{"id":48831,"date":"2022-02-10T17:15:00","date_gmt":"2022-10-18T17:15:57","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=48831"},"modified":"2022-11-06T20:40:08","modified_gmt":"2022-11-07T04:40:08","slug":"cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/","title":{"rendered":"Secure Your Data \u2014 the Most Valuable Business Asset"},"content":{"rendered":"\n<p>With waves of Australian businesses shifting online, these virtual spaces are new territory for cyber attacks.&nbsp;<\/p>\n\n\n\n<p>In fact, <a href=\"https:\/\/securitybrief.com.au\/story\/new-year-new-rules-understanding-the-cybersecurity-danger-areas-in-2022\" target=\"_blank\" rel=\"noopener\">cybersecurity has become a top priority<\/a> for Australian businesses, who suffered more than $33 billion in total losses from cybercrime last year, reports the Australian Cyber Security Centre. Globally, the <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noopener\">IBM Cost of Data Breach Report 2021<\/a> found that phishing attempts have risen 600% and cloud-based attacks rose 630%.<\/p>\n\n\n\n<p>Explore our cybersecurity infographic below to see how to secure your customer data, and get more tips with the latest <a href=\"https:\/\/www.salesforce.com\/au\/resources\/guides\/data-security-governance-it-guide\/?d=7013y000002Z2fiAAC&amp;nc=7013y000002Z2fnAAC\" target=\"_blank\" rel=\"noopener\">e-book on data security and compliance<\/a> for every IT Leader.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.salesforce.com\/au\/resources\/guides\/data-security-governance-it-guide\/?d=7013y0000025z74AAA&amp;nc=7013y0000025z79AAA\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"8050\" data-attachment-id=\"55425\" data-permalink=\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/cybersecurity-data-infographic-anz-1\/\" data-orig-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg\" data-orig-size=\"960,8050\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cybersecurity-data-infographic-anz-1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg?w=60\" data-large-file=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg?w=960\" src=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg?strip=all&#038;quality=95\" alt=\"\" class=\"wp-image-55425\" srcset=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg 960w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg?w=768&amp;h=6440 768w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg?w=183&amp;h=1536 183w, https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-infographic-anz-1.jpg?w=18&amp;h=150 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant. <\/p>\n","protected":false},"author":1,"featured_media":48833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"21b1295c37e746e38269c4c846983f1f","post_meta_title":"","ai_synopsis":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[2484,2504],"sf_content_type":[],"coauthors":[2454],"class_list":["post-48831","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-digital-transformation","sf_topic-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure Your Data \u2014 the Most Valuable Business Asset | Salesforce<\/title>\n<meta name=\"description\" content=\"We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Your Data \u2014 the Most Valuable Business Asset\" \/>\n<meta property=\"og:description\" content=\"We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T17:15:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-07T04:40:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@salesforce\" \/>\n<meta name=\"twitter:site\" content=\"@salesforce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8\"}],\"headline\":\"Secure Your Data \u2014 the Most Valuable Business Asset\",\"datePublished\":\"2022-10-18T17:15:57+00:00\",\"dateModified\":\"2022-11-07T04:40:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\"},\"wordCount\":102,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\",\"name\":\"Secure Your Data \u2014 the Most Valuable Business Asset | Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg\",\"datePublished\":\"2022-10-18T17:15:57+00:00\",\"dateModified\":\"2022-11-07T04:40:08+00:00\",\"description\":\"We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg\",\"width\":500,\"height\":281},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"name\":\"Salesforce\",\"description\":\"Learn how to get ahead of trends and supercharge professional relationships\",\"publisher\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#organization\",\"name\":\"Salesforce\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Salesforce\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/salesforce\",\"https:\/\/x.com\/salesforce\",\"https:\/\/instagram.com\/salesforce\",\"http:\/\/www.linkedin.com\/company\/salesforce\",\"http:\/\/www.youtube.com\/Salesforce\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8\",\"name\":\"Salesforce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/5c0ee1996ec3a82ffd225f681265d95d\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1\",\"width\":128,\"height\":96,\"caption\":\"Salesforce\"},\"description\":\"The 360 Blog from Salesforce teaches readers how to improve work outcomes and professional relationships. Our content explores the mindset shifts, organisational hurdles, and people behind business evolution. We also cover the tactics, ethics, products, and thought leadership that make growth a meaningful and positive experience.\",\"url\":\"https:\/\/www.salesforce.com\/au\/blog\/author\/salesforce\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Your Data \u2014 the Most Valuable Business Asset | Salesforce","description":"We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/","og_type":"article","og_title":"Secure Your Data \u2014 the Most Valuable Business Asset","og_description":"We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant.","og_url":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/","og_site_name":"Salesforce","article_publisher":"https:\/\/www.facebook.com\/salesforce","article_published_time":"2022-10-18T17:15:57+00:00","article_modified_time":"2022-11-07T04:40:08+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg","type":"image\/jpeg"}],"author":"Salesforce","twitter_card":"summary_large_image","twitter_creator":"@salesforce","twitter_site":"@salesforce","twitter_misc":{"Written by":"Salesforce","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8"}],"headline":"Secure Your Data \u2014 the Most Valuable Business Asset","datePublished":"2022-10-18T17:15:57+00:00","dateModified":"2022-11-07T04:40:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/"},"wordCount":102,"commentCount":0,"publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg","inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/","url":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/","name":"Secure Your Data \u2014 the Most Valuable Business Asset | Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg","datePublished":"2022-10-18T17:15:57+00:00","dateModified":"2022-11-07T04:40:08+00:00","description":"We now live in a digital-first world, changing the data security landscape forever. With virtual collaboration being key across most businesses, and sensitive customer data on the line, it\u2019s important to stay safe, secure, and compliant.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/cybersecurity-insights-secure-your-data-your-most-valuable-business-asset-yet\/#primaryimage","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg","width":500,"height":281},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/au\/blog\/#website","url":"https:\/\/www.salesforce.com\/au\/blog\/","name":"Salesforce","description":"Learn how to get ahead of trends and supercharge professional relationships","publisher":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.salesforce.com\/au\/blog\/#organization","name":"Salesforce","url":"https:\/\/www.salesforce.com\/au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Salesforce"},"image":{"@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/salesforce","https:\/\/x.com\/salesforce","https:\/\/instagram.com\/salesforce","http:\/\/www.linkedin.com\/company\/salesforce","http:\/\/www.youtube.com\/Salesforce"]},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/3116597fb93569a20b61fd4fe1a932b8","name":"Salesforce","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.salesforce.com\/au\/blog\/#\/schema\/person\/image\/5c0ee1996ec3a82ffd225f681265d95d","url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1","contentUrl":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/salesforce-avatar-e1666571807979.png?w=128&h=96&crop=1","width":128,"height":96,"caption":"Salesforce"},"description":"The 360 Blog from Salesforce teaches readers how to improve work outcomes and professional relationships. Our content explores the mindset shifts, organisational hurdles, and people behind business evolution. We also cover the tactics, ethics, products, and thought leadership that make growth a meaningful and positive experience.","url":"https:\/\/www.salesforce.com\/au\/blog\/author\/salesforce\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/au\/blog","push-errors":false,"primary_topic":{"term_id":2504,"name":"IT","slug":"it","term_group":0,"term_taxonomy_id":2504,"taxonomy":"sf_topic","description":"","parent":0,"count":72,"filter":"raw"},"featured_image_url":"https:\/\/www.salesforce.com\/au\/blog\/wp-content\/uploads\/sites\/4\/2022\/10\/cybersecurity-data-blog-header.jpg?w=500","_links":{"self":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/48831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/comments?post=48831"}],"version-history":[{"count":6,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/48831\/revisions"}],"predecessor-version":[{"id":57001,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/posts\/48831\/revisions\/57001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media\/48833"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/media?parent=48831"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_topic?post=48831"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/sf_content_type?post=48831"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/au\/blog\/wp-json\/wp\/v2\/coauthors?post=48831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}