Cyber criminals love insurance data because it includes intellectual property and personal information. Learn six ways to minimize the risk of being hacked.
DebugScreen: mobile
{
"author": {
"name": "Bryant G Tow",
"webUrl": "/author/profile/bryant-g-tow/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2012/04/03/four-layers-of-defense-against-cyber-intrusion/",
"title": "Four Layers of Defense Against Cyber Intrusion",
"byline": "Bryant G. Tow",
"kicker": "Commentary",
"prettyDate": "April 03, 2012",
"timeToRead": "4 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/bryant-g-tow/",
"name": "Bryant G. Tow"
}
],
"kickerNode": [
{
"uri": "/commentary/",
"sectionName": "Commentary"
}
],
"summary": "Todays enterprise network is a target-rich environment and requires a layered approach to defend.",
"body": null
},
{
"uri": "/2012/02/29/6-ways-to-protect-insurance-data-from-hackers/",
"title": "6 Ways to Protect Insurance Data from Hackers",
"byline": " Bryant G. Tow ",
"kicker": "News",
"prettyDate": "February 29, 2012",
"timeToRead": "4 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/bryant-g-tow/",
"name": "Bryant G. Tow"
}
],
"kickerNode": [
{
"uri": "/news/",
"sectionName": "News"
}
],
"summary": "Cyber criminals love insurance data because it includes intellectual property and personal information. Learn six ways to minimize the risk of being hacked.",
"body": null
}
]
}
}