{"id":48152,"date":"2013-05-15T16:55:49","date_gmt":"2013-05-15T08:55:49","guid":{"rendered":"http:\/\/techielobang.com\/blog\/?p=48152"},"modified":"2013-05-15T17:54:57","modified_gmt":"2013-05-15T09:54:57","slug":"infographic-7-cybersecurity-myths-busted","status":"publish","type":"post","link":"https:\/\/techielobang.com\/blog\/2013\/05\/15\/infographic-7-cybersecurity-myths-busted\/","title":{"rendered":"Infographic: 7 Cybersecurity Myths Busted"},"content":{"rendered":"<p>Here is an infographic from Symantec. It tells you about myths on cybersecurity. Some of you may have already know them. But it is good to read them again, especially social media sites are good targets.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"48153\" data-permalink=\"https:\/\/techielobang.com\/blog\/2013\/05\/15\/infographic-7-cybersecurity-myths-busted\/istr-18-infographic_mini\/\" data-orig-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_mini.jpg?fit=600%2C2090&amp;ssl=1\" data-orig-size=\"600,2090\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"ISTR 18 Infographic_mini\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_mini.jpg?fit=86%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_mini.jpg?fit=293%2C1024&amp;ssl=1\" class=\"aligncenter size-full wp-image-48153\" alt=\"ISTR 18 Infographic_mini\" src=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_mini.jpg?resize=600%2C2090\" width=\"600\" height=\"2090\" srcset=\"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_mini.jpg?w=600&amp;ssl=1 600w, https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_mini.jpg?resize=86%2C300&amp;ssl=1 86w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is an infographic from Symantec. It tells you about myths on cybersecurity. Some of you may have already know them. But it is good to read them again..<\/p>\n","protected":false},"author":1,"featured_media":48154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[98,1509,5,3181,14],"tags":[1874,2294,10590,10589,236,4357,15947,6874,10591,1961,2127,767],"class_list":["post-48152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer","category-featured","category-mobile","category-social","category-techie","tag-anti-virus","tag-antivirus","tag-cybersecurity","tag-cyberspace","tag-fake","tag-featured-2","tag-infographic","tag-malicious","tag-myth","tag-security","tag-social-media","tag-symantec"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techielobang.com\/blog\/wp-content\/uploads\/2013\/05\/ISTR-18-Infographic_hd.jpg?fit=600%2C377&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8YKZ-cwE","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/48152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/comments?post=48152"}],"version-history":[{"count":3,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/48152\/revisions"}],"predecessor-version":[{"id":48157,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/posts\/48152\/revisions\/48157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media\/48154"}],"wp:attachment":[{"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/media?parent=48152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/categories?post=48152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techielobang.com\/blog\/wp-json\/wp\/v2\/tags?post=48152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}