{"id":10338,"date":"2020-07-28T14:30:47","date_gmt":"2020-07-28T18:30:47","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=10338"},"modified":"2024-01-23T14:20:37","modified_gmt":"2024-01-23T19:20:37","slug":"ways-to-learn-more-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/","title":{"rendered":"6 Ways to Learn More About Cyber Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"400\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png\" alt=\"Learn about cybersecurity | InMotion Hosting\" class=\"wp-image-10344 skip_lazy\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png 730w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security-300x164.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security-560x307.png 560w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/figure>\n\n\n\n<p>Since cyber attacks have become more frequent within recent years, a strong cybersecurity posture has become an <a href=\"https:\/\/www.inmotionhosting.com\/blog\/5-ways-to-improve-your-branding\/\">important part of branding<\/a> and marketing products. Cybersecurity isn&#8217;t as easy to ignore as user experience (UX) for ease of use or accessibility for disabled users. Reminders that cyber attacks are real, frequent, and devastating for all victims are constant, sometimes to a point where we&#8217;re desensitized to the subject.<\/p>\n\n\n\n<p>We see the phrases \u201ccybersecurity,\u201d \u201chacked,\u201d \u201cinformation security (INFOSEC),\u201d and \u201cinformation assurance (IA)\u201d on a regular basis these days.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>A company&#8217;s confidential database of personally identifiable information (PII) or personal health information (PHI) has been hacked.<\/em><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>X amount of websites built with this version of the Z CMS are vulnerable to this newly discovered flaw.<\/em><\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>This brand&#8217;s small office \/ home office (SOHO) routers are using severely outdated firmware which impose a great risk to cybersecurity efforts.<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>I usually see \u201cINFOSEC\u201d and \u201cIA\u201d associated with government and training, but I&#8217;ve made my point. We hear and read about it a lot. Our most used software (e.g. web browsers and email clients) have more native integrity and authentication features now. Popular content management systems (CMS) including WordPress and Drupal are doing more to make it easier to secure online content and protect visitors.<\/p>\n\n\n\n<p>We&#8217;ve covered ways to <a href=\"https:\/\/www.inmotionhosting.com\/blog\/6-ways-to-secure-your-web-activity-from-your-computer\/\">secure your computer and web activity<\/a> for home users. We&#8217;ve also covered the <a href=\"https:\/\/www.inmotionhosting.com\/blog\/the-basics-of-cybersecurity-for-website-owners\/\">basics of website security<\/a> and <a href=\"https:\/\/www.inmotionhosting.com\/blog\/5-web-hosting-new-years-resolutions-for-2020\/\">new ways to enhance your website<\/a>. Below we cover six ways you can stay up to date on the world of cybersecurity.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#news\">News sites<\/a><\/li>\n\n\n\n<li><a href=\"#training\">Training<\/a><\/li>\n\n\n\n<li><a href=\"#test\">Test your systems<\/a><\/li>\n\n\n\n<li><a href=\"#changelog\">Read changelogs<\/a><\/li>\n\n\n\n<li><a href=\"#harden\">Server hardening guides<\/a><\/li>\n\n\n\n<li><a href=\"#dbir\">Verizon&#8217;s DBIR<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"news\">1. Cybersecurity News Sites<\/h2>\n\n\n\n<p>Many times, news reports of cyber attacks will include general information about <em>what<\/em> happened, <em>when<\/em>, and <em>where<\/em>. The <em>how<\/em>, <em>why<\/em> and <em>who<\/em> is usually omitted, quickly glossed over, or suggested to support a current political situation. But each of those aspects are equally important.<\/p>\n\n\n\n<p><strong>How<\/strong> helps us understand what we can do to better secure our systems and network. Is there a new, convincing phishing email we need to train users to spot (e.g. <a href=\"https:\/\/www.inmotionhosting.com\/support\/email\/scam-email-on-this-day-i-hacked-your-os\/\">On this day&#8230;<\/a>)? Is there a new <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/wordpress\/wordpress-vulnerabilities-wpscan\/\">WordPress vulnerability<\/a> being exploited on outdated sites?<\/p>\n\n\n\n<p><strong>Why<\/strong> can tell us how likely we are to be targeted with the same attack. Is it a business email compromise (BEC) attack for financial gain? Or was the goal to sabotage the brand&#8217;s reputation to help a competitor?<\/p>\n\n\n\n<p><strong>Who<\/strong> reminds us to audit access control lists (ACLs) and that insider threats (e.g. disgruntled users) can have devastating consequences on an organization.<\/p>\n\n\n\n<p>Moving past cyber attacks, it&#8217;s always great to learn about new security tools for your website and online work like <a href=\"https:\/\/www.inmotionhosting.com\/support\/product-guides\/vps-hosting\/dnssec-managed-vps-dedicated\/\">Domain Name System Security Extensions (DNSSEC)<\/a> and <a href=\"https:\/\/www.inmotionhosting.com\/support\/security\/dns-over-https-encrypted-sni-in-firefox\/\">DNS-over-HTTPS (DoH)<\/a>. These two features were added to the Firefox browser months ago, but you can&#8217;t take advantage of functions you don&#8217;t know exist.<\/p>\n\n\n\n<p>For more detailed, actionable cybersecurity news and advice, follow some of the following via social media and RSS feeds:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.darkreading.com\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Dark Reading<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/thehackernews.com\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Hacker News<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Krebs on Security<\/a><\/li>\n\n\n\n<li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/scotthelme.co.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Scott Helme<\/a> (from the creator of <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/securityheaders.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">SecurityHeaders.com<\/a>)<\/li>\n\n\n\n<li><a href=\"https:\/\/threatpost.com\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Threatpost<\/a><\/li>\n\n\n\n<li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.troyhunt.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Troy Hunt<\/a> (from the creator of <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">HaveiBeenPwned.com<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Many such platforms also cover news on PII \/ PHI violations and data privacy laws.<\/p>\n\n\n\n<p class=\"alert alert-info\">Is your e-commerce website compliant with <a href=\"https:\/\/www.inmotionhosting.com\/privacy\/gdpr-compliance\/\">General Data Protection Regulation (GDPR)<\/a> and <a href=\"https:\/\/www.inmotionhosting.com\/privacy\/ccpa-compliance\/\">California Consumer Privacy Act (CCPA)<\/a>?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"training\">2. Cybersecurity Training<\/h2>\n\n\n\n<p>Information is great. Knowing how to put that information to good use within your home and business networks is better. It&#8217;s not enough to have a firewall, use strong passwords, backup regularly, and update in a timely fashion. There are best practices and hardening guides for systems and software suites (more on that later). And I don&#8217;t think we talk enough about the importance of <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cpanel\/cpanel-logs-for-access-apache-email-error-ftp-mysql-whm\/\">reading logs<\/a>.<\/p>\n\n\n\n<p>Recurring cybersecurity training isn&#8217;t just for IT and cybersecurity specialists. Like customer service, cybersecurity is everyone&#8217;s job.<\/p>\n\n\n\n<p>Senior managers and chief (C-level) executives need to understand why and how supporting cybersecurity improvements affects their return of investment (ROI).<\/p>\n\n\n\n<p>All users need quarterly <a href=\"https:\/\/public.cyber.mil\/cyber-training\/training-catalog\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">cybersecurity awareness training<\/a> including safe web browsing practices and how to spot phishing.<\/p>\n\n\n\n<p>Many of the places I recommend for <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.inmotionhosting.com\/blog\/5-free-ways-to-learn-linux\/\" target=\"_blank\" rel=\"noreferrer noopener\">learning how to use Linux<\/a> (especially <a href=\"https:\/\/www.inmotionhosting.com\/blog\/5-free-ways-to-learn-linux\/\">Cybrary.it<\/a>) are also good sources for cybersecurity training. US military veterans can also use <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/niccs.us-cert.gov\/training\/federal-virtual-training-environment-fedvte\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Virtual Training (FedVTE)<\/a> to apply continuing education units (CEUs) towards industry certifications such as CompTIA Security+.<\/p>\n\n\n\n<p>US military veterans can also train for industry certifications with the <a href=\"https:\/\/ivmf.syracuse.edu\/programs\/career-training\/learning-pathways\/?q=\/programs\/career-training\/concentrations\/&amp;\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Onward to Opportunity (O2O) initiative by Institute of Military Veterans (IVMF)<\/a>.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.kali.org\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Kali Linux<\/a> is a free operating system filled with penetration testing (pentesting) and <a href=\"https:\/\/www.kali.org\/penetration-testing-with-kali-linux\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">training content<\/a> for learning while you&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"test\">3. Test Your Systems<\/h2>\n\n\n\n<p>Many popular cybersecurity tools for vulnerability and pentesting are free. Cybersecurity and IT specialists reap some advantages from this. Primarily, we&#8217;re able to test and fix our systems before cyber attackers can exploit them.<\/p>\n\n\n\n<p>Linux Kali is one of a long list of free, popular cybersecurity testing software:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.metasploit.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Metasploit<\/a> &#8211; Vulnerability scanner<\/li>\n\n\n\n<li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.inmotionhosting.com\/support\/server\/ssh\/port-scan-with-nmap\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nmap<\/a> &#8211; Port scanner<\/li>\n\n\n\n<li><a aria-label=\" (opens in a new tab)\" class=\"rank-math-link\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/install-splunk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Splunk<\/a> &#8211; Security Information and Event Management (SIEM) software<\/li>\n\n\n\n<li><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/wordpress\/wordpress-vulnerabilities-wpscan\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPScan<\/a> &#8211; WordPress website scanner<\/li>\n<\/ul>\n\n\n\n<p>And again, don&#8217;t forget to check <a href=\"https:\/\/www.inmotionhosting.com\/support\/edu\/cpanel\/cpanel-logs-for-access-apache-email-error-ftp-mysql-whm\/\">server logs<\/a> and <a href=\"https:\/\/www.inmotionhosting.com\/support\/website\/analytics\/choose-the-best-analytics-tool\/\">web analytics software<\/a> for malicious activity.<\/p>\n\n\n\n<p class=\"alert alert-info\">The ability to only have what you want installed is why I prefer non-cPanel, <a href=\"https:\/\/www.inmotionhosting.com\/cloud-vps\">Cloud Server Hosting<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"changelog\">4. Read Changelogs<\/h2>\n\n\n\n<p>Changelogs explain the reason behind software updates. They&#8217;re usually filled with straight-forward statements about how each update addresses vulnerabilities, bugs, UX improvements, and compatibility with other software. A lot of software you use daily have changelogs publicly available online: <a href=\"https:\/\/documentation.cpanel.net\/display\/CL\/Change+Logs\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">cPanel<\/a>, <a href=\"https:\/\/codex.wordpress.org\/WordPress_Versions\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">WordPress<\/a>, <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/releases\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Firefox<\/a>, etc.<\/p>\n\n\n\n<p>Similar to reading cybersecurity news for cybersecurity specialists, changelogs can alert you to new features that may help your workflow or security posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"harden\">5. Server Hardening Guides<\/h2>\n\n\n\n<p>There are many reputable guides on best practices on securing systems for different uses. You can search for \u201cINFOSEC guides\u201d or \u201cIA guides\u201d in any search engine to start. <a href=\"https:\/\/www.inmotionhosting.com\/support\/news\/search-with-duckduckgo\/\">I prefer DuckDuckGo<\/a>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/nvd.nist.gov\/800-53\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">National Institute of Standards and Technology (NIST) Special Publications 800-53<\/a> assist IT professionals working to secure business networks.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.pcisecuritystandards.org\/document_library\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Payment Card Industry Data Security Standard (PCI-DSS)<\/a> for e-commerce website owners<\/li>\n\n\n\n<li>There are many guides and plugins for improving security and how to make CMSs GDPR and CCPA compliant<\/li>\n<\/ul>\n\n\n\n<p class=\"alert alert-info\">Get started with our guide on how to <a href=\"https:\/\/www.inmotionhosting.com\/support\/product-guides\/vps-hosting\/ways-to-harden-your-vps-hosting\/\">harden cPanel-managed VPS Hosting<\/a>. Guides for other web hosting products coming soon.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"dbir\">6. Read Verizon&#8217;s Data Breach Investigation Report (DBIR)<\/h2>\n\n\n\n<p><a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon\u2019s 2020 Data Breach Investigation Report (DBIR)<\/a> analyzes reported cyber intrusions to help us better understand how to protect our networks. It&#8217;s a long read (over 100 pages) but well worth it, even if you only skim the graphs first.<\/p>\n\n\n\n<p>Where do you go to learn about cybersecurity? Let us know below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since cyber attacks have become more frequent within recent years, a strong cybersecurity posture has become an important part of branding and marketing products. Cybersecurity isn&#8217;t as easy to ignore as user experience (UX) for ease of use or accessibility for disabled users. Reminders that cyber attacks are real, frequent, and devastating for all victims<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/\"> Read More ><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[371],"tags":[],"class_list":["post-10338","post","type-post","status-publish","format-standard","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Ways to Learn About Cyber Security<\/title>\n<meta name=\"description\" content=\"A strong cybersecurity posture has become an important part of branding and marketing products. Learn how to stay up to date on the latest in cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ways to Learn About Cyber Security\" \/>\n<meta property=\"og:description\" content=\"A strong cybersecurity posture has become an important part of branding and marketing products. Learn how to stay up to date on the latest in cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T18:30:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-23T19:20:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png\" \/>\n<meta name=\"author\" content=\"InMotion Hosting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Ways to Learn About Cyber Security","description":"A strong cybersecurity posture has become an important part of branding and marketing products. Learn how to stay up to date on the latest in cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"6 Ways to Learn About Cyber Security","og_description":"A strong cybersecurity posture has become an important part of branding and marketing products. Learn how to stay up to date on the latest in cybersecurity.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2020-07-28T18:30:47+00:00","article_modified_time":"2024-01-23T19:20:37+00:00","og_image":[{"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png","type":"","width":"","height":""}],"author":"InMotion Hosting","twitter_card":"summary_large_image","twitter_creator":"@inmotionhosting","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"InMotion Hosting","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/"},"author":{"name":"InMotion Hosting","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc"},"headline":"6 Ways to Learn More About Cyber Security","datePublished":"2020-07-28T18:30:47+00:00","dateModified":"2024-01-23T19:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/"},"wordCount":1118,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/","url":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/","name":"6 Ways to Learn About Cyber Security","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png","datePublished":"2020-07-28T18:30:47+00:00","dateModified":"2024-01-23T19:20:37+00:00","description":"A strong cybersecurity posture has become an important part of branding and marketing products. Learn how to stay up to date on the latest in cybersecurity.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2020\/07\/cyber_security.png","width":730,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/ways-to-learn-more-about-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},{"@type":"ListItem","position":3,"name":"6 Ways to Learn More About Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/f21a89c83c7697a760c96cfe58e646bc","name":"InMotion Hosting","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb965eada0c0513dd2e1976b21fe270fa4f19ac273960fc080f9d46b81b353a4?s=96&r=g","caption":"InMotion Hosting"},"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/imhmainadmin\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":371,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/blog\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/10338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=10338"}],"version-history":[{"count":8,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/10338\/revisions"}],"predecessor-version":[{"id":72964,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/10338\/revisions\/72964"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=10338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=10338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=10338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}