF exploits began to decline. However, they did not disappear because 1) users must opt into auto-updates, and 2) updates are only checked for the installed version. Thus, users still running Adobe Reader 7.0 or 8.0 may think they are current, having enabled auto-update and installed all available patches. But they should really be moving to Reader X to avoid exploits that succeed only against older versions.<\/li>\n<li><strong>The race is still on:<\/strong> During the past year, Adobe has taken significant steps to reduce PDF exploitation. In addition to auto-updates, Adobe developed an Adobe Reader Protected Mode \u2013 a secure sandbox in which PDFs can be opened for display, handcuffing malware calls to other applications and using policy to determine actions that are automatically allowed or blocked. Unfortunately, users can defeat these protections by clicking &#8220;yes.&#8221; Although users may now realize that PDFs are used for phishing, many still don&#8217;t think of PDFs as harboring malware. And attackers continue to find new holes to exploit and new ways to evade detection \u2013 for example, return-oriented programming (ROP) and stolen digital certificates have played roles in recent PDF exploits.<\/li>\n<\/ol>\n<p>Unlike other attack vectors that administrators know how to police through scanning and filtering, reducing risk of PDF exploitation can be challenging. Few businesses can afford to simply block PDF attachments and downloads &#8212; legitimate PDFs are just far too prevalent and ingrained in our business practices. However, employers can take steps defend themselves against known exploits.<\/p>\n<p>Start by upgrading every desktop or laptop to the latest version of Adobe Reader or Acrobat, enabling auto-update, and configuring settings &#8212; for example, disabling Javascript. Some organizations may consider using alternative PDF readers; doing so might reduce attack surface but raises concerns about freeware reader legitimacy, safety, and interoperability. Monitor PDF reader vulnerabilities to ensure priority patches are applied in a timely fashion &#8212; monthly isn&#8217;t good enough. Scan stored and downloaded PDFs for malware before they can be opened. Finally, educate users &#8212; especially executives and staff often targeted by spear phishing &#8212; about the risks posed by PDFs.<\/p>\n<p><em>Lisa Phifer owns Core Competence, a consulting firm focused on business use of emerging network and security technologies. A 28-year industry veteran, Lisa<\/em><em> enjoys helping companies large and small to assess, mitigate, and prevent Internet security threats through sound policies, effective technologies, best practices, and user education.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ea45d562e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ea45d562e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ea45d562e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ea45d562e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ea45d562e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ea45d562e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ea45d562e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47 percent of all Q1 infections tracked by Kaspersky Labs. By mid-year, PDF exploits had fallen to 30 percent, overtaken by Java. However, PDF remains the world&#8217;s second most popular target. For those running PDF software \u2013 lead by [&hellip;]<\/p>\n","protected":false},"author":186,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[730],"b2b_audience":[25],"b2b_industry":[],"b2b_product":[397,401,379,392],"class_list":["post-4754","post","type-post","status-publish","format-standard","hentry","category-products","tag-security","b2b_audience-audience","b2b_product-anti-malware","b2b_product-operating-system-security","b2b_product-threats-and-vulnerabilities","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 PDF Risks and How to Avoid Them | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 PDF Risks and How to Avoid Them | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2011-05-04T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-04T15:59:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lisa Phifer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisa Phifer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\"},\"author\":{\"name\":\"Lisa Phifer\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b0c9531f0dae0ce9c35127a1e2b1b23\"},\"headline\":\"Top 5 PDF Risks and How to Avoid Them\",\"datePublished\":\"2011-05-04T00:00:00+00:00\",\"dateModified\":\"2021-11-04T15:59:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\"},\"wordCount\":830,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"security\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\",\"name\":\"Top 5 PDF Risks and How to Avoid Them | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2011-05-04T00:00:00+00:00\",\"dateModified\":\"2021-11-04T15:59:42+00:00\",\"description\":\"Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 PDF Risks and How to Avoid Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b0c9531f0dae0ce9c35127a1e2b1b23\",\"name\":\"Lisa Phifer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/lisa_phifer_photo_3-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/lisa_phifer_photo_3-150x150.jpg\",\"caption\":\"Lisa Phifer\"},\"description\":\"Lisa Phifer is president of Core Competence, a consulting firm focused on enterprise adoption of emerging network and security technologies. Lisa has been involved in the design, implementation and evaluation of networking, security and management products for 30 years.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/lisa-phifer\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 PDF Risks and How to Avoid Them | eSecurity Planet","description":"Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 PDF Risks and How to Avoid Them | eSecurity Planet","og_description":"Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.","og_url":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/","og_site_name":"eSecurity Planet","article_published_time":"2011-05-04T00:00:00+00:00","article_modified_time":"2021-11-04T15:59:42+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Lisa Phifer","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Lisa Phifer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/"},"author":{"name":"Lisa Phifer","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b0c9531f0dae0ce9c35127a1e2b1b23"},"headline":"Top 5 PDF Risks and How to Avoid Them","datePublished":"2011-05-04T00:00:00+00:00","dateModified":"2021-11-04T15:59:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/"},"wordCount":830,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["security"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/","url":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/","name":"Top 5 PDF Risks and How to Avoid Them | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2011-05-04T00:00:00+00:00","dateModified":"2021-11-04T15:59:42+00:00","description":"Unlike security threats you can police with scanning and filtering, reducing PDF exploits can be challenging.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/pdf-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Top 5 PDF Risks and How to Avoid Them"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/3b0c9531f0dae0ce9c35127a1e2b1b23","name":"Lisa Phifer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/lisa_phifer_photo_3-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/lisa_phifer_photo_3-150x150.jpg","caption":"Lisa Phifer"},"description":"Lisa Phifer is president of Core Competence, a consulting firm focused on enterprise adoption of emerging network and security technologies. Lisa has been involved in the design, implementation and evaluation of networking, security and management products for 30 years.","url":"https:\/\/www.esecurityplanet.com\/author\/lisa-phifer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4754"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/186"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4754"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4754\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4754"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4754"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4754"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}