{"id":1424,"date":"2014-01-15T08:37:33","date_gmt":"2014-01-15T14:37:33","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1424"},"modified":"2015-04-24T16:45:19","modified_gmt":"2015-04-24T21:45:19","slug":"2014-security-threats-cybercrime-what-business-should-know","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/2014-security-threats-cybercrime-what-business-should-know\/","title":{"rendered":"2014 Security Threats &#038; the Impact of Cybercrime"},"content":{"rendered":"<p>\n\t<span style=\"font-family:verdana,geneva,sans-serif;\"><span style=\"font-size: 16px;\">The cost of cybercrime, mobile threats on the rise, Zero Day threats\u2026what every business needs to know.<\/span><\/span>\n<\/p>\n<p>\n\t<iframe loading=\"lazy\" height=\"486\" iframe=\"\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/29975604?rel=0\" width=\"597\"><\/iframe>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\t<a href=\"https:\/\/www.slideshare.net\/poweradmin\/security-2014-threats-for-slide-share\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Read More: Impacts of Cybercrime 2014\" class=\"size-full wp-image-1397 alignnone\" height=\"40\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/read-more.png\" style=\"\" title=\"Read More: Impacts of Cybercrime 2014\" width=\"160\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\n<\/p>\n<p>\n\t\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cost of cybercrime, mobile threats on the rise, Zero Day threats\u2026what every business needs to know. \u00a0 \u00a0<\/p>\n","protected":false},"author":2,"featured_media":1449,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,10,8],"tags":[],"class_list":["post-1424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-power-admin","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1424"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1424\/revisions"}],"predecessor-version":[{"id":3540,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1424\/revisions\/3540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1449"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}