{"id":31895,"date":"2019-09-24T04:08:00","date_gmt":"2019-09-24T08:08:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31895"},"modified":"2019-09-24T04:08:00","modified_gmt":"2019-09-24T08:08:00","slug":"why-content-services-platforms-should-be-need-to-know-security-ready","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/24\/why-content-services-platforms-should-be-need-to-know-security-ready\/","title":{"rendered":"Why Content Services Platforms Should Be &#8216;Need-To-Know&#8217; Security Ready"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.infosecurity-magazine.com\/profile\/ian-raine\/\">Ian Raine<\/a> &#8211; As global organizations create ever larger volumes of highly sensitive, confidential and commercially valuable content, how those documents and emails are accessed, collaborated-on and secured in traditional document and content management platforms becomes a business-critical decision.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/09\/key-2114046__340.jpg\" alt=\"\" class=\"wp-image-31896\" width=\"315\" height=\"171\"\/><\/figure><\/div>\n\n\n\n<p>Professionals in legal, finance, HR and other regulated groups are managing some of the enterprise\u2019s most sensitive information \u2013 and are under increasing pressure to ensure that information is not part of a data breach or privacy violation.<\/p>\n\n\n\n<p>The evolving nature of threats now requires a different response. According to&nbsp;<a href=\"https:\/\/enterprise.verizon.com\/en-gb\/resources\/reports\/dbir\/2019\/results-and-analysis\/\">Verizon\u2019s 2019 Data Breach Investigations Report<\/a>, over 70% of security threats continue to originate from compromised credentials \u2013 and 32% of breaches involved phishing.<\/p>\n\n\n\n<p>That means that traditional security defenses such as firewalls, malware detection, email filtering and complex password requirements are ineffective in preventing a malicious actor with a compromised set of credentials from accessing enterprise networks and document systems including <strong>Content Service<\/strong> Platforms (CSPs).  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.infosecurity-magazine.com\/opinions\/content-services-platforms\/&amp;ct=ga&amp;cd=CAEYAioUMTE4MDgzNzI0NTMxODgwMjE2OTMyGjQwNDMwNWJiNTFkYzJlNmU6Y29tOmVuOlVT&amp;usg=AFQjCNFnDK5j5u7MDV3OKvk4Dl9sQOkzrg\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Ian Raine &#8211; As global organizations create ever larger volumes of highly sensitive, confidential and commercially valuable content, how those documents and emails are accessed, collaborated-on and secured in traditional document and content management platforms becomes a business-critical decision. <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/24\/why-content-services-platforms-should-be-need-to-know-security-ready\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[658,14],"tags":[659,150],"class_list":["post-31895","post","type-post","status-publish","format-standard","hentry","category-content-services","category-security","tag-content-services","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31895"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31895\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}