{"id":6414,"date":"2024-05-01T08:15:46","date_gmt":"2024-05-01T08:15:46","guid":{"rendered":"https:\/\/cobweb.com\/ae\/?p=6414"},"modified":"2024-05-01T11:33:51","modified_gmt":"2024-05-01T11:33:51","slug":"c-suite-prioritizing-cyber-security-as-risks-escalate","status":"publish","type":"post","link":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/","title":{"rendered":"C-Suite Prioritizing Cyber Security as Risks Escalate"},"content":{"rendered":"\n<div class=\"wp-block-cover has-white-color has-text-color has-small-font-size wp-duotone-000000-ffffff-1\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-cobweb-teal-background-color has-background-dim-0 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1921\" height=\"561\" class=\"wp-block-cover__image-background wp-image-1664\" alt=\"\" src=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/2022\/07\/Teal-Lined-Circle-Background.png\" style=\"object-position:83% 48%\" data-object-fit=\"cover\" data-object-position=\"83% 48%\" srcset=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background.png 1921w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-300x88.png 300w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1024x299.png 1024w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-768x224.png 768w, https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2022\/07\/Teal-Lined-Circle-Background-1536x449.png 1536w\" sizes=\"auto, (max-width: 1921px) 100vw, 1921px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-top has-white-color has-cobweb-dark-teal-background-color has-text-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h1 class=\"wp-block-heading has-text-align-center has-white-color has-text-color\" style=\"font-size:60px\"><strong>Data Breach Risk Tops Concerns List<\/strong><\/h1>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<section id='content-container-block_bda860faa4611d57f54145c71a66b9fb' class='content-container pt-none pb-none' style=\"background-color: #def3f5;\">\n\t\t<div class=\"full-width\">\n\t\n\t\t\t    \t\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/cobweb.com\/ae\/\">Home<\/a><\/span> \u00bb <span class=\"breadcrumb_last\" aria-current=\"page\">C-Suite Prioritizing Cyber Security as Risks Escalate<\/span><\/span><\/div><\/div>\n<\/div>\n\n\n\t\t\t\t<\/div>\n\n\t\t<\/div>\n<\/section>\n\n\n<section id='post-info-block_5d17a12a97e8515f59981df55419dbfb' class='post-info'>\n    <div class=\"grid-container\">\n    \t<div class=\"grid-x\">\n    \t\t<div class=\"small-12 medium-12 large-12 cell\">\n    \t\t\t<div class=\"post-info-container\">\n\t    \t\t\t\t    \t\t\t<div class=\"post-info-author\">\n\t    \t\t\t\t<p class=\"post-info-title\">Written By<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\tAnne Aketch\t    \t\t\t\t\t\t    \t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/anne-aketch-9b340547\/\">\n\t    \t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"\/><\/svg>\n\t    \t\t\t\t\t\t<\/a>\n\t    \t\t\t\t\t\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t<div class=\"post-info-date\">\n\t    \t\t\t\t<p class=\"post-info-title\">Publish Date<\/p>\n\t    \t\t\t\t<p class=\"post-info-detail\">\n\t    \t\t\t\t\t01\/05\/2024\t    \t\t\t\t<\/p>\n\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t\t\t<div class=\"post-info-category\">\n\t\t    \t\t\t\t<p class=\"post-info-title\">Categories<\/p>\n\t\t    \t\t\t\t<p class=\"post-info-categories\">\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t\t\t<span>Blogs<\/span>\t\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t\t\t<span>Hot Topic<\/span>\t\n\t\t    \t\t\t\t\t\t\t    \t\t\t\t<\/p>\n\t\t    \t\t\t<\/div>\n\t    \t\t\t\t    \t\t<\/div>\n    \t\t<\/div>\n    \t<\/div>\n    <\/div>\n<\/section>\n\n\n\n\n<section id='content-container-block_6fa3f6fd1f30f83b6c2b8b955954a496' class='content-container pt-none pb-none' style=\"background-color: #ffffff;\">\n\t\t\n\t<div class=\"grid-container\">\n\t\t<div class=\"inner-content grid-x grid-margin-x\">\n\t\t\t<div class=\"large-8 large-offset-2 cell\">\n\t\t\t    \t\n\n<p class=\"has-text-align-left\">The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity. The report, based on a survey of 1,800 IT and security decision makers, says the global business community is increasingly sensitive to cybercrime risks and is more willing than ever to confront it.&nbsp; It points to data breaches heading the list of corporate C-suite concerns ahead of climate change and inflation.<\/p>\n\n\n\n<p>Put simply the report affirms that the risks that senior executives endured a few years ago are now viewed as unacceptable. That\u2019s the good news. Not so heartening are the headline findings:<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Key cited challenges:<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Disruptions resulting from emerging technologies.<\/li>\n\n\n\n<li>Shared risks associated with the networked economy.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Email:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email usage is rising in 8 out of 10 companies.<\/li>\n\n\n\n<li>3\/4 have experienced more email-based threats.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Cyberattacks:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>59% say cyberattacks are increasingly sophisticated.<\/li>\n\n\n\n<li>2\/3 were harmed by a ransomware attack.<\/li>\n\n\n\n<li>97% have been targeted by email-based phishing attacks.<\/li>\n\n\n\n<li>8\/10 believe they are at risk from inadvertent internal data leaks.<\/li>\n\n\n\n<li>72% expect to be hit by a collaboration-tool-based attack.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Budget:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2\/3 admit they need to up their cybersecurity spend!<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cobweb-dark-teal-color\">You can read the full report <\/mark><a href=\"https:\/\/www.mimecast.com\/the-state-of-email-and-collaboration-security-2024\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cobweb-teal-color\">her<\/mark><\/a><a href=\"https:\/\/www.mimecast.com\/the-state-of-email-and-collaboration-security-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cobweb-teal-color\">e<\/mark><\/a><\/h5>\n\n\n\n<p><strong>Get 24\/7 Defence &amp; Remediation:<\/strong><\/p>\n\n\n\n<p>Be aware, to put up a secure defence against increasingly sophisticate cybercrime companies have to compete for expert talent and then retain it! Inhouse experts will not only have to be skilled in prevention \u2013 they will also need to know how to remediate and quickly to ensure business continuity and reputation!<\/p>\n\n\n\n<p>It\u2019s a tough path to tread. Cybercriminals operate day and night outside of office hours, and it takes, on average, 212 days to detect a data breach, another 75 days to contain it, and globally, the average data breach cost is $4.35 mn.<\/p>\n\n\n\n<p>A subscription-based managed security service from Cobweb is the new defense arsenal with its inhouse expertise providing a 24\/7 service to intervene, prevent and remediate. It\u2019s an investment which will let C-suite better sleep at night.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><a href=\"https:\/\/cobweb.com\/ae\/contact-us\/\">Contact us now for a free solutions assessment.<\/a><\/strong><\/p>\n\n\n\n<p>To reach out to us, email at: sales.uae@cobweb.com or call us on +971 4 455 3100.<\/p>\n\n\n\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n    \t<\/div>\n\t\t<\/div>\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":6419,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3,12],"tags":[88,86,87],"class_list":["post-6414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","category-hot-topic","tag-cyber-security","tag-mimecast","tag-security","product_service-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C-Suite Prioritizing Cyber Security as Risks Escalate - Cobweb MENA<\/title>\n<meta name=\"description\" content=\"Data Breach Risk Tops Concerns List The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Upskill and Grow With Storyals &amp; Cobweb\" \/>\n<meta property=\"og:description\" content=\"Data Breach Risk Tops Concerns List The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\" \/>\n<meta property=\"og:site_name\" content=\"Cobweb MENA\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-01T08:15:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-01T11:33:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"anneaketch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Upskill and Grow With Storyals &amp; Cobweb\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anneaketch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\"},\"author\":{\"name\":\"anneaketch\",\"@id\":\"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d\"},\"headline\":\"C-Suite Prioritizing Cyber Security as Risks Escalate\",\"datePublished\":\"2024-05-01T08:15:46+00:00\",\"dateModified\":\"2024-05-01T11:33:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\"},\"wordCount\":353,\"image\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp\",\"keywords\":[\"Cyber Security\",\"Mimecast\",\"Security\"],\"articleSection\":[\"Blogs\",\"Hot Topic\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\",\"url\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\",\"name\":\"C-Suite Prioritizing Cyber Security as Risks Escalate - Cobweb MENA\",\"isPartOf\":{\"@id\":\"https:\/\/cobweb.com\/ae\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp\",\"datePublished\":\"2024-05-01T08:15:46+00:00\",\"dateModified\":\"2024-05-01T11:33:51+00:00\",\"author\":{\"@id\":\"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d\"},\"description\":\"Data Breach Risk Tops Concerns List The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage\",\"url\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp\",\"contentUrl\":\"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp\",\"width\":1800,\"height\":1035},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cobweb.com\/ae\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C-Suite Prioritizing Cyber Security as Risks Escalate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cobweb.com\/ae\/#website\",\"url\":\"https:\/\/cobweb.com\/ae\/\",\"name\":\"Cobweb MENA\",\"description\":\"Cobweb MENA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cobweb.com\/ae\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d\",\"name\":\"anneaketch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g\",\"caption\":\"anneaketch\"},\"url\":\"https:\/\/cobweb.com\/ae\/content-hub\/author\/anneaketch\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C-Suite Prioritizing Cyber Security as Risks Escalate - Cobweb MENA","description":"Data Breach Risk Tops Concerns List The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/","og_locale":"en_US","og_type":"article","og_title":"Upskill and Grow With Storyals & Cobweb","og_description":"Data Breach Risk Tops Concerns List The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity.","og_url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/","og_site_name":"Cobweb MENA","article_published_time":"2024-05-01T08:15:46+00:00","article_modified_time":"2024-05-01T11:33:51+00:00","og_image":[{"width":350,"height":300,"url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png","type":"image\/png"}],"author":"anneaketch","twitter_card":"summary_large_image","twitter_title":"Upskill and Grow With Storyals & Cobweb","twitter_image":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png","twitter_misc":{"Written by":"anneaketch","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#article","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/"},"author":{"name":"anneaketch","@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d"},"headline":"C-Suite Prioritizing Cyber Security as Risks Escalate","datePublished":"2024-05-01T08:15:46+00:00","dateModified":"2024-05-01T11:33:51+00:00","mainEntityOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/"},"wordCount":353,"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp","keywords":["Cyber Security","Mimecast","Security"],"articleSection":["Blogs","Hot Topic"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/","url":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/","name":"C-Suite Prioritizing Cyber Security as Risks Escalate - Cobweb MENA","isPartOf":{"@id":"https:\/\/cobweb.com\/ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage"},"image":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage"},"thumbnailUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp","datePublished":"2024-05-01T08:15:46+00:00","dateModified":"2024-05-01T11:33:51+00:00","author":{"@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d"},"description":"Data Breach Risk Tops Concerns List The Mimecast annual The State of Email Security is out and has captured changing C-suite attitudes towards cybersecurity.","breadcrumb":{"@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#primaryimage","url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp","contentUrl":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/05\/Cybersecurity-Skills-Expansion_-Hero-Image.webp","width":1800,"height":1035},{"@type":"BreadcrumbList","@id":"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/c-suite-prioritizing-cyber-security-as-risks-escalate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cobweb.com\/ae\/"},{"@type":"ListItem","position":2,"name":"C-Suite Prioritizing Cyber Security as Risks Escalate"}]},{"@type":"WebSite","@id":"https:\/\/cobweb.com\/ae\/#website","url":"https:\/\/cobweb.com\/ae\/","name":"Cobweb MENA","description":"Cobweb MENA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cobweb.com\/ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cobweb.com\/ae\/#\/schema\/person\/6c2ffd7b3b2d31ec9788cfff95b3ac2d","name":"anneaketch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d897e1c432d77af12b1ded3b45d48b6eff9b73ba123e5a786697001465daed6b?s=96&d=mm&r=g","caption":"anneaketch"},"url":"https:\/\/cobweb.com\/ae\/content-hub\/author\/anneaketch\/"}]}},"_links":{"self":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/6414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/comments?post=6414"}],"version-history":[{"count":7,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/6414\/revisions"}],"predecessor-version":[{"id":6430,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/posts\/6414\/revisions\/6430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media\/6419"}],"wp:attachment":[{"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/media?parent=6414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/categories?post=6414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cobweb.com\/ae\/wp-json\/wp\/v2\/tags?post=6414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}