{"id":16191,"date":"2018-09-17T12:54:32","date_gmt":"2018-09-17T12:54:32","guid":{"rendered":"https:\/\/mymediaboxstag.wpengine.com\/?p=16191"},"modified":"2026-02-02T16:41:08","modified_gmt":"2026-02-02T16:41:08","slug":"cybersecurity-for-business-leaders","status":"publish","type":"post","link":"https:\/\/www.mymediabox.com\/ja\/2018\/09\/17\/cybersecurity-for-business-leaders\/","title":{"rendered":"Cybersecurity For Business Leaders: Stop Easy Breaches"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p dir=\"ltr\"><img decoding=\"async\" class=\"alignleft wp-image-16193 size-200 lazyload\" data-src=\"https:\/\/mymediaboxstag.wpengine.com\/wp-content\/uploads\/2018\/09\/4d574e58-0f5c-4e7b-882a-af8365f9ea5b-200x141.jpeg\" alt=\"Cyber-security_MyMediabox\" width=\"200\" height=\"141\" data-srcset=\"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/09\/4d574e58-0f5c-4e7b-882a-af8365f9ea5b-200x141.jpeg 200w, https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/09\/4d574e58-0f5c-4e7b-882a-af8365f9ea5b-300x212.jpeg 300w, https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/09\/4d574e58-0f5c-4e7b-882a-af8365f9ea5b-400x283.jpeg 400w, https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/09\/4d574e58-0f5c-4e7b-882a-af8365f9ea5b.jpeg 600w\" data-sizes=\"(max-width: 200px) 100vw, 200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/141;\" \/><\/p>\n<p><i><span style=\"font-weight: 400;\">Guest written by Lauro Chavez, <\/span><\/i><i><span style=\"font-weight: 400;\">Managing Partner, Head of Cybersecurity Strategy &amp; Research, <\/span><\/i><a href=\"https:\/\/silentsector.com\/\" target=\"_blank\" rel=\"noopener\"><i><span style=\"font-weight: 400;\">Silent Sector Cyber<\/span><\/i><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Cybercrime<\/span><span style=\"font-weight: 400;\"> is here to stay. Neither technology, compliance frameworks, nor government regulation will <\/span><span style=\"font-weight: 400;\">protect businesses in today&#8217;s cyber threat landscape\u2014you must take vulnerability management into your own hands.<\/span><span style=\"font-weight: 400;\"> It is a fight we didn\u2019t choose<\/span><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\"> but <\/span><span style=\"font-weight: 400;\">one that<\/span><span style=\"font-weight: 400;\"> has forced business leaders to take new measures to protect their organizations and <\/span><span style=\"font-weight: 400;\">long-term value<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For executives and business leaders, cybersecurity for businesses remains a commonly misunderstood topic. This<\/span><span style=\"font-weight: 400;\"> lack of understanding often <\/span><span style=\"font-weight: 400;\">leads to<\/span><span style=\"font-weight: 400;\"> poor decisions <\/span><span style=\"font-weight: 400;\">that result<\/span><span style=\"font-weight: 400;\"> i<\/span><span style=\"font-weight: 400;\">n data privacy <\/span><span style=\"font-weight: 400;\">breaches, unexpected downtime, and loss of productivity<\/span><span style=\"font-weight: 400;\">. F<\/span><span style=\"font-weight: 400;\">ortunately, <\/span><span style=\"font-weight: 400;\">cybersecurity for business leaders doesn&#8217;t require a<\/span><span style=\"font-weight: 400;\"> techn<\/span><span style=\"font-weight: 400;\">ical <\/span><span style=\"font-weight: 400;\">background <\/span><span style=\"font-weight: 400;\">\u6216\u3044\u306f<\/span><span style=\"font-weight: 400;\"> years of trainin<\/span><span style=\"font-weight: 400;\">g t<\/span><span style=\"font-weight: 400;\">o start making better decisions and reduc<\/span><span style=\"font-weight: 400;\">ing<\/span><span style=\"font-weight: 400;\"> cyber <\/span><span style=\"font-weight: 400;\">risks<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we\u2019ll discuss emerging trends, provide guidance on how to oversee cybersecurity, and protect your business from cyber attacks.<\/span><\/p>\n<h2>Cyber Resilience Starts With Leadership<\/h2>\n<p><span style=\"font-weight: 400;\">Corporate executives and b<\/span><span style=\"font-weight: 400;\">usiness leaders must start by recognizing that cybersecurity <\/span><span style=\"font-weight: 400;\">strategy<\/span><span style=\"font-weight: 400;\"> is now a <\/span><span style=\"font-weight: 400;\">strategic imperative<\/span><span style=\"font-weight: 400;\"> for doing business. <\/span><span style=\"font-weight: 400;\">Senior l<\/span><span style=\"font-weight: 400;\">eaders should enable their IT organizations to <\/span><span style=\"font-weight: 400;\">ensure regulatory compliance, identify risks, and <\/span><span style=\"font-weight: 400;\">prepare for <\/span><span style=\"font-weight: 400;\">sophisticated cyber threats<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">This mindset forms the foundation of effective cybersecurity leadership and supports the development of a successful cybersecurity business plan.<\/span><\/p>\n<h2>It\u2019s Not About Being \u201cUn-hackable\u201d<\/h2>\n<p><span style=\"font-weight: 400;\">We must eliminate the idea that <\/span><i><span style=\"font-weight: 400;\">\u201cEverything is hackable, so why try to protect ourselves?\u201d<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">T<\/span><span style=\"font-weight: 400;\">he majority of risk comes from <\/span><span style=\"font-weight: 400;\">data breaches and <\/span><span style=\"font-weight: 400;\">cybercriminals seeking the quickest, easiest way to make money<\/span><span style=\"font-weight: 400;\">. C<\/span><span style=\"font-weight: 400;\">ybercriminals are looking for easy targets, the \u201clow-hanging fruit.\u201d Effective cybe<\/span><span style=\"font-weight: 400;\">rs<\/span><span style=\"font-weight: 400;\">ecurity <\/span><span style=\"font-weight: 400;\">for businesses<\/span><span style=\"font-weight: 400;\"> is not about being impenetrable<\/span><span style=\"font-weight: 400;\">. I<\/span><span style=\"font-weight: 400;\">t is about <\/span><span style=\"font-weight: 400;\">having the practical skills and security frameworks to be <\/span><span style=\"font-weight: 400;\">a harder target than others, causing cybercriminals to move on.<\/span><\/p>\n<h2>People and Processes Before Technology<\/h2>\n<p><span style=\"font-weight: 400;\">White emerging technologies like artificial intelligence may increase the number of cyber incidents; <\/span><span style=\"font-weight: 400;\">cybe<\/span><span style=\"font-weight: 400;\">rs<\/span><span style=\"font-weight: 400;\">ecurity is not just about technology<\/span><span style=\"font-weight: 400;\">, human error is a huge factor. P<\/span><span style=\"font-weight: 400;\">eople are the most vulnerable element<\/span><span style=\"font-weight: 400;\"> in your critical infrastructure<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">If you teach your employees to identify vulnerabilities, mitigate risks, and protect digital assets, you\u2019re already much better protected in today\u2019s cybersecurity landscape.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Effective processes<\/span><span style=\"font-weight: 400;\">,<\/span> <span style=\"font-weight: 400;\">high-level<\/span><span style=\"font-weight: 400;\"> awareness training<\/span><span style=\"font-weight: 400;\">, and practical response strategies<\/span> <span style=\"font-weight: 400;\">are the first step in an effective cybersecurity risk management practice.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h2>Maximize Existing Tools Before Investing in New Technologies<\/h2>\n<p><span style=\"font-weight: 400;\">Thousands of cybersecurity hardware and software solutions are on the market today<\/span><span style=\"font-weight: 400;\">. H<\/span><span style=\"font-weight: 400;\">owever, many organizations haven\u2019t maximized the security capabilities of the <\/span><span style=\"font-weight: 400;\">computer systems and other <\/span><span style=\"font-weight: 400;\">technologies they already <\/span><span style=\"font-weight: 400;\">use. Cyber professionals recommend first ensuring<\/span><span style=\"font-weight: 400;\"> you\u2019re getting the most out of your current technologies before spending time and budget on new solutions<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2>Cybersecurity Documentation is Fundamental<\/h2>\n<p><span style=\"font-weight: 400;\">The importance of documented and enforced <\/span><span style=\"font-weight: 400;\">digital<\/span><span style=\"font-weight: 400;\"> policies and <\/span><span style=\"font-weight: 400;\">cybersecurity best practices<\/span><span style=\"font-weight: 400;\"> cannot be overlooked. Cybe<\/span><span style=\"font-weight: 400;\">rs<\/span><span style=\"font-weight: 400;\">ecurity policy and procedure documentation <\/span><span style=\"font-weight: 400;\">demonstrates<\/span><span style=\"font-weight: 400;\"> to your employees and clients that your organization has <\/span><span style=\"font-weight: 400;\">considered<\/span><span style=\"font-weight: 400;\"> the risks and taken proactive security measures <\/span><span style=\"font-weight: 400;\">to mitigate potential cyberattacks.<\/span><\/p>\n<h2>Users are Guilty Until Proven Innocent<\/h2>\n<p><span style=\"font-weight: 400;\">Unfortunately, <\/span><span style=\"font-weight: 400;\">to ensure business resilience, <\/span><span style=\"font-weight: 400;\">we must treat the use of technology in a manner opposite <\/span><span style=\"font-weight: 400;\">to the approach of our<\/span><span style=\"font-weight: 400;\"> justice system<\/span><span style=\"font-weight: 400;\">. R<\/span><span style=\"font-weight: 400;\">ather than being innocent until proven guilty, technology users are treated as guilty until proven otherwise. Cybercriminals will continue to seek opportunities to inflict damage for profit, so we must always validate our users\u2019 identities and limit access to what is required to perform their specific roles and job function<\/span><span style=\"font-weight: 400;\">s t<\/span><span style=\"font-weight: 400;\">o prevent <\/span><span style=\"font-weight: 400;\">cyber threats and protect sensitive data<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While cybe<\/span><span style=\"font-weight: 400;\">rs<\/span><span style=\"font-weight: 400;\">ecurity <\/span><span style=\"font-weight: 400;\">culture<\/span><span style=\"font-weight: 400;\"> i<\/span><span style=\"font-weight: 400;\">s c<\/span><span style=\"font-weight: 400;\">omplex and often misunderstoo<\/span><span style=\"font-weight: 400;\">d,<\/span><span style=\"font-weight: 400;\"> the concepts we touched on above have helped thousands of business leaders make better decisions, reduce business risk, and even prevent catastrophic breaches.<\/span><\/p>\n<h2>\u30b5\u30a4\u30ec\u30f3\u30c8\u30bb\u30af\u30bf\u30fc\u306b\u3064\u3044\u3066<\/h2>\n<p><span style=\"font-weight: 400;\">Silent Sector is a cybe<\/span><span style=\"font-weight: 400;\">rs<\/span><span style=\"font-weight: 400;\">ecurity services firm providing resources and expertise to improve security posture and reduce risk. We are a <\/span><span style=\"font-weight: 400;\">U.S.-based<\/span><span style=\"font-weight: 400;\"> firm serving companies ranging from 50 to 5,000 employees across many industries. <\/span><span style=\"font-weight: 400;\">Our cybersecurity experts <\/span><span style=\"font-weight: 400;\">also provid<\/span><span style=\"font-weight: 400;\">e c<\/span><span style=\"font-weight: 400;\">ompliance support for a variety of needs, including NIST, PCI, HIPAA, SOX, and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact Silent Sector Cyber for a complimentary consultation at info@s3clabs.com or visit <\/span><a href=\"https:\/\/www.silentsector.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">our website<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":16061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[209],"tags":[],"class_list":["post-16191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity For Business Leaders: Stop Easy Breaches<\/title>\n<meta name=\"description\" content=\"Cybersecurity for business leaders starts with a mindset. Avoid \u201ceasy target\u201d mistakes and build practical processes that cut breach risk and downtime.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mymediabox.com\/ja\/2018\/09\/17\/cybersecurity-for-business-leaders\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity For Business Leaders: Stop Easy Breaches\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity for business leaders starts with a mindset. Avoid \u201ceasy target\u201d mistakes and build practical processes that cut breach risk and downtime.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mymediabox.com\/ja\/2018\/09\/17\/cybersecurity-for-business-leaders\/\" \/>\n<meta property=\"og:site_name\" content=\"MyMediabox\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/mymediabox?ref=sgm\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-17T12:54:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T16:41:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/07\/SECURITY-1024x724.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"724\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linda Hironaka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MyMediabox\" \/>\n<meta name=\"twitter:site\" content=\"@MyMediabox\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linda Hironaka\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/\"},\"author\":{\"name\":\"Linda Hironaka\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#\\\/schema\\\/person\\\/e9dee1eba5cef5c21294f1bc041cc764\"},\"headline\":\"Cybersecurity For Business Leaders: Stop Easy Breaches\",\"datePublished\":\"2018-09-17T12:54:32+00:00\",\"dateModified\":\"2026-02-02T16:41:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/\"},\"wordCount\":964,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mymediabox.com\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/SECURITY.jpeg\",\"articleSection\":[\"Mediabox News\"],\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/\",\"url\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/\",\"name\":\"Cybersecurity For Business Leaders: Stop Easy Breaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mymediabox.com\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/SECURITY.jpeg\",\"datePublished\":\"2018-09-17T12:54:32+00:00\",\"dateModified\":\"2026-02-02T16:41:08+00:00\",\"description\":\"Cybersecurity for business leaders starts with a mindset. Avoid \u201ceasy target\u201d mistakes and build practical processes that cut breach risk and downtime.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mymediabox.com\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/SECURITY.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.mymediabox.com\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/SECURITY.jpeg\",\"width\":4900,\"height\":3464,\"caption\":\"Online Security Technology background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/2018\\\/09\\\/17\\\/cybersecurity-for-business-leaders\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mymediabox.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity For Business Leaders: Stop Easy Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#website\",\"url\":\"https:\\\/\\\/www.mymediabox.com\\\/\",\"name\":\"MyMediabox\",\"description\":\"Online Solutions for Product Approvals, Brand Assurance and Digital Asset Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mymediabox.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#organization\",\"name\":\"MyMediabox\",\"url\":\"https:\\\/\\\/www.mymediabox.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mymediabox.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/mymediabox_logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mymediabox.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/mymediabox_logo.png\",\"width\":230,\"height\":75,\"caption\":\"MyMediabox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/mymediabox?ref=sgm\",\"https:\\\/\\\/x.com\\\/MyMediabox\",\"http:\\\/\\\/www.linkedin.com\\\/company\\\/1847290?trk=tyah\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mymediabox.com\\\/#\\\/schema\\\/person\\\/e9dee1eba5cef5c21294f1bc041cc764\",\"name\":\"Linda Hironaka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42803cf77c49b1dfa75b175a76b22e84eb594424d49c6e4d0ee6042f3f12220f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42803cf77c49b1dfa75b175a76b22e84eb594424d49c6e4d0ee6042f3f12220f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42803cf77c49b1dfa75b175a76b22e84eb594424d49c6e4d0ee6042f3f12220f?s=96&d=mm&r=g\",\"caption\":\"Linda Hironaka\"},\"url\":\"https:\\\/\\\/www.mymediabox.com\\\/ja\\\/author\\\/linda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity For Business Leaders: Stop Easy Breaches","description":"Cybersecurity for business leaders starts with a mindset. Avoid \u201ceasy target\u201d mistakes and build practical processes that cut breach risk and downtime.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mymediabox.com\/ja\/2018\/09\/17\/cybersecurity-for-business-leaders\/","og_locale":"ja_JP","og_type":"article","og_title":"Cybersecurity For Business Leaders: Stop Easy Breaches","og_description":"Cybersecurity for business leaders starts with a mindset. Avoid \u201ceasy target\u201d mistakes and build practical processes that cut breach risk and downtime.","og_url":"https:\/\/www.mymediabox.com\/ja\/2018\/09\/17\/cybersecurity-for-business-leaders\/","og_site_name":"MyMediabox","article_publisher":"http:\/\/www.facebook.com\/mymediabox?ref=sgm","article_published_time":"2018-09-17T12:54:32+00:00","article_modified_time":"2026-02-02T16:41:08+00:00","og_image":[{"width":1024,"height":724,"url":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/07\/SECURITY-1024x724.jpeg","type":"image\/jpeg"}],"author":"Linda Hironaka","twitter_card":"summary_large_image","twitter_creator":"@MyMediabox","twitter_site":"@MyMediabox","twitter_misc":{"\u57f7\u7b46\u8005":"Linda Hironaka","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#article","isPartOf":{"@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/"},"author":{"name":"Linda Hironaka","@id":"https:\/\/www.mymediabox.com\/#\/schema\/person\/e9dee1eba5cef5c21294f1bc041cc764"},"headline":"Cybersecurity For Business Leaders: Stop Easy Breaches","datePublished":"2018-09-17T12:54:32+00:00","dateModified":"2026-02-02T16:41:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/"},"wordCount":964,"commentCount":0,"publisher":{"@id":"https:\/\/www.mymediabox.com\/#organization"},"image":{"@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/07\/SECURITY.jpeg","articleSection":["Mediabox News"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/","url":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/","name":"Cybersecurity For Business Leaders: Stop Easy Breaches","isPartOf":{"@id":"https:\/\/www.mymediabox.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#primaryimage"},"image":{"@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/07\/SECURITY.jpeg","datePublished":"2018-09-17T12:54:32+00:00","dateModified":"2026-02-02T16:41:08+00:00","description":"Cybersecurity for business leaders starts with a mindset. Avoid \u201ceasy target\u201d mistakes and build practical processes that cut breach risk and downtime.","breadcrumb":{"@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#primaryimage","url":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/07\/SECURITY.jpeg","contentUrl":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2018\/07\/SECURITY.jpeg","width":4900,"height":3464,"caption":"Online Security Technology background"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mymediabox.com\/2018\/09\/17\/cybersecurity-for-business-leaders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mymediabox.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity For Business Leaders: Stop Easy Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.mymediabox.com\/#website","url":"https:\/\/www.mymediabox.com\/","name":"MyMediaBox","description":"\u88fd\u54c1\u627f\u8a8d\u3001\u30d6\u30e9\u30f3\u30c9\u4fdd\u8a3c\u3001\u30c7\u30b8\u30bf\u30eb\u8cc7\u7523\u7ba1\u7406\u306e\u305f\u3081\u306e\u30aa\u30f3\u30e9\u30a4\u30f3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3","publisher":{"@id":"https:\/\/www.mymediabox.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mymediabox.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.mymediabox.com\/#organization","name":"MyMediaBox","url":"https:\/\/www.mymediabox.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.mymediabox.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2017\/03\/mymediabox_logo.png","contentUrl":"https:\/\/www.mymediabox.com\/wp-content\/uploads\/2017\/03\/mymediabox_logo.png","width":230,"height":75,"caption":"MyMediabox"},"image":{"@id":"https:\/\/www.mymediabox.com\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/mymediabox?ref=sgm","https:\/\/x.com\/MyMediabox","http:\/\/www.linkedin.com\/company\/1847290?trk=tyah"]},{"@type":"Person","@id":"https:\/\/www.mymediabox.com\/#\/schema\/person\/e9dee1eba5cef5c21294f1bc041cc764","name":"\u5f18\u4e2d\u30ea\u30f3\u30c0","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/42803cf77c49b1dfa75b175a76b22e84eb594424d49c6e4d0ee6042f3f12220f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42803cf77c49b1dfa75b175a76b22e84eb594424d49c6e4d0ee6042f3f12220f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42803cf77c49b1dfa75b175a76b22e84eb594424d49c6e4d0ee6042f3f12220f?s=96&d=mm&r=g","caption":"Linda Hironaka"},"url":"https:\/\/www.mymediabox.com\/ja\/author\/linda\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/posts\/16191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/comments?post=16191"}],"version-history":[{"count":0,"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/posts\/16191\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/media\/16061"}],"wp:attachment":[{"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/media?parent=16191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/categories?post=16191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mymediabox.com\/ja\/wp-json\/wp\/v2\/tags?post=16191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}