{"id":75370,"date":"2023-12-01T00:00:47","date_gmt":"2023-12-01T05:00:47","guid":{"rendered":"https:\/\/todaysveterinarybusiness.com\/?p=75370"},"modified":"2023-11-29T18:08:09","modified_gmt":"2023-11-29T23:08:09","slug":"cybercrime-security-protect-and-defend-1223","status":"publish","type":"post","link":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/","title":{"rendered":"The Hidden World of Cybercrime"},"content":{"rendered":"<p style=\"font-weight: 400;\">No business is immune to cybercrime. Unfortunately, smaller companies are easier to victimize because they frequently lack the organizational depth, expertise, and technical and financial resources of larger businesses. They also are more likely to use outdated computer operating systems. Would you believe that 10% of companies reportedly still use Windows 7?<\/p>\n<p style=\"font-weight: 400;\">During a presentation at the 2023 VMX conference, the presenter, an attorney specializing in cyber-related exposure, was quoted as saying, \u201cThere are two types of businesses \u2014 those that have been hacked and those that don\u2019t know they have been hacked.\u201d The assertion might be slightly exaggerated, but a critical point was made.<\/p>\n<p style=\"font-weight: 400;\">Ransomware is the most common form of cyberattack. It typically focuses on charging a ransom to prevent a hacker\u2019s destruction of critical business computer data or its release into the public domain, typically the dark web. Lacking the resources to address a ransomware incursion immediately, some businesses see paying the ransom as an inviting solution. Unfortunately, studies show that agreeing to such a demand increases the likelihood of a recurrence. After all, the infiltration became a proven payday for criminals.<\/p>\n<h3 style=\"font-weight: 400;\"><strong>Think Outside the Box<\/strong><\/h3>\n<p style=\"font-weight: 400;\">Given the global outsourcing of services, veterinary businesses look to vendors, a relationship that often requires sharing sensitive data. Partners such as call centers, point-of-sale credit card processors, payroll administrators and cloud-based data storage providers handle sensitive information on behalf of businesses. Still, the customer (your veterinary practice, for example) bears ultimate responsibility for protecting the information and responding appropriately in case of a breach.<\/p>\n<p style=\"font-weight: 400;\">An IBM Institute study revealed that almost half of all <a href=\"https:\/\/todaysveterinarybusiness.com\/prepared-data-breach\/\">data breaches<\/a> occurred while the information was with a third-party vendor. Therefore, when you do something as simple as transmitting point-of-sale credit card information to your financial institution, you likely incurred significant cyber exposure. It doesn\u2019t matter whether you save the credit card in your computer system because hackers can access the data during its electronic transmission or from the point-of-sale device\u2019s cache.<\/p>\n<p style=\"font-weight: 400;\">A Google search illustrates how easily and inexpensively someone can use the dark web to purchase information about an individual or business.<\/p>\n<ul>\n<li>For $1, you can obtain the tools to install a malware application on a business computer system.<\/li>\n<li>For $4, you can get someone\u2019s date of birth and social security number.<\/li>\n<li>For $15, you can receive bank account or credit card CVV (card verification value) information.<\/li>\n<li>For $20, you can acquire a digital copy of a fake driver\u2019s license or passport.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Cyber thieves commonly use such information to fraudulently:<\/p>\n<ul>\n<li>Withdraw money from bank accounts.<\/li>\n<li>Obtain new credit cards.<\/li>\n<li>Make online purchases.<\/li>\n<li>Borrow money from a bank.<\/li>\n<li>Submit health insurance claims.<\/li>\n<li>Pay off debt.<\/li>\n<\/ul>\n<h3 style=\"font-weight: 400;\"><strong>Problem Areas<\/strong><\/h3>\n<p style=\"font-weight: 400;\">How is your veterinary practice at risk? Let\u2019s focus on vendor-related cyberthreats, including:<\/p>\n<ul>\n<li><strong>Supply-chain vulnerabilities:<\/strong> All practices rely on vendors for an ever-expanding list of products and services. For example, some vendors help maintain inventories. If a vendor has weak cybersecurity, attackers could exploit the company\u2019s computer system to access your network.<\/li>\n<li><strong>Third-party software:<\/strong> Poorly designed software and applications might have security vulnerabilities or back doors that cybercriminals can use to compromise your data.<\/li>\n<li><strong>Data sharing:<\/strong> Vendors often require access to your data for legitimate purposes. Mishandled or inadequately secured information can be exposed, leading to a breach.<\/li>\n<li><strong>Subcontractors:<\/strong> A vendor sometimes hands off work to third parties. You\u2019re probably not aware of their cybersecurity practices.<\/li>\n<li><strong>Lack of monitoring:<\/strong> Most veterinary businesses do not closely watch or audit their vendors\u2019 security. The lack of oversight can create vulnerabilities and financial liabilities.<\/li>\n<li><strong>Cloud services:<\/strong> Many businesses rely on cloud data-storage providers. If the vendor experiences downtime or a breach, your operations can be disrupted and your data exposed.<\/li>\n<\/ul>\n<h3 style=\"font-weight: 400;\"><strong>Security Checklist<\/strong><\/h3>\n<p style=\"font-weight: 400;\">Veterinary practices can protect themselves from cyberattacks originating with vendors through:<\/p>\n<ul>\n<li><strong>Risk assessment:<\/strong> Ask about a vendor\u2019s security policies and procedures and its compliance with standards such as the HIPAA Security Rule or General Data Protection Regulation (GDPR).<\/li>\n<li><strong>Contracts:<\/strong> Make sure vendor agreements include clauses that cover cybersecurity responsibilities, incident responses and liability.<\/li>\n<li><strong>Communication:<\/strong> Maintain open channels with vendors.<\/li>\n<li><strong>Teamwork:<\/strong> Collaborate with vendors to establish how they would address a breach promptly and effectively.<\/li>\n<li><strong>Training:<\/strong> Inquire how vendors teach their employees about security best practices and data protection.<\/li>\n<li><strong>Data security:<\/strong> Ensure that sensitive information exchanged with vendors is encrypted during transmission and storage.<\/li>\n<li><strong>Logging:<\/strong> Continuously monitor vendor activities on your network to detect suspicious or unauthorized actions.<\/li>\n<li><strong>Exit strategy:<\/strong> Develop a plan for transitioning to another vendor seamlessly and without compromising security.<\/li>\n<li><strong>Third-party insurance:<\/strong> Consider purchasing cyber insurance to mitigate the financial risks associated with vendor-related incidents. Among the top cyber insurance coverages requested by businesses are data breach, data restoration, cyber extortion and ransom, business interruption, funds transfer fraud, and social engineering.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Many proactive risk-management strategies require a significant amount of expertise. I recommend contacting your insurance agent, risk-management team or outside cybersecurity professional for assistance. Also, check out the Federal Trade Commission\u2019s \u201cCybersecurity for Small Businesses\u201d top 10 tips at <a href=\"http:\/\/bit.ly\/3FH8NkC\">bit.ly\/3FH8NkC<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.<\/p>\n","protected":false},"author":15,"featured_media":75371,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"iawp_total_views":0,"footnotes":""},"categories":[412],"tags":[],"class_list":["post-75370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-december-2023-january-2024","column-protect-and-defend","clinical_topics-business-insurance","clinical_topics-innovation-technology"],"acf":{"hide_sidebar":false,"hide_sidebar_ad":false,"hide_all_ads":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.7 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Hidden World of Cybercrime | Today&#039;s Veterinary Business<\/title>\n<meta name=\"description\" content=\"Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Hidden World of Cybercrime\" \/>\n<meta property=\"og:description\" content=\"Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/\" \/>\n<meta property=\"og:site_name\" content=\"Today&#039;s Veterinary Business\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/todaysveterinarybusiness\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-01T05:00:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Protect-and-Defend-1223.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"544\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ed Branam, DVM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tvbpublication\" \/>\n<meta name=\"twitter:site\" content=\"@tvbpublication\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ed Branam, DVM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/\"},\"author\":{\"name\":\"Ed Branam, DVM\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/person\\\/3dc590de4a6dd3fb22a90ecafc668b39\"},\"headline\":\"The Hidden World of Cybercrime\",\"datePublished\":\"2023-12-01T05:00:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/\"},\"wordCount\":835,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Protect-and-Defend-1223.jpg\",\"articleSection\":[\"December 2023\\\/January 2024\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/\",\"name\":\"The Hidden World of Cybercrime | Today&#039;s Veterinary Business\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Protect-and-Defend-1223.jpg\",\"datePublished\":\"2023-12-01T05:00:47+00:00\",\"description\":\"Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#primaryimage\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Protect-and-Defend-1223.jpg\",\"contentUrl\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Protect-and-Defend-1223.jpg\",\"width\":1024,\"height\":544,\"caption\":\"Poorly designed software and applications might have security vulnerabilities or back doors that cybercriminals can use to compromise your data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/cybercrime-security-protect-and-defend-1223\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Hidden World of Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#website\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\",\"name\":\"Today&#039;s Veterinary Business\",\"description\":\"Veterinary Business Magazine\",\"publisher\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#organization\",\"name\":\"Today's Veterinary Business\",\"url\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/02\\\/tvb-logo.png\",\"contentUrl\":\"https:\\\/\\\/todaysveterinarybusiness.com\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/02\\\/tvb-logo.png\",\"width\":258,\"height\":71,\"caption\":\"Today's Veterinary Business\"},\"image\":{\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/todaysveterinarybusiness\",\"https:\\\/\\\/x.com\\\/tvbpublication\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/todaysveterinarybusiness\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/navc.sitepreview.app\\\/todaysveterinarybusiness.com\\\/#\\\/schema\\\/person\\\/3dc590de4a6dd3fb22a90ecafc668b39\",\"name\":\"Ed Branam, DVM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/211c32d8b248199e28374f2da74197c24b5d7d987bb3f07b4ff58066eea2c30c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/211c32d8b248199e28374f2da74197c24b5d7d987bb3f07b4ff58066eea2c30c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/211c32d8b248199e28374f2da74197c24b5d7d987bb3f07b4ff58066eea2c30c?s=96&d=mm&r=g\",\"caption\":\"Ed Branam, DVM\"},\"sameAs\":[\"http:\\\/\\\/tvb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Hidden World of Cybercrime | Today&#039;s Veterinary Business","description":"Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Hidden World of Cybercrime","og_description":"Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.","og_url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/","og_site_name":"Today&#039;s Veterinary Business","article_publisher":"https:\/\/www.facebook.com\/todaysveterinarybusiness","article_published_time":"2023-12-01T05:00:47+00:00","og_image":[{"width":1024,"height":544,"url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Protect-and-Defend-1223.jpg","type":"image\/jpeg"}],"author":"Ed Branam, DVM","twitter_card":"summary_large_image","twitter_creator":"@tvbpublication","twitter_site":"@tvbpublication","twitter_misc":{"Written by":"Ed Branam, DVM","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#article","isPartOf":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/"},"author":{"name":"Ed Branam, DVM","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/person\/3dc590de4a6dd3fb22a90ecafc668b39"},"headline":"The Hidden World of Cybercrime","datePublished":"2023-12-01T05:00:47+00:00","mainEntityOfPage":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/"},"wordCount":835,"commentCount":0,"publisher":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#primaryimage"},"thumbnailUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Protect-and-Defend-1223.jpg","articleSection":["December 2023\/January 2024"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/","name":"The Hidden World of Cybercrime | Today&#039;s Veterinary Business","isPartOf":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#primaryimage"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#primaryimage"},"thumbnailUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Protect-and-Defend-1223.jpg","datePublished":"2023-12-01T05:00:47+00:00","description":"Poor network security can leave a veterinary practice\u2019s data and other assets vulnerable to theft and exploitation.","breadcrumb":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#primaryimage","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Protect-and-Defend-1223.jpg","contentUrl":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2023\/11\/Protect-and-Defend-1223.jpg","width":1024,"height":544,"caption":"Poorly designed software and applications might have security vulnerabilities or back doors that cybercriminals can use to compromise your data."},{"@type":"BreadcrumbList","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/cybercrime-security-protect-and-defend-1223\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/"},{"@type":"ListItem","position":2,"name":"The Hidden World of Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#website","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/","name":"Today&#039;s Veterinary Business","description":"Veterinary Business Magazine","publisher":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#organization","name":"Today's Veterinary Business","url":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/logo\/image\/","url":"https:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2022\/02\/tvb-logo.png","contentUrl":"https:\/\/todaysveterinarybusiness.com\/wp-content\/uploads\/sites\/2\/2022\/02\/tvb-logo.png","width":258,"height":71,"caption":"Today's Veterinary Business"},"image":{"@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/todaysveterinarybusiness","https:\/\/x.com\/tvbpublication","https:\/\/www.linkedin.com\/company\/todaysveterinarybusiness"]},{"@type":"Person","@id":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/#\/schema\/person\/3dc590de4a6dd3fb22a90ecafc668b39","name":"Ed Branam, DVM","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/211c32d8b248199e28374f2da74197c24b5d7d987bb3f07b4ff58066eea2c30c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/211c32d8b248199e28374f2da74197c24b5d7d987bb3f07b4ff58066eea2c30c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/211c32d8b248199e28374f2da74197c24b5d7d987bb3f07b4ff58066eea2c30c?s=96&d=mm&r=g","caption":"Ed Branam, DVM"},"sameAs":["http:\/\/tvb.com"]}]}},"_links":{"self":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/75370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/comments?post=75370"}],"version-history":[{"count":2,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/75370\/revisions"}],"predecessor-version":[{"id":75373,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/posts\/75370\/revisions\/75373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/media\/75371"}],"wp:attachment":[{"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/media?parent=75370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/categories?post=75370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/navc.sitepreview.app\/todaysveterinarybusiness.com\/wp-json\/wp\/v2\/tags?post=75370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}