{"id":101,"date":"2016-11-09T16:08:48","date_gmt":"2016-11-09T16:08:48","guid":{"rendered":"https:\/\/mindtechltd.co.uk\/?p=101"},"modified":"2022-04-23T06:10:43","modified_gmt":"2022-04-23T06:10:43","slug":"protecting-your-privacy-in-public-wifi-networks","status":"publish","type":"post","link":"https:\/\/mindtechltd.co.uk\/?p=101","title":{"rendered":"A How-to Guide to Being Secure by Design"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-blend-mode: overlay;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p>In the first half of 2019, there was a\u00a054 percent increase in data breaches; big firms and small have contributed to those figures. This includes (breach size in brackets): Capital One (106 million), Suprema (27.8 million), and Facebook (419 million). We are now so accustomed to hearing about cybersecurity incidents that we are in danger of becoming desensitized. But every one of those exposed records represents an individual human being.<\/p>\n<p>The modern business is up against a perfect storm of sophisticated cybercrime methods, stringent data protection legislation, and ensuring they retain customer trust. This is all within a climate of digital transformation, the technologies of which can give an organisation a competitive edge.<\/p>\n<p>Any organisation would be forgiven for feeling like a rabbit in the headlights. But there is a way to have your digital cake and eat it. The discipline of \u2018Secure by Design\u2019 (SbD) is taking root in global organisations. By applying the principles of Secure by Design we give our businesses the ability to fight this perfect storm.<\/p>\n<p>Here, we will take a deeper look into what Secure by Design means and share some tips on achieving it.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:100% !important;margin-top : 0px;margin-bottom : 0px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 0px;margin-top : 0px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:calc( 1170px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-blend-mode: overlay;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\">@media only screen and (max-width:1024px) {.fusion-title.fusion-title-1{margin-top:0px!important; margin-right:0px!important;margin-bottom:31px!important;margin-left:0px!important;}}@media only screen and (max-width:640px) {.fusion-title.fusion-title-1{margin-top:0px!important; margin-right:0px!important;margin-bottom:20px!important; margin-left:0px!important;}}<\/style><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-four\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h4 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;color:var(--awb-color4);--fontSize:30;line-height:1.4;\">The Case for Secure by Design<\/h4><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>Back in the day, when the internet was but a twinkle in the eye of a server, security was much easier. The corporate firewall and antivirus software we used, worked well. It kept the malicious elements out; to propagate a virus across a network you had to do it using a floppy disk. Then the internet happened. It was like a dream come true for cybercriminals because it opened everything up. Email became the tool of choice of the cybercriminal. In fact, email is still a starting point for 90% of data breaches.<\/p>\n<p>Fast forward to 2020. We now have hyper-connectivity via the Internet of Things (IoT), mobile devices and apps, and edge computing. Cloud computing is ubiquitous across companies of all sizes and industries. The human-computer interface is more complex than it has ever been. The data matrix is so vast and has so many touchpoints, that it effectively offers a data feast to anyone wishing to dip in.<\/p>\n<p>To fit security into this complex matrix we have to be smart in our choices, we have to place security central to the design process itself. Security must be a design remit.<\/p>\n<p>The previous use of endpoint solutions such as antivirus software is no longer enough to stem the flow of data as it moves across myriad devices and connected infrastructures.<\/p>\n<p>Security is a holistic process. To retain control over the path of data, security must become an intrinsic aspect of a service or platform, from the human-touchpoint to the infrastructure it sits within.<\/p>\n<p>The only way to achieve this is to make sure that Secure by Design is placed as a central tenet whenever you design a product, take on a new system, or become part of a larger ecosystem.<\/p>\n<p>By using a Secure by Design approach, you can get security correct, from the start. A security-led design process will evolve into a Secure by Design end result. This will ultimately mitigate security threats and save a lot of hassle, and money, later on.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-1{width:100% !important;margin-top : 0px;margin-bottom : 0px;}.fusion-builder-column-1 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 0px;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 0px;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-1{width:100% !important;}.fusion-builder-column-1 > .fusion-column-wrapper {margin-right : 0px;margin-left : 0px;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-1{width:100% !important;}.fusion-builder-column-1 > .fusion-column-wrapper {margin-right : 0px;margin-left : 0px;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-2{ padding-top : 10px;margin-top : 0px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ffffff;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:calc( 1170px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-blend-mode: overlay;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\">@media only screen and (max-width:1024px) {.fusion-title.fusion-title-2{margin-top:0px!important; margin-right:0px!important;margin-bottom:31px!important;margin-left:0px!important;}}@media only screen and (max-width:640px) {.fusion-title.fusion-title-2{margin-top:0px!important; margin-right:0px!important;margin-bottom:20px!important; margin-left:0px!important;}}<\/style><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-four\" style=\"margin-top:0px;margin-right:0px;margin-bottom:31px;margin-left:0px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep-\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h4 class=\"title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;color:var(--awb-color4);--fontSize:30;line-height:1.4;\">5 Tips to be Secure by Design<\/h4><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep-\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\"><p>How do you add Secure by Design into the remit of a product or service? Firstly, Secure by Design is a process, not a point solution. It covers every aspect of the creation of a solution. The 5 tips below, give you a feel for using a Secure by Design process:<\/p>\n<p><b>1. Secure coding<\/b> \u2013 The application of secure coding techniques is a fundamental part of making a system secure. Flaws in code lead to vulnerabilities which lead to cybersecurity incidents. Make sure the product you develop or the one you buy in is built using secure coding practices. Check out OWASP\u2019s secure coding practices checklist.<\/p>\n<p><span style=\"color: #747474;\"><b>2. Embed the right protection<\/b><\/span> \u2013 Protective measures can be used across all layers of a system. There are a number of areas to consider, this gives you a flavour of some of them:<\/p>\n<p>Two-factor authentication (2FA): The use of a second factor to control access to a resource can help to mitigate malicious attacks such as phishing and non-malicious threats such as password sharing.<\/p>\n<p>Encryption: Data at rest and in transit should be protected using encryption. For example, database encryption and the use of secure transmission protocols, TLS\/SSL.<\/p>\n<p>Correct configuration: Data breaches are also caused by misconfiguration of cloud storage. Making sure that your cloud infrastructure is hardened against cyber-attacks is an essential security practise.<\/p>\n<p><b>3. Keep it Simple Simon (KISS)<\/b> \u2013 The first principle of security is KISS. Keep security as simple as possible; for example, only collect data you really need to collect, this reduces security overhead and help to meet the privacy principles of the General Data Protection Regulation (GDPR).<\/p>\n<p><b>4. Use the right protocols and implement them correctly<\/b> \u2013 The tech industry has developed some excellent open standards that offer robust security when implemented correctly. For example, the standard protocol OAuth 2.0, has been developed using threat models and with security as a core consideration. Similarly, the JSON Web Token (JWT) has been designed to use digital signatures to maintain integrity during sessions. JWT can also help with resistance to Cross-Site Request Forgery (CSRF) attacks if implemented correctly.<\/p>\n<p><b>5. Use a security-enhanced interface <\/b>\u2013 The human-computer touch-points can become a security gap if not properly designed. Good security starts with good usability, the balancing act needed for both is achievable with good design. It is often the simplest of UI ideas that can add the most security. For example, in the design of a credential recovery system, instead of revealing the existence of a live email account when account recovery is initiated, simply state that \u201cIf the account exists a reset link will be sent\u201d. Similarly, don\u2019t display your password policy on screen. If you let a cybercriminal know that your policy \u201cmust include a capital letter, a number, and a special character\u201d, this will help them to create a more successful brute force attack. Instead, follow the advice from the United States National Institute for Standards and Technology (NIST) on the matter, this includes, do not use rules to force the creation of a password and do not have on-screen password hints.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><div style=\"text-align:center;\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"518\" height=\"492\" title=\"cloud-1\" src=\"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2016\/11\/cloud-1.png\" alt class=\"img-responsive wp-image-673\"\/><\/span><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:15px;width:100%;\"><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-2{width:100% !important;margin-top : 0px;margin-bottom : 0px;}.fusion-builder-column-2 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 0px;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 0px;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-2{width:100% !important;}.fusion-builder-column-2 > .fusion-column-wrapper {margin-right : 0px;margin-left : 0px;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-2{width:100% !important;}.fusion-builder-column-2 > .fusion-column-wrapper {margin-right : 0px;margin-left : 0px;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-3{ padding-top : 0px;margin-top : 0px;padding-right : 0px;padding-bottom : 10px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first half of 2019, there was a 54 percent increase in data breaches; big firms and small have contributed to those figures. This includes (breach size in brackets): Capital One (106 million), Suprema (27.8 million), and Facebook (419 million). We are now so accustomed to hearing about cybersecurity incidents that we are in danger of becoming desensitized. But every one of those exposed&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1219,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A How-to Guide to Being Secure by Design - Mind Tech Consultancy LTD<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mindtechltd.co.uk\/?p=101\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A How-to Guide to Being Secure by Design - Mind Tech Consultancy LTD\" \/>\n<meta property=\"og:description\" content=\"In the first half of 2019, there was a 54 percent increase in data breaches; big firms and small have contributed to those figures. This includes (breach size in brackets): Capital One (106 million), Suprema (27.8 million), and Facebook (419 million). We are now so accustomed to hearing about cybersecurity incidents that we are in danger of becoming desensitized. But every one of those exposed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mindtechltd.co.uk\/?p=101\" \/>\n<meta property=\"og:site_name\" content=\"Mind Tech Consultancy LTD\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-09T16:08:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-23T06:10:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2022\/03\/AI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"618\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/#\\\/schema\\\/person\\\/dd00a958ff6cfab9ad57bcac78bc31bb\"},\"headline\":\"A How-to Guide to Being Secure by Design\",\"datePublished\":\"2016-11-09T16:08:48+00:00\",\"dateModified\":\"2022-04-23T06:10:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101\"},\"wordCount\":1670,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mindtechltd.co.uk\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/AI.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101\",\"url\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101\",\"name\":\"A How-to Guide to Being Secure by Design - Mind Tech Consultancy LTD\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mindtechltd.co.uk\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/AI.jpg\",\"datePublished\":\"2016-11-09T16:08:48+00:00\",\"dateModified\":\"2022-04-23T06:10:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/#\\\/schema\\\/person\\\/dd00a958ff6cfab9ad57bcac78bc31bb\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#primaryimage\",\"url\":\"https:\\\/\\\/mindtechltd.co.uk\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/AI.jpg\",\"contentUrl\":\"https:\\\/\\\/mindtechltd.co.uk\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/AI.jpg\",\"width\":1000,\"height\":618},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?p=101#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mindtechltd.co.uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A How-to Guide to Being Secure by Design\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/#website\",\"url\":\"https:\\\/\\\/mindtechltd.co.uk\\\/\",\"name\":\"Mind Tech Consultancy LTD\",\"description\":\"Mind Tech Consultancy LTD\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mindtechltd.co.uk\\\/#\\\/schema\\\/person\\\/dd00a958ff6cfab9ad57bcac78bc31bb\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/158fb15f78b83c37e8324406db49544b21b73d4e9c1372ce20e29ea3ec835fd6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/158fb15f78b83c37e8324406db49544b21b73d4e9c1372ce20e29ea3ec835fd6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/158fb15f78b83c37e8324406db49544b21b73d4e9c1372ce20e29ea3ec835fd6?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/mindtechltd.co.uk\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A How-to Guide to Being Secure by Design - Mind Tech Consultancy LTD","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mindtechltd.co.uk\/?p=101","og_locale":"en_US","og_type":"article","og_title":"A How-to Guide to Being Secure by Design - Mind Tech Consultancy LTD","og_description":"In the first half of 2019, there was a 54 percent increase in data breaches; big firms and small have contributed to those figures. This includes (breach size in brackets): Capital One (106 million), Suprema (27.8 million), and Facebook (419 million). We are now so accustomed to hearing about cybersecurity incidents that we are in danger of becoming desensitized. But every one of those exposed...","og_url":"https:\/\/mindtechltd.co.uk\/?p=101","og_site_name":"Mind Tech Consultancy LTD","article_published_time":"2016-11-09T16:08:48+00:00","article_modified_time":"2022-04-23T06:10:43+00:00","og_image":[{"width":1000,"height":618,"url":"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2022\/03\/AI.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mindtechltd.co.uk\/?p=101#article","isPartOf":{"@id":"https:\/\/mindtechltd.co.uk\/?p=101"},"author":{"name":"admin","@id":"https:\/\/mindtechltd.co.uk\/#\/schema\/person\/dd00a958ff6cfab9ad57bcac78bc31bb"},"headline":"A How-to Guide to Being Secure by Design","datePublished":"2016-11-09T16:08:48+00:00","dateModified":"2022-04-23T06:10:43+00:00","mainEntityOfPage":{"@id":"https:\/\/mindtechltd.co.uk\/?p=101"},"wordCount":1670,"commentCount":0,"image":{"@id":"https:\/\/mindtechltd.co.uk\/?p=101#primaryimage"},"thumbnailUrl":"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2022\/03\/AI.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mindtechltd.co.uk\/?p=101#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mindtechltd.co.uk\/?p=101","url":"https:\/\/mindtechltd.co.uk\/?p=101","name":"A How-to Guide to Being Secure by Design - Mind Tech Consultancy LTD","isPartOf":{"@id":"https:\/\/mindtechltd.co.uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mindtechltd.co.uk\/?p=101#primaryimage"},"image":{"@id":"https:\/\/mindtechltd.co.uk\/?p=101#primaryimage"},"thumbnailUrl":"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2022\/03\/AI.jpg","datePublished":"2016-11-09T16:08:48+00:00","dateModified":"2022-04-23T06:10:43+00:00","author":{"@id":"https:\/\/mindtechltd.co.uk\/#\/schema\/person\/dd00a958ff6cfab9ad57bcac78bc31bb"},"breadcrumb":{"@id":"https:\/\/mindtechltd.co.uk\/?p=101#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mindtechltd.co.uk\/?p=101"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mindtechltd.co.uk\/?p=101#primaryimage","url":"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2022\/03\/AI.jpg","contentUrl":"https:\/\/mindtechltd.co.uk\/wp-content\/uploads\/2022\/03\/AI.jpg","width":1000,"height":618},{"@type":"BreadcrumbList","@id":"https:\/\/mindtechltd.co.uk\/?p=101#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mindtechltd.co.uk\/"},{"@type":"ListItem","position":2,"name":"A How-to Guide to Being Secure by Design"}]},{"@type":"WebSite","@id":"https:\/\/mindtechltd.co.uk\/#website","url":"https:\/\/mindtechltd.co.uk\/","name":"Mind Tech Consultancy LTD","description":"Mind Tech Consultancy LTD","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mindtechltd.co.uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mindtechltd.co.uk\/#\/schema\/person\/dd00a958ff6cfab9ad57bcac78bc31bb","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/158fb15f78b83c37e8324406db49544b21b73d4e9c1372ce20e29ea3ec835fd6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/158fb15f78b83c37e8324406db49544b21b73d4e9c1372ce20e29ea3ec835fd6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/158fb15f78b83c37e8324406db49544b21b73d4e9c1372ce20e29ea3ec835fd6?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/mindtechltd.co.uk\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=101"}],"version-history":[{"count":25,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/101\/revisions"}],"predecessor-version":[{"id":1548,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/101\/revisions\/1548"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=\/wp\/v2\/media\/1219"}],"wp:attachment":[{"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mindtechltd.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}