{"id":43029,"date":"2020-05-26T20:50:00","date_gmt":"2020-05-26T20:50:00","guid":{"rendered":"http:\/\/sticky-highjinx.flywheelsites.com\/?p=43029"},"modified":"2025-03-04T01:04:06","modified_gmt":"2025-03-04T06:04:06","slug":"covid-19-mitigate-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/","title":{"rendered":"COVID-19: Mitigate Cybersecurity Threats"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 3<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<h2 class=\"wp-block-heading\" id=\"h-the-coronavirus-and-cybersecurity-how-to-reduce-cyber-attacks\">The Coronavirus and Cybersecurity: How to Reduce Cyber Attacks&nbsp;<\/h2>\n\n\n\n<p>COVID-19 is impacting businesses across the globe in many ways, and<a href=\"https:\/\/envistacorp.com\/managed-services\/it\/security\/\"> cybersecurity<\/a> remains top-of-mind. As companies shift to remote work policies in order to contain the spread of the coronavirus, systems are becoming less secure, and the security threat is becoming even more present with foreseen and unforeseen disruptions such as phishing and hacking attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-remote-workforce-vulnerabilities\">Remote Workforce Vulnerabilities<\/h2>\n\n\n\n<p>During this transition to remote work, your organisation can be at risk in a number of ways. Since some organisations may not have an already established mobile workforce, associates must work from personal devices. Accessing sensitive data and resources on equipment that does not have the same level of endpoint protection software as do the company\u2019s own devices could result in end users unknowingly introducing a device that is already infected with malware into the network.&nbsp;<\/p>\n\n\n\n<p>Alternatively, some organisations may be less prone to this problem because they have already deployed end user devices with endpoint protection and connected networks. However, these companies may still be at risk from other equipment that may be connected to the network that the end users\u2019 devices are running on. This allows cyber attackers to compromise systems on the employee\u2019s home network, spreading to other connected devices.<\/p>\n\n\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"53370\" class=\"elementor elementor-53370\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-41ad0b5 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"1446\" data-id=\"41ad0b5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61a0c0b\" data-eae-slider=\"44122\" data-id=\"61a0c0b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-inner-section elementor-element elementor-element-8e36e15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"66113\" data-id=\"8e36e15\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7452533\" data-eae-slider=\"76821\" data-id=\"7452533\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3001eb9 elementor-grid-1 elementor-posts--align-left elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"3001eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"471\" src=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-768x471.jpg\" class=\"attachment-medium_large size-medium_large wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section has_eae_slider elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9c1b27b\" data-eae-slider=\"87214\" data-id=\"9c1b27b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e128e49 elementor-grid-1 elementor-grid-tablet-1 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"e128e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;cards_columns_tablet&quot;:&quot;1&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-48087 post type-post status-publish format-standard has-post-thumbnail hentry category-white-paper tag-consumer-goods tag-distribution tag-food-beverage tag-information-technology tag-manufacturing tag-non-profit tag-private-equity tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg\" class=\"attachment-medium size-medium wp-image-117597\" alt=\"A brochure with a person touching a virtual network icon, titled Are Managed Services Right for Your Business? on a blue background. The brochure features enVista branding and technology-themed graphics.\" srcset=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-300x300.jpg 300w, https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-150x150.jpg 150w, https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/07\/image-2025-04-09T181015.055-60x60.jpg 60w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">White Paper<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" target=&quot;_blank&quot;>\n\t\t\t\tAre Managed Services Right for Your Business?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Gain insight into benefits and various use cases for infrastructure, application and business process managed services.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/web.envistacorp.com\/are-managed-service-right-for-your-business\" aria-label=\"Read more about Are Managed Services Right for Your Business?\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tDownload\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-steps-to-mitigate-potential-covid-19-cybersecurity-risk\">Steps to Mitigate Potential COVID-19 Cybersecurity Risk<\/h2>\n\n\n\n<p>Cyber attackers are taking advantage of this transition, viewing the global coronavirus pandemic as a weak spot. This new opportunity, coupled with the above-mentioned vulnerabilities, makes businesses extremely prone to cyberthreats. There has already been an increase in the number of ransomware cases affecting end-point devices due to COVID-19. Additional threats are expected due to having employee-owned devices that are already compromised on organisations\u2019 networks.<\/p>\n\n\n\n<p>This may cause panic, but there is still an opportunity to keep your networks secure and your organisations safe from attack. It is possible to create and manage a productive and safe remote workforce amid these difficulties, but it will require a thorough assessment and update to your security policies and procedures. Here are a few steps to consider when mitigating security risks amid COVID-19.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-install-a-virtual-private-network-vpn\">Install a Virtual Private Network (VPN)<\/h3>\n\n\n\n<p>If your team is going to be working from home on untrusted networks, the first step is to set up a virtual private network (VPN). A VPN can protect your network in several ways including creating a connection that routes all traffic to your company\u2019s resources through an encrypted tunnel. This allows organisations to authenticate end users who are accessing internal resources from remote locations, thus preventing unauthenticated access to secure resources regardless of where they are being accessed.<\/p>\n\n\n\n<p>Additionally, it adds a layer of security that prevents any devices connected to your home network from being able to listen and intercept secure company data. This will prevent prying eyes from spying on data as it traverses the network.<\/p>\n\n\n\n<p>Lastly, the VPN allows your endpoint protection tools to be installed, tracked and managed centrally through the secure connection. VPN connections allow endpoint security resources to check in with management servers on an organisation\u2019s network. VPN connections can also be configured to scan the systems connecting to the network and reject connections from systems that do not meet a minimum requirement set by the organisation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-secure-endpoints-to-minimize-risk\">Secure Endpoints to Minimize Risk<\/h3>\n\n\n\n<p>Once you have implemented a secure VPN, your next step should be to secure endpoints in order to minimize cyber risk. Home networks commonly use old and unsupported routers. This is a major vulnerability for companies, providing ample opportunity for cyber attackers to infiltrate devices that are not getting regular updates or bug fixes.&nbsp;<\/p>\n\n\n\n<p>Another vulnerability is that even when using supported devices that do have regular updates available, many users do not take advantage of routine updates to their routers. This increases vulnerability when transitioning to remote work because out-of-date routers can be used to access sensitive company data. An endpoint protection tool, such as anti-virus, DNS filtering, web filters and host-based intrusion detection can be used to secure your network and circumvent the risk of having a cyberattack originating from an out-of-date router.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-develop-a-cybersecurity-prevention-strategy\">Develop a Cybersecurity Prevention Strategy<\/h3>\n\n\n\n<p>enVista provides leading cybersecurity risk management solutions to minimize security breaches and respond to and contain threats as they emerge. enVista\u2019s experts are trained in<a href=\"https:\/\/envistacorp.com\/managed-services\/it\/security\/\"> security management<\/a>, designed to protect information resources via administrative and technical controls to develop mature security solutions. We also have a<a href=\"https:\/\/envistacorp.com\/managed-services\/it\/security\/\"> Managed Security Operations Center<\/a> and<a href=\"https:\/\/envistacorp.com\/press-room\/press-release\/envista-announces-soc-2-type-2-compliance-achievement\/\"> SOC 2 Type 2 Compliance<\/a> equipping us to guard your critical information and resources against growing cyber security threats.<a href=\"https:\/\/envistacorp.com\/contact\/\"> Let\u2019s have a conversation<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As companies shift to working remotely, systems are becoming less secure. Learn how to reduce cybersecurity risk.<\/p>\n","protected":false},"author":22,"featured_media":43030,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_searchwp_excluded":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3475],"tags":[3913,3769,3760],"class_list":["post-43029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cyber-security","tag-information-technology","tag-risk-mitigation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mitigating Cybersecurity Threats During COVID-19 | enVista<\/title>\n<meta name=\"description\" content=\"As companies shift to working remotely, systems are becoming less secure. Learn how to reduce cybersecurity risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating Cybersecurity Threats During COVID-19 | enVista\" \/>\n<meta property=\"og:description\" content=\"As companies shift to working remotely, systems are becoming less secure. Learn how to reduce cybersecurity risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"enVista Australia\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T20:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T06:04:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/06\/shutterstock_1097989835-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"enVista Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enVista Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitigating Cybersecurity Threats During COVID-19 | enVista","description":"As companies shift to working remotely, systems are becoming less secure. Learn how to reduce cybersecurity risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/","og_locale":"en_US","og_type":"article","og_title":"Mitigating Cybersecurity Threats During COVID-19 | enVista","og_description":"As companies shift to working remotely, systems are becoming less secure. Learn how to reduce cybersecurity risk.","og_url":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/","og_site_name":"enVista Australia","article_published_time":"2020-05-26T20:50:00+00:00","article_modified_time":"2025-03-04T06:04:06+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/06\/shutterstock_1097989835-scaled.jpeg","type":"image\/jpeg"}],"author":"enVista Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enVista Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#article","isPartOf":{"@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/"},"author":{"name":"enVista Marketing","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894"},"headline":"COVID-19: Mitigate Cybersecurity Threats","datePublished":"2020-05-26T20:50:00+00:00","dateModified":"2025-03-04T06:04:06+00:00","mainEntityOfPage":{"@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/"},"wordCount":769,"commentCount":0,"publisher":{"@id":"https:\/\/envistacorp.com\/en-au\/#organization"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/06\/shutterstock_1097989835-scaled.jpeg","keywords":["Cyber Security","Information Technology","Risk Mitigation"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/","url":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/","name":"Mitigating Cybersecurity Threats During COVID-19 | enVista","isPartOf":{"@id":"https:\/\/envistacorp.com\/en-au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#primaryimage"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/06\/shutterstock_1097989835-scaled.jpeg","datePublished":"2020-05-26T20:50:00+00:00","dateModified":"2025-03-04T06:04:06+00:00","description":"As companies shift to working remotely, systems are becoming less secure. Learn how to reduce cybersecurity risk.","breadcrumb":{"@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#primaryimage","url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/06\/shutterstock_1097989835-scaled.jpeg","contentUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/06\/shutterstock_1097989835-scaled.jpeg","width":2560,"height":1707,"caption":"Hands typing on a laptop keyboard with digital security icons and a padlock graphic overlay, representing cybersecurity and data protection."},{"@type":"BreadcrumbList","@id":"https:\/\/envistacorp.com\/en-au\/2020\/05\/26\/covid-19-mitigate-cybersecurity-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/envistacorp.com\/en-au\/"},{"@type":"ListItem","position":2,"name":"COVID-19: Mitigate Cybersecurity Threats"}]},{"@type":"WebSite","@id":"https:\/\/envistacorp.com\/en-au\/#website","url":"https:\/\/envistacorp.com\/en-au\/","name":"enVista Australia","description":"Enabling Enterprise Commerce","publisher":{"@id":"https:\/\/envistacorp.com\/en-au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/envistacorp.com\/en-au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/envistacorp.com\/en-au\/#organization","name":"enVista Australia","url":"https:\/\/envistacorp.com\/en-au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/logo\/image\/","url":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","contentUrl":"https:\/\/envistacorp.com\/en-au\/wp-content\/uploads\/sites\/4\/2021\/10\/enVista_Logo_White-1.png","width":348,"height":152,"caption":"enVista Australia"},"image":{"@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/envistacorp.com\/en-au\/#\/schema\/person\/c938d19b1c760a4e1c353086018cb894","name":"enVista Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/908735372279b00297ea13e45a4947cdb05e2ee7244abfcfb3ea9d263679fa53?s=96&d=mm&r=g","caption":"enVista Marketing"},"description":"enVista was founded by supply chain and technology experts in response to market demand for skilled consulting services. Read posts by our Thought Leaders.","url":"https:\/\/envistacorp.com\/en-au\/author\/envistamarketing\/"}]}},"_links":{"self":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts\/43029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/comments?post=43029"}],"version-history":[{"count":0,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/posts\/43029\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/media\/43030"}],"wp:attachment":[{"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/media?parent=43029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/categories?post=43029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/envistacorp.com\/en-au\/wp-json\/wp\/v2\/tags?post=43029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}