{"id":164,"date":"2014-05-24T08:27:15","date_gmt":"2014-05-24T08:27:15","guid":{"rendered":"http:\/\/securitybydesign.de\/?p=164"},"modified":"2014-05-24T08:27:15","modified_gmt":"2014-05-24T08:27:15","slug":"nine-ways-to-bolster-data-security","status":"publish","type":"post","link":"https:\/\/securitybydesign.de\/?p=164","title":{"rendered":"Nine ways to bolster data security"},"content":{"rendered":"<p>I gave an interview at the first European AICPA Summit in Frankfurt. The result is an <a href=\"http:\/\/www.cgma.org\/Magazine\/News\/Pages\/201410172.aspx\">article<\/a> published in the Chartered Global Management Accountant online magazine with some advise how to improve\u00a0information security.<\/p>\n<div class=\"shariff\" data-title=\"Nine ways to bolster data security\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/securitybydesign.de\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"gftlx\" data-services='[\"googleplus\",\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"info\"]' data-image=\"\" data-url=\"https:\/\/securitybydesign.de\/?p=164\" data-lang=\"en\" data-theme=\"round\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>I gave an interview at the first European AICPA Summit in Frankfurt. The result is an article published in the Chartered Global Management Accountant online magazine with some advise how to improve\u00a0information security.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,2],"tags":[],"class_list":["post-164","post","type-post","status-publish","format-standard","hentry","category-it-security-technology","category-security-management"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=164"}],"version-history":[{"count":1,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/164\/revisions"}],"predecessor-version":[{"id":165,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=\/wp\/v2\/posts\/164\/revisions\/165"}],"wp:attachment":[{"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybydesign.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}