{"id":129,"date":"2011-02-24T03:00:54","date_gmt":"2011-02-24T08:00:54","guid":{"rendered":"http:\/\/www.digitalundercurrents.com\/blog\/?p=129"},"modified":"2011-02-24T11:06:30","modified_gmt":"2011-02-24T16:06:30","slug":"back-to-basics","status":"publish","type":"post","link":"http:\/\/www.digitalundercurrents.com\/blog\/?p=129","title":{"rendered":"Back to Basics"},"content":{"rendered":"<p><a href=\"http:\/\/threatpost.com\/en_us\/blogs\/lesson-stuxnet-and-aurora-get-back-basics-or-get-owned-022311\">An article on Threatpost<\/a> makes a compelling point: despite the amount of press lavished upon attacks like Stuxnet or Aurora, most companies don&#8217;t need to be worried about the latest and greatest targeted attacks. They need to worry about the basics &#8211; SQL injection attacks, phishing, social engineering, and other &#8220;boring&#8221; threats.<\/p>\n<p>For the vast majority of companies, especially ones outside of the Fortune 100, there is simply no present threat from something like Aurora. Complex, expensive security infrastructures aren&#8217;t what you need. You need properly hardened servers, trained employees, and developers who know how to write secure application code.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An article on Threatpost makes a compelling point: despite the amount of press lavished upon attacks like Stuxnet or Aurora, most companies don&#8217;t need to be worried about the latest and greatest targeted attacks. They need to worry about the basics &#8211; SQL injection attacks, phishing, social engineering, and other &#8220;boring&#8221; threats. For the vast [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,13],"tags":[],"class_list":["post-129","post","type-post","status-publish","format-standard","hentry","category-exploits","category-incidents"],"_links":{"self":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=129"}],"version-history":[{"count":0,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/129\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=129"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}