data
query
queries
{
"data": {
"slug": "cyber-security-roundup-1",
"title": "BenefitsPro: Cyber security roundup",
"type": "regulated insights",
"packageUrl": "",
"summary": "Some of our recent cyber security coverage",
"cssFile": "",
"imageUrl": "",
"mediaUrl": "",
"blurb": "",
"articles": [
{
"uri": "/2017/11/14/hr-departments-top-targets-for-cyber-criminals/",
"title": "HR departments top targets for cyber criminals",
"summary": "Given the personal data it stores, HR is a top target for hackers. Here are 3 simple tips to protect data from cyberattacks.",
"byline": "Idan Udi Edry",
"kicker": "",
"tags": [],
"prettyDate": "November 14, 2017",
"wordcount": "690",
"timeToRead": "4 minute",
"readtime": "4",
"authors": [
{
"webUrl": "/author/profile/idan-udi-edry/",
"name": "Idan Udi Edry"
}
],
"kickerNode": [],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2017/11/shutterstock499194241-technology-cyber-hygiene-hac.jpg",
"width": "700",
"height": "425"
}
},
{
"uri": "/2017/12/06/3-ways-hr-and-benefits-managers-can-mitigate-cybersecurity-risks/",
"title": "3 ways HR and benefits managers can mitigate cybersecurity risks",
"summary": "Digital health solutions have great potential to deliver health care navigation and change the employer and employee healthcare value equation, but with all of these new tools comes additional concerns about employee data privacy and security.",
"byline": "Bill Billings",
"kicker": "",
"tags": [],
"prettyDate": "December 06, 2017",
"wordcount": "755",
"timeToRead": "4 minute",
"readtime": "4",
"authors": [
{
"webUrl": "/author/profile/bill-billings/",
"name": "Bill Billings"
}
],
"kickerNode": [],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "",
"width": "",
"height": ""
}
},
{
"uri": "/2018/02/16/securing-company-email-content-a-checklist/",
"title": "Securing company email content: a checklist",
"summary": "In every organization, individual employees are the weakest link when it comes to email security. Remote working, which is coming more ubiquitous and appealing, makes the use of unsecured email even more likely.",
"byline": "Idan Udi Edry",
"kicker": "",
"tags": [],
"prettyDate": "February 16, 2018",
"wordcount": "732",
"timeToRead": "4 minute",
"readtime": "4",
"authors": [
{
"webUrl": "/author/profile/idan-udi-edry/",
"name": "Idan Udi Edry"
}
],
"kickerNode": [],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "",
"width": "",
"height": ""
}
},
{
"uri": "/2018/02/15/data-protection-officers-hold-the-hot-jobs/",
"title": "Data protection officers hold the hot jobs",
"summary": "Europe's General Data Protection Regulation, which goes into effect in May, requires that all companies whose core activities include substantial monitoring or processing of personal data hire a data protection officer.",
"byline": "Marlene Y. Satter",
"kicker": "",
"tags": [],
"prettyDate": "February 15, 2018",
"wordcount": "502",
"timeToRead": "3 minute",
"readtime": "3",
"authors": [
{
"webUrl": "/author/profile/marlene-y-satter/",
"name": "Marlene Y. Satter"
}
],
"kickerNode": [],
"primaryCategory": {
"channelName": "",
"sectionName": "",
"uri": ""
},
"image": {
"uri": "",
"width": "",
"height": ""
}
}
],
"navigations": [],
"sponsors": []
}
}