data
query
queries
{
"author": {
"name": "Timothy Zeilman",
"webUrl": "/author/profile/timothy-zeilman/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 5,
"social": [],
"articles": [
{
"uri": "/2020/09/18/hsb-study-smartphones-connected-tech-invite-cybercrime/",
"title": "HSB study: Smartphones, connected tech invite cybercrime",
"byline": "Timothy Zeilman",
"kicker": "Analysis",
"prettyDate": "September 18, 2020",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2020/09/Internet-of-Things_Shutterstock.jpg",
"width": "620",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/timothy-zeilman/",
"name": "Timothy Zeilman"
}
],
"kickerNode": [
{
"uri": "/analysis/",
"sectionName": "Analysis"
}
],
"summary": "The proliferation of connected technologies in homes and phones provide new pathways for hackers and other bad actors. Insurance can help.",
"body": null
},
{
"uri": "/2019/02/28/is-your-data-in-the-cloud-its-still-at-risk-of-cyberattack/",
"title": "Is your data in the cloud? It's still at risk of cyberattack",
"byline": "Timothy Zeilman",
"kicker": "Commentary",
"prettyDate": "February 28, 2019",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2019/02/Safety-concept_-Article-201902271941.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/timothy-zeilman/",
"name": "Timothy Zeilman"
}
],
"kickerNode": [
{
"uri": "/commentary/",
"sectionName": "Commentary"
}
],
"summary": "Here are some security issues to consider when choosing and using cloud-based data storage.",
"body": null
},
{
"uri": "/2018/04/02/how-to-fend-off-identity-theft-during-tax-season/",
"title": "How to fend off identity theft during tax season",
"byline": "Timothy Zeilman",
"kicker": "Best Practices",
"prettyDate": "April 02, 2018",
"timeToRead": "6 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2018/04/04_Financial-Documents_iStock.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/timothy-zeilman/",
"name": "Timothy Zeilman"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
},
{
"uri": "/commentary/",
"sectionName": "Commentary"
}
],
"summary": "Income tax refunds are like candy to identity thieves. Follow these 7 guidelines to prevent becoming a victim.",
"body": null
},
{
"uri": "/2016/06/30/hackers-target-smart-phones-and-connected-homes/",
"title": "Hackers target smart phones and connected homes",
"byline": "Timothy Zeilman",
"kicker": "News",
"prettyDate": "June 30, 2016",
"timeToRead": "4 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/timothy-zeilman/",
"name": "Timothy Zeilman"
}
],
"kickerNode": [
{
"uri": "/news/",
"sectionName": "News"
}
],
"summary": "As the demand for new personal technology grows, it will create opportunities for the insurance industry to offer Cyber coverage to people and their homes, along with challenges.",
"body": null
},
{
"uri": "/2016/04/07/midsize-companies-feel-the-squeeze-when-choosing-cyber-coverage/",
"title": "Midsize companies feel the squeeze when choosing Cyber coverage",
"byline": "Timothy Zeilman",
"kicker": "News",
"prettyDate": "April 07, 2016",
"timeToRead": "6 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/timothy-zeilman/",
"name": "Timothy Zeilman"
}
],
"kickerNode": [
{
"uri": "/news/",
"sectionName": "News"
}
],
"summary": "These data-rich businesses lack the technology and resources of large corporations, making them attractive to cyber attackers.",
"body": null
}
]
}
}