{"id":700,"date":"2017-07-17T12:55:37","date_gmt":"2017-07-17T16:55:37","guid":{"rendered":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/?p=700"},"modified":"2017-07-25T12:59:20","modified_gmt":"2017-07-25T16:59:20","slug":"6-steps-consulrants-can-take-to-guard-against-cyber-threats","status":"publish","type":"post","link":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/2017\/07\/17\/6-steps-consulrants-can-take-to-guard-against-cyber-threats\/","title":{"rendered":"6 Steps Consulrants Can Take To Guard Against Cyber Threats"},"content":{"rendered":"<blockquote><p>The recent security lapse where Deep Root Analytics left 198 million voter profiles on the internet without security and free for anyone to download is a stark reminder that campaigns and consultants still are not taking cybersecurity seriously enough in the wake of the election-related hacks of 2016. <a href=\"https:\/\/www.campaignsandelections.com\/campaign-insider\/6-steps-consultants-can-take-to-guard-against-cyber-threats\">Read more<\/a>&#8230;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The recent security lapse where Deep Root Analytics left 198 million voter profiles on the internet without security and free for anyone to download is a stark reminder that campaigns and consultants still are not taking cybersecurity seriously enough in the wake of the election-related hacks of 2016. Read more&#8230;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-700","post","type-post","status-publish","format-standard","hentry","category-cyber-security-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=700"}],"version-history":[{"count":1,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/700\/revisions"}],"predecessor-version":[{"id":701,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/700\/revisions\/701"}],"wp:attachment":[{"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/categories?post=700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.saintpeters.edu\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/tags?post=700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}