{
"author": {
"name": "Perry Carpenter",
"webUrl": "/author/profile/perry-carpenter/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 8,
"social": [],
"articles": [
{
"uri": "/2023/01/26/build-a-strong-security-culture-to-guard-against-risks/",
"title": "Build a strong security culture to guard against risks",
"byline": "Perry Carpenter",
"kicker": "Best Practices",
"prettyDate": "January 26, 2023",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/01/Team-security_Mikolette-Moller_peopleimages.jpg",
"width": "620",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "A strong, positive culture will reward and celebrate actions in support of company goals and objectives and in alignment with core values.",
"body": null
},
{
"uri": "/2022/07/14/these-7-cybersecurity-stats-will-keep-you-up-at-night/",
"title": "These 7 cybersecurity stats will keep you up at night",
"byline": "Perry Carpenter",
"kicker": "Best Practices",
"prettyDate": "July 14, 2022",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/07/Cybersecurity-_Billion-Photos.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "With 82% of data breaches caused by social engineering or human error, staff training is imperative.",
"body": null
},
{
"uri": "/2022/03/03/3-keys-to-designing-secure-cyber-behavior/",
"title": "3 keys to designing secure cyber behavior",
"byline": "Perry Carpenter",
"kicker": "Best Practices",
"prettyDate": "March 03, 2022",
"timeToRead": "6 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/03/Malware-Yingyaipumi.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Increased awareness of security problems doesn't always translate to more secure behavior.",
"body": null
},
{
"uri": "/2021/11/30/want-to-boost-cybersecurity-embrace-the-attacker-mindset/",
"title": "Want to boost cybersecurity? Embrace the attacker mindset",
"byline": "Perry Carpenter",
"kicker": "Best Practices",
"prettyDate": "November 30, 2021",
"timeToRead": "6 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/11/Cybersecurity-plan_momius.jpg",
"width": "616",
"height": "373"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Thinking like a criminal trying to get into your home or organization can help identify vulnerabilities.",
"body": null
},
{
"uri": "/2021/06/09/businesses-remain-hot-targets-for-phishing-ransomware-scams/",
"title": "Businesses remain hot targets for phishing & ransomware scams",
"byline": "Perry Carpenter",
"kicker": "Best Practices",
"prettyDate": "June 09, 2021",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/06/Phishing-Jacky.jpg",
"width": "614",
"height": "371"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "As cyber insurance claims spike, insurers are taking steps to mitigate their exposures.",
"body": null
},
{
"uri": "/2021/04/22/businesses-should-plan-ahead-for-cyberattacks/",
"title": "Businesses should plan ahead for cyberattacks",
"byline": "Perry Carpenter",
"kicker": "Best Practices",
"prettyDate": "April 22, 2021",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/04/Cyber-breach_Przemek-Klos_falcon.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "A significant breach may slow a company's operations or cause it to cease business entirely.",
"body": null
},
{
"uri": "/2021/03/25/3-steps-for-driving-a-strong-cybersecurity-culture/",
"title": "3 steps for driving a strong cybersecurity culture",
"byline": "Perry Carpenter",
"kicker": "Analysis",
"prettyDate": "March 25, 2021",
"timeToRead": "7 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/03/Hacking-at-night-Melinda-Nagy_stock.adobe_Falcon.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/analysis/",
"sectionName": "Analysis"
}
],
"summary": "Companies need to be strong and intentional when shaping their cyber protection approach.",
"body": null
},
{
"uri": "/2020/09/04/how-fraudsters-use-fake-news-and-social-media-to-misinform/",
"title": "How fraudsters use 'fake news' and social media to misinform",
"byline": "Perry Carpenter",
"kicker": "Expert Opinion",
"prettyDate": "September 04, 2020",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2020/09/Facebook_BigNazik_Shutterstock_Falcon.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/perry-carpenter/",
"name": "Perry Carpenter"
}
],
"kickerNode": [
{
"uri": "/expert-opinion/",
"sectionName": "Expert Opinion"
}
],
"summary": "Junk news is far more likely to go viral and the bad guys know it.",
"body": null
}
]
}
}