{"id":25409,"date":"2019-03-26T15:03:15","date_gmt":"2019-03-26T13:03:15","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=25409"},"modified":"2025-08-22T12:48:48","modified_gmt":"2025-08-22T10:48:48","slug":"an-ongoing-project-a-cyber-risk-mitigation-strategy","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/","title":{"rendered":"An Ongoing Project: A Cyber Risk Mitigation Strategy"},"content":{"rendered":"\n<p>Why do business owners and stakeholders consider cybersecurity risk prevention to be a top priority above other operations?<sup>1<\/sup> A number of high profile data breaches in recent years, including the likes of British Airways and Facebook,<sup>2<\/sup> are proving that no one is safe from cyber attacks. With cybercrime damage costs expected to reach $6 trillion annually by 2021,<sup>3<\/sup> businesses of all sizes are rapidly taking countermeasures to contain risks through the implementation of cybersecurity strategies.<\/p>\n\n\n\n<h2>The true cost of a cyber attack<\/h2>\n\n\n\n<p>The damage of cybercrime can depend greatly on how resilient a company is and what cybersecurity strategy they have set in place.<\/p>\n\n\n\n<p>According to a study conducted by Ponemon Institute, the average cost of a successful <a href=\"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber attack<\/a> to an organisation can be as much as $5 million, or $301 per employee.<sup>4<\/sup> But dollars lost only accounts for the direct cost of a breach. The true costs can cut even deeper and some businesses never fully recover from a cyber attack.<\/p>\n\n\n\n<p>Here are four factors that influence the indirect costs of a breach:<\/p>\n\n\n\n<ol>\n<li><strong>Data loss<\/strong><br>According to recently collected data on cybersecurity, approximately 2.6 billion records were stolen, lost or exposed worldwide in 2017.<sup>5<\/sup> The loss of this information racks up much larger bills than just the initial data recovery, leading to potential fines, penalties, and litigation for a business.<\/li>\n<li><strong>Investor perception<\/strong><br>Once a breach happens, a sudden drop in a company\u2019s perceived value is likely to follow. Negative media coverage can fuel the \u201csell now\u201d groupthink, which could be the final nail in the coffin if your business is unable to stay afloat in the wake of an attack. This is especially true for smaller companies that don\u2019t have the infrastructure.<sup>6<\/sup><\/li>\n\n<img decoding=\"async\" class=\"show-for-medium\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT68-Q4_infographic_desktop__970_05-03-2019_01.png\" alt=\"average cost of a cyber attack\">\n<img decoding=\"async\" class=\"show-for-small-only\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT68-Q4_infographic_mobile__400px_05-03-2019_01.png\" alt=\"average cost of a cyber attack\" width=\"100%\">\n&nbsp;\n\n<li><strong>Reputation<\/strong><br>Companies don\u2019t only lose current customers following a cyber attack; a damaged brand reputation means they also lose the potential to gain new ones down the road. A company\u2019s brand is linked to all aspects of business, including growth and revenue. In fact, 85% of U.S. consumers are loyal to brands that safeguard and protect their personal information,<sup>7<\/sup> meaning a data breach can have serious implications for the future of your business.<\/li>\n<li><strong>Operational cost<\/strong><br>On top of loss of data, cybercriminals will sometimes focus their efforts on taking down a business\u2019 online operations through DDOS attacks, which can lead to loss of customers, and ultimately money.<sup>8<\/sup> This risk, in particular, is one that requires strategic resilience planning to overcome.<\/li>\n<\/ol>\n\n\n\n<h2>Mitigating attacks through cyber risk management<\/h2>\n\n\n\n<p>There are many ways an organisation can be deemed to be cyber resilient, but an important indicator is a deep understanding of cyber risk. This means going above and beyond IT considerations, by implementing cyber risk management into your overall business strategy.<sup>9<\/sup><\/p>\n\n\n\n<p>Organisations that have traditionally viewed cybersecurity as separate from other risks are now starting to see the bigger picture. Lori Bailey, Global Head of Cyber Risk at Zurich Insurance, says, \u201cThe goal should be to develop resilience and protection, because as cyber risks accumulate it becomes more difficult to anticipate them all.\u201d<sup>10<\/sup><\/p>\n\n\n\n<p>To manage risk, a company needs to assess the likelihood and potential effects of a cyber attack and then determine the best way of dealing with them. Not all risks can be entirely avoided, and no organisation has an unlimited budget or enough staff to completely secure their network. Instead, risk management is about handling the effects of uncertainty in a way that makes the most sense through an effective use of resources.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>The goal should be to develop resilience and protection, because as cyber risks accumulate it becomes more difficult to anticipate them all.<\/p><\/blockquote><\/figure>\n\n\n\n<p>Business leaders and security operations managers need to ensure they are working together to make the right decisions in different areas of the business in order to be successful. Keeping track of cybersecurity is no longer just an IT function. With the threat of cyber attacks becoming increasingly damaging to business operations, it\u2019s the responsibility of all departments to be vigilant.<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT68-Q4_infographic_desktop__970_05-03-2019_02.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT68-Q4_infographic_mobile__400px_05-03-2019_02.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<h2>Creating a cybersecurity culture<\/h2>\n\n\n\n<p>One of the most vulnerable areas for any organisation is its employees. According to IBM\u2018s annual X-Force Threat Intelligence Index 2018, human negligence remains the leading cause of data breaches, accounting for two-thirds of all the records compromised in 2017.<sup>11<\/sup><\/p>\n\n\n\n<p>Because of this, all employees are responsible for ensuring the network is kept safe. You could have the latest anti-virus technology, but inadvertent human error can still allow malicious software a way in.<\/p>\n\n\n\n<p>Focusing on fostering a strong cybersecurity culture could possibly be a better defence against cyber threats than any single technological policy. A cybersecurity culture intends to make information security considerations an integral part of an employee\u2019s daily life, and is only achieved by weaving cybersecurity through organisational procedures and practices, and maintaining active conversations with staff.<\/p>\n\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/11\/HAR_VPAL_black_variant.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/harvard-university\" target=\"_blank\" class=\"related-programme__school-name\">\n                HARVARD'S VPAL            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/courses\/us\/harvard-cybersecurity-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Cybersecurity: Managing Risk in the Information Age online short course            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<p>To ensure you follow best practice when it comes to your security, your plan should encompass the following:<\/p>\n\n\n\n<ul>\n<li>Establish a cybersecurity compliance standard and data use policy for all employees<sup>12<\/sup><\/li>\n<li>Recognise potential threats, and the many forms they come in like phishing and ransomware<sup>13<\/sup><\/li>\n<li>Keep your work secure by using passwords with at least six characters, one of which should be a special character and it should also include at least one capitalised letter. Update these passwords at least every 30 to 60 days<sup>14<\/sup><\/li>\n<li>Teach employees to detect and report suspicious behaviour<sup>15<\/sup><\/li>\n<\/ul>\n\n\n\n<h2>Key pointers: Strategising for cyber risk mitigation<\/h2>\n\n\n\n<p>Consider these procedures when creating your cyber mitigation strategy:<\/p>\n\n\n\n<ol>\n<li><strong>Do hardware assessments<\/strong><br>Ensure that your business only uses \u2018clean\u2019 hardware. Don\u2019t allow hardware that hasn\u2019t been scanned for a potentially dangerous virus. After which, an inventory of key assets, data, systems and infrastructure is essential to the business&#8217;s operations in order to track them.<sup>16<\/sup><\/li>\n<li><strong>Secure wireless networks<\/strong><br>Encrypt wireless networks that company data is on. Utilise stronger AES (Advanced Encryption Standard) encryption and a complex passphrase to provide better security from stronger attacks. Filter users\u2019 access to safe and necessary websites.<sup>17<\/sup> Block unverified websites and websites that allow illegal downloading and streaming.<\/li>\n<li><strong>Back up data<\/strong><br>All business data should be backed up. In the event of a breach, any lost data should be retrievable. Implement access control, limiting pertinent information on a need-to-know basis, to ensure privacy and protection.<sup>18<\/sup><\/li>\n<li><strong>Action software updates<\/strong><br>Cybercriminals are constantly evolving, so you have to prepare to be one step ahead. Make sure your software is as up-to-date as possible, to lessen the chances of a successful cyber attack.<sup>19<\/sup><\/li>\n<li><strong>Review insurance policies<\/strong><br>If all your hard efforts to prevent and stop data breaches still fail, cyber insurance should cover the business\u2019 liability.<sup>20<\/sup><\/li>\n<li><strong>Go threat hunting<\/strong><br>Companies should take further steps to prevent attacks by hiring cybersecurity professionals like ethical hackers, penetration testers, and threat investigators<sup>21<\/sup> to actively hunt for threats rather than only reactively defending their company data.<\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">In order to optimise your cyber risk mitigation strategy, you need to manage cyber breaches before, during and after they happen through a proactive approach. In a world of ever-evolving threats, making sure you, your network, and your staff have what it takes to stay secure in the face of an impending attack is fundamental to surviving in today\u2019s cyber landscape. <\/span><\/p>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n\n<li class=\"mb-4\"><sup>1<\/sup> Ashford,W. (Feb, 2019). \u2018IT Priorities 2019: Cyber security and risk management among top priorities for 2019\u2019. Retrieved from <a href=\"https:\/\/www.computerweekly.com\/news\/252457918\/IT-Priorities-2019-Cyber-security-and-risk-management-among-top-priorities-for-2019\" target=\"_blank\" rel=\"noopener noreferrer\"> Computer Weekly<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>2<\/sup> Leskin, P. (Dec, 2018). \u2018The 21 scariest data breaches of 2018\u2019. Retrieved from <a href=\"https:\/\/www.businessinsider.com\/data-hacks-breaches-biggest-of-2018-2018-12?IR=T\" target=\"_blank\" rel=\"noopener noreferrer\"> Business Insider<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>3<\/sup> (2017). \u2018Cybercrime damages $6 Trillion by 2021\u2018. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>4<\/sup> Crowe, J. (Feb 2018). \u201810 Must-Know Cybersecurity Statistics for 2018\u2019. Retrieved from <a href=\"https:\/\/blog.barkly.com\/2018-cybersecurity-statistics\" target=\"_blank\" rel=\"noopener noreferrer\"> Barkley<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>5<\/sup> Ismail, N. (Apr, 2018). \u2018Cyber security failings grow as 2.6BN records stolen or compromised in 2017\u2019. Retrieved from <a href=\"http:\/\/www.information-age.com\/2-5bn-records-stolen-compromised-in-2017-123471420\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Information Age<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>6<\/sup> Eubanks N. (Jul, 2017). \u2018The True Cost Of Cybercrime For Businesses\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/theyec\/2017\/07\/13\/the-true-cost-of-cybercrime-for-businesses\/#487cfa8d4947\" target=\"_blank\" rel=\"noopener noreferrer\"> Forbes<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>7<\/sup> (Feb, 2017). \u2018Organizations wasting billions on customer loyalty programs that don\u2019t work like they used to\u2019. Retrieved from <a href=\"https:\/\/newsroom.accenture.com\/news\/organizations-wasting-billions-on-customer-loyalty-programs-that-dont-work-like-they-used-to-accenture-strategy-study-finds.htm\" target=\"_blank\" rel=\"noopener noreferrer\"> Accenture<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>8<\/sup> Weisman, S. (Nd). \u2018What is a distributed denial of service attack (DDoS) and what can you do about them?\u2019. Retrieved from <a href=\"https:\/\/us.norton.com\/internetsecurity-emerging-threats-what-is-a-ddos-attack-30sectech-by-norton.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Norton<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>9<\/sup> Dobrygowski, D. (Jul, 2016). \u2018Cyber resilience: everything you (really) need to know\u2019. Retrieved from <a href=\"https:\/\/www.weforum.org\/agenda\/2016\/07\/cyber-resilience-what-to-know\/\" target=\"_blank\" rel=\"noopener noreferrer\"> World Economic Forum<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>10<\/sup> Bailey, L. (Apr, 2016). \u2018Cyber risks spill over into the physical world\u2018. Retrieved from <a href=\"https:\/\/www.zurich.com\/en\/knowledge\/articles\/2016\/04\/cyber-risks-spill-over-into-the-physical-world\" target=\"_blank\" rel=\"noopener noreferrer\"> Zurich<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>11<\/sup> (Mar, 2018). \u2018 IBM X-Force Threat Intelligence Index 2018\u2019. Retrieved from <a href=\"https:\/\/www-01.ibm.com\/common\/ssi\/cgi-bin\/ssialias?htmlfid=77014377USEN\" target=\"_blank\" rel=\"noopener noreferrer\"> IBM<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>12<\/sup> Hayslip, G. (Mar, 2018). \u20189 policies and procedures you need to know about if you\u2019re starting a new security program\u2019. Retrieved from <a href=\"https:\/\/www.csoonline.com\/article\/3263738\/data-protection\/9-policies-and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html\" target=\"_blank\" rel=\"noopener noreferrer\"> CS Online<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>13<\/sup> Rashid, F. (Oct, 2017). \u2018Types of phishing attacks and how to identify them\u2019. Retrieved from <a href=\"https:\/\/www.csoonline.com\/article\/3234716\/phishing\/types-of-phishing-attacks-and-how-to-identify-them.html\" target=\"_blank\" rel=\"noopener noreferrer\"> CS Online<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>14<\/sup> Jones, B. (Sep, 2017). \u2018How often do you really need to change your passwords?\u2019. Retrieved from <a href=\"https:\/\/www.psafe.com\/en\/blog\/often-need-change-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Psafe<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>15<\/sup> Cooper, C. (May, 2017). \u2018How to get your staff to take cybersecurity seriously\u2019. Retrieved from <a href=\"https:\/\/www.cnet.com\/how-to\/how-to-get-your-staff-to-take-cybersecurity-seriously\/\" target=\"_blank\" rel=\"noopener noreferrer\"> CNET<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>16<\/sup> Shein, M.D. (Jan, 2018). \u2018Mitigating cyber risk in 2018\u2019. Retrieved from <a href=\"http:\/\/www.rmmagazine.com\/2018\/01\/25\/mitigating-cyberrisk-in-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Risk management<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>17<\/sup> Woollven, C. (2017). \u20195 ways SMEs can mitigate cyber security risks\u2019. Retrieved from <a href=\"https:\/\/www.itgovernance.co.uk\/blog\/five-ways-smes-can-mitigate-cyber-security-risks\" target=\"_blank\" rel=\"noopener noreferrer\"> IT Governance<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>18<\/sup> Woollven, C. (2017). \u20195 ways SMEs can mitigate cyber security risks\u2019. Retrieved from <a href=\"https:\/\/www.itgovernance.co.uk\/blog\/five-ways-smes-can-mitigate-cyber-security-risks\" target=\"_blank\" rel=\"noopener noreferrer\"> IT Governance<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>19<\/sup> Woollven, C. (2017). \u20195 ways SMEs can mitigate cyber security risks\u2019. Retrieved from <a href=\"https:\/\/www.itgovernance.co.uk\/blog\/five-ways-smes-can-mitigate-cyber-security-risks\" target=\"_blank\" rel=\"noopener noreferrer\"> IT Governance<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>20<\/sup> (Nov, 2018). \u2018Cyber insurance and why you need it\u2019. Retrieved from <a href=\"https:\/\/www.itweb.co.za\/content\/4r1lyMRoVZ2qpmda\" target=\"_blank\" rel=\"noopener noreferrer\"> IT Web<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>21<\/sup> Nelson, N. (Mar, 2018). \u20187 Jobs you didn\u2019t know about in cyber security\u2019. Retrieved from <a href=\"https:\/\/woz-u.com\/7-jobs-you-didnt-know-about-in-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Woz-u<\/a>.<\/li>\n\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Why do business owners and stakeholders consider cybersecurity risk prevention to be a top priority above other operations?1 A number of high profile data breaches in recent years, including the likes of British Airways and Facebook,2 are proving that no one is safe from cyber attacks. With cybercrime damage costs expected to reach $6 trillion [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":40271,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[117],"tags":[122,120],"article-format":[],"class_list":["post-25409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-market-trends","tag-business-management","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Cyber Risk Mitigation Strategy | GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"Learn more on the different strategies to mitigate cybersecurity and why you should make this one of your top priority operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Ongoing Project: A Cyber Risk Mitigation Strategy\" \/>\n<meta property=\"og:description\" content=\"Learn more on the different strategies to mitigate cybersecurity and why you should make this one of your top priority operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-26T13:03:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-22T10:48:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/GetSmarter_An-Ongoing-Project_A-Cyber-Risk-Mitigation-Strategy_Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/#primaryimage\",\"url\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/GetSmarter_An-Ongoing-Project_A-Cyber-Risk-Mitigation-Strategy_Blog.jpg\",\"contentUrl\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/GetSmarter_An-Ongoing-Project_A-Cyber-Risk-Mitigation-Strategy_Blog.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.getsmarter.com\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Cyber Risk Mitigation Strategy | GetSmarter Blog","description":"Learn more on the different strategies to mitigate cybersecurity and why you should make this one of your top priority operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/","og_locale":"en_US","og_type":"article","og_title":"An Ongoing Project: A Cyber Risk Mitigation Strategy","og_description":"Learn more on the different strategies to mitigate cybersecurity and why you should make this one of your top priority operations.","og_url":"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/","og_site_name":"GetSmarter Blog","article_published_time":"2019-03-26T13:03:15+00:00","article_modified_time":"2025-08-22T10:48:48+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/GetSmarter_An-Ongoing-Project_A-Cyber-Risk-Mitigation-Strategy_Blog.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/GetSmarter_An-Ongoing-Project_A-Cyber-Risk-Mitigation-Strategy_Blog.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/GetSmarter_An-Ongoing-Project_A-Cyber-Risk-Mitigation-Strategy_Blog.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/an-ongoing-project-a-cyber-risk-mitigation-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/25409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=25409"}],"version-history":[{"count":50,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/25409\/revisions"}],"predecessor-version":[{"id":51520,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/25409\/revisions\/51520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/40271"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=25409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=25409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=25409"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=25409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}