{"id":110224,"date":"2023-10-10T10:42:36","date_gmt":"2023-10-10T10:42:36","guid":{"rendered":"https:\/\/www.techopedia.com"},"modified":"2023-10-10T13:03:54","modified_gmt":"2023-10-10T13:03:54","slug":"are-your-saas-applications-safe-essential-security-tips","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips","title":{"rendered":"Are Your SaaS Applications Safe? Essential Security Tips"},"content":{"rendered":"

Safeguarding an organization’s valuable data in the cloud poses a significant challenge for businesses adopting Software as a Service<\/a> (SaaS) applications.<\/p>\n

With insider threats<\/a> and cybercrime<\/a> activity rising, security teams must take decisive action to protect their data. This means implementing strict controls, managing access and identities, and fortifying defenses against potential breaches.<\/p>\n

A recent Cloud Security Alliance (CSA) report shows a significant rise in investment in SaaS and SaaS Security resources. A massive 66% of organizations have upped their spending on apps, while 71%<\/a> have increased their investment in security tools for SaaS.<\/p>\n

However, it’s important to note responsibility for different aspects of the SaaS service is divided between the provider and the customer – a cloud model known as Shared Responsibility<\/a>. It is crucial to follow basic practices to ensure a smooth and secure transition to a third-party SaaS provider.<\/p>\n

SaaS Security: Fundamental Practices to Follow<\/span><\/h2>\n

Ensure the basics are covered before signing contracts and submitting purchase orders to a third-party SaaS provider. Conduct thorough research on the SaaS provider’s reputation and security measures as part of your due diligence process. Leverage your network of trusted contacts to ascertain their experience with a particular cloud service provider<\/a> (CSP).<\/p>\n

Look for confirmation demonstrating the CSP has implemented a comprehensive information security management system<\/a> (ISMS). Additionally, inquire about their data encryption protocols<\/a>, how they handle data backups<\/a>, and whether they use administrative segregation of duties.<\/p>\n

You can uncover further details that may impact your business by thoroughly reviewing your contract, especially around the service level agreement<\/a> (SLA) section. Being meticulous in your review will help you avoid any surprises. Don’t allow the devil in the details to catch you off guard. Know exactly what you’re getting into!<\/p>\n

Choosing a Reputable SaaS Provider That Takes Security Seriously<\/span><\/h2>\n

Selecting a well-established and trusted SaaS provider can significantly reduce the risk of security breaches and your level of concern. Look for providers with a robust data protection record and strong security measures in place.<\/p>\n

A world-class CSP will have garnered a selection of the following certifications and standards:<\/p>\n

    \n
  1. Cloud Security Alliance Star Verification<\/a><\/li>\n
  2. EuroCloud SaaS Star Audit<\/a><\/li>\n
  3. Common Criteria<\/a><\/li>\n
  4. FIPS 140-2<\/a><\/li>\n
  5. ISO\/IEC 27017 Cloud-Security<\/a><\/li>\n
  6. Cyber Essentials Plus<\/a><\/li>\n
  7. EU-U.S. Data Privacy Framework<\/a><\/li>\n
  8. International Privacy Verification (IPV) programme<\/a><\/li>\n
  9. SOC 2 Type 2<\/a><\/li>\n
  10. PCI DSS<\/a><\/li>\n<\/ol>\n

    Effective SaaS Security Measures<\/span><\/h2>\n

    Now that you understand the importance of selecting a reputable SaaS provider that takes security seriously, let’s delve into the specific factors you should consider when evaluating potential providers. Remember that most of the controls covered will also apply to your organization.<\/p>\n

    Implement Strong Access Controls<\/h3>\n

    There are two sides to the coin when it comes to access controls; on the one hand, you have the controls put in place by the CSP controlling and protecting your data in the cloud. Controls will include segregation of duties, ensuring individuals within the CSP are granted access to the data and resources necessary for their role, and nothing more. This helps prevent unauthorized access and reduces the risk of collusion from insider threats. Going deeper, do they use just-in-time<\/a> (JIT) access control, privilege identity management<\/a> (PIM), and privilege access management<\/a> (PAM)?<\/p>\n

    On the other hand, as the client, you must implement similar internal access controls. This includes managing user permissions, enforcing strong password policies, and regularly reviewing user access control lists (ACLs) and JIT, PIM, and PAM.<\/p>\n

    Multi-factor authentication<\/a> is a great solution, requiring users to provide multiple forms of identification, like a password, randomly generated code, or biometric verification.<\/p>\n

    Think about implementing Active Directory Federated Services<\/a> (ADFS) or PingFederation that offer single sign-on<\/a> (SSO).<\/p>\n

    Using groups in Active Directory<\/a> (AD), you could, for example, configure a security group dedicated to a particular SaaS application, making access management for your movers, leavers, and joiners a whole lot simpler and further enhancing security.<\/p>\n

    Combining these factors can reduce the likelihood of unauthorized access and potential data breaches.<\/p>\n

    Regularly Monitor and Audit SaaS Access<\/h3>\n

    Monitoring and auditing your environment is vital for detecting suspicious activities or potential security breaches. This includes monitoring user activities: login attempts, unauthorized data transfers, and checking system logs for anomalies.<\/p>\n

    Consider implementing a security information and event management<\/a> (SIEM) solution to help you centralize and analyze security event data from various sources. This will enable you to identify and respond to security incidents promptly.<\/p>\n

    Ascertain whether the CSP provides a system for monitoring and logging user activity within their SaaS environment, too. Block user activity that accesses unauthorized SaaS applications, also known as Shadow SaaS<\/a>,\u00a0from within your enterprise environment. Consider implementing a Cloud Service Access Broker<\/a> (CASB) to gain insights and prevent this type of rogue activity.<\/p>\n

    Data Encryption and Backups<\/h3>\n

    Data encryption is a critical aspect of SaaS security. Ensure your SaaS provider uses robust encryption protocols to protect your data in transit and at rest. This helps safeguard your information from unauthorized access. Additionally, inquire about your SaaS provider’s data backup procedures. For example, is the data backed up to a geographical location outside what has been agreed?<\/p>\n

    Updates and Patching<\/h3>\n

    SaaS providers regularly release updates and patches to address security vulnerabilities and to provide enhancements to service. Patching should be seamless, without any interruptions to your service. Ensure your provider is proactive in applying these updates to minimize the risk of threats.<\/p>\n

    Understanding the Importance of SaaS Security<\/span><\/h2>\n

    Picture this: a misconfigured SaaS environment or weak internal controls. Sounds like a nightmare, right? But brace yourself for an even scarier scenario: your precious data falling into the wrong hands! Without robust security controls, your business environment becomes a prime target for ruthless hackers. It’s important you recognize the undeniable importance of SaaS security and shield your business from the imminent threat of a data breach.<\/p>\n

    The Bottom Line<\/span><\/h2>\n

    While SaaS applications offer numerous benefits to businesses, it’s crucial to prioritize security to protect sensitive data and prevent unauthorized access. Analyzing security event data and implementing a Cloud Access <\/a>Service <\/a>Broker<\/a> (CASB) can help identify and respond to security incidents promptly.<\/p>\n

    Additionally, ensuring you and your service provider have robust encryption protocols for data in transit and at rest is paramount to safeguarding your data.<\/p>\n

    Regular data backups are crucial to enable quick recovery and minimize the impact of a breach. By prioritizing these security measures, businesses can confidently leverage the convenience and scalability of SaaS applications without compromise. Security teams on both sides must remain vigilant and continuously adapt their security strategies to the evolving threat landscape.<\/p>\n

    Remember, when selecting a CSP, prioritize security and opt for one that showcases a strong commitment to it. Request to review their certifications and adherence to industry standards.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Safeguarding an organization’s valuable data in the cloud poses a significant challenge for businesses adopting Software as a Service (SaaS) applications. With insider threats and cybercrime activity rising, security teams must take decisive action to protect their data. This means implementing strict controls, managing access and identities, and fortifying defenses against potential breaches. A recent […]<\/p>\n","protected":false},"author":7909,"featured_media":112181,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[570,589],"tags":[],"category_partsoff":[],"class_list":["post-110224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-service-providers","category-software-as-a-service-saas"],"acf":[],"yoast_head":"\nAre Your SaaS Applications Safe? Essential Security Tips - Techopedia<\/title>\n<meta name=\"description\" content=\"The essential SaaS certifications and secure practices to safeguard your business from breaches while maintaining convenience and scalability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Your SaaS Applications Safe? Essential Security Tips\" \/>\n<meta property=\"og:description\" content=\"The essential SaaS certifications and secure practices to safeguard your business from breaches while maintaining convenience and scalability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T10:42:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-10T13:03:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Meah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/JohnMeah2016\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Meah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\"},\"author\":{\"name\":\"John Meah\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/c812d44e3ba14083cff4dd1f2ec8279b\"},\"headline\":\"Are Your SaaS Applications Safe? Essential Security Tips\",\"datePublished\":\"2023-10-10T10:42:36+00:00\",\"dateModified\":\"2023-10-10T13:03:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\"},\"wordCount\":1117,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg\",\"articleSection\":\"\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\",\"url\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\",\"name\":\"Are Your SaaS Applications Safe? Essential Security Tips - Techopedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg\",\"datePublished\":\"2023-10-10T10:42:36+00:00\",\"dateModified\":\"2023-10-10T13:03:54+00:00\",\"description\":\"The essential SaaS certifications and secure practices to safeguard your business from breaches while maintaining convenience and scalability.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg\",\"width\":1200,\"height\":600,\"caption\":\"A padlock on top of data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software-as-a-Service (SaaS)\",\"item\":\"https:\/\/www.techopedia.com\/topic\/231\/software-as-a-service-saas\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Service Providers\",\"item\":\"https:\/\/www.techopedia.com\/topic\/79\/cloud-service-providers\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Are Your SaaS Applications Safe? Essential Security Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"width\":209,\"height\":37,\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/c812d44e3ba14083cff4dd1f2ec8279b\",\"name\":\"John Meah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/jm-profile-300x300.png\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/jm-profile-300x300.png\",\"caption\":\"John Meah\"},\"description\":\"John is a skilled freelance writer who combines his writing talent with his cybersecurity expertise. He holds a Level 7 equivalent Masters degree in Cybersecurity and several prestigious industry certifications including PCIP, CISSP, MCIIS and CCSK. He has spent over two decades working in IT and information security in the finance and logistics sectors. This experience has given John a deep understanding of cybersecurity practices, making his technology coverage on Techopedia particularly insightful and valuable. He improved his writing skills through courses at renowned institutions such as the Guardian and the Writers Bureau UK.\",\"sameAs\":[\"https:\/\/books2read.com\/b\/4E8gPO\",\"https:\/\/linkedin.com\/in\/john-meah-cissp\",\"https:\/\/x.com\/https:\/\/twitter.com\/JohnMeah2016\"],\"knowsAbout\":[\"Cyber \u200b\u200bSecurity Specialist\"],\"url\":\"https:\/\/www.techopedia.com\/contributors\/john-meah\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are Your SaaS Applications Safe? Essential Security Tips - Techopedia","description":"The essential SaaS certifications and secure practices to safeguard your business from breaches while maintaining convenience and scalability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips","og_locale":"en_US","og_type":"article","og_title":"Are Your SaaS Applications Safe? Essential Security Tips","og_description":"The essential SaaS certifications and secure practices to safeguard your business from breaches while maintaining convenience and scalability.","og_url":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_published_time":"2023-10-10T10:42:36+00:00","article_modified_time":"2023-10-10T13:03:54+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg","type":"image\/jpeg"}],"author":"John Meah","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/JohnMeah2016","twitter_site":"@techopedia","twitter_misc":{"Written by":"John Meah","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips"},"author":{"name":"John Meah","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/c812d44e3ba14083cff4dd1f2ec8279b"},"headline":"Are Your SaaS Applications Safe? Essential Security Tips","datePublished":"2023-10-10T10:42:36+00:00","dateModified":"2023-10-10T13:03:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips"},"wordCount":1117,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"image":{"@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg","articleSection":"","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips","url":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips","name":"Are Your SaaS Applications Safe? Essential Security Tips - Techopedia","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage"},"image":{"@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg","datePublished":"2023-10-10T10:42:36+00:00","dateModified":"2023-10-10T13:03:54+00:00","description":"The essential SaaS certifications and secure practices to safeguard your business from breaches while maintaining convenience and scalability.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#primaryimage","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/10\/lock_02-1.jpg","width":1200,"height":600,"caption":"A padlock on top of data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/are-your-saas-applications-safe-essential-security-tips#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Software-as-a-Service (SaaS)","item":"https:\/\/www.techopedia.com\/topic\/231\/software-as-a-service-saas"},{"@type":"ListItem","position":3,"name":"Cloud Service Providers","item":"https:\/\/www.techopedia.com\/topic\/79\/cloud-service-providers"},{"@type":"ListItem","position":4,"name":"Are Your SaaS Applications Safe? Essential Security Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","width":209,"height":37,"caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/c812d44e3ba14083cff4dd1f2ec8279b","name":"John Meah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/jm-profile-300x300.png","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/jm-profile-300x300.png","caption":"John Meah"},"description":"John is a skilled freelance writer who combines his writing talent with his cybersecurity expertise. He holds a Level 7 equivalent Masters degree in Cybersecurity and several prestigious industry certifications including PCIP, CISSP, MCIIS and CCSK. He has spent over two decades working in IT and information security in the finance and logistics sectors. This experience has given John a deep understanding of cybersecurity practices, making his technology coverage on Techopedia particularly insightful and valuable. He improved his writing skills through courses at renowned institutions such as the Guardian and the Writers Bureau UK.","sameAs":["https:\/\/books2read.com\/b\/4E8gPO","https:\/\/linkedin.com\/in\/john-meah-cissp","https:\/\/x.com\/https:\/\/twitter.com\/JohnMeah2016"],"knowsAbout":["Cyber \u200b\u200bSecurity Specialist"],"url":"https:\/\/www.techopedia.com\/contributors\/john-meah"}]}},"modified_by":"vukstojkovic","_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/110224"}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7909"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=110224"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/110224\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media\/112181"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=110224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/categories?post=110224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/tags?post=110224"},{"taxonomy":"category_partsoff","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/category_partsoff?post=110224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}