{"id":72949,"date":"2023-05-30T11:38:01","date_gmt":"2023-05-30T11:38:01","guid":{"rendered":"https:\/\/www.techopedia.com"},"modified":"2023-07-12T12:39:14","modified_gmt":"2023-07-12T12:39:14","slug":"why-companies-fail-to-implement-infosec-and-compliance-features","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features","title":{"rendered":"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features"},"content":{"rendered":"

Organizations implement information security (IS, InfoSec)<\/a> and compliance features to keep their data safe. However, getting this done right is not an easy proposition, as advancements in technology constantly pose new threats and open up new avenues for bad actors to breach cybersecurity software.<\/p>\n

And since data<\/a> exists in so many forms \u2013 including operational data, financial data, and customer and employee information \u2013 and in such huge volumes, it’s difficult for organizations to keep it secure, even though they spend millions of dollars annually to do so.<\/p>\n

Perception vs. Reality: InfoSec Gap<\/span><\/h2>\n

Companies with 2,000 employees pay approximately $528,000 a year for InfoSec and compliance features. However, the expenses associated with implementing and managing those features can reach as high as $5.68 million<\/strong> annually, according to recent\u00a0research<\/a> conducted by information intelligence agency Cognni.<\/p>\n

“The majority of decision-makers do not know that their organization can\u2019t detect most risks to their information, and that IT won\u2019t even try,” the report noted.<\/p>\n

“This obviously leads to clear and immediate information risks that nobody even attempts to mitigate.”<\/p><\/blockquote>\n

Despite the enormous costs, only 4%<\/strong> of companies have successfully implemented all the InfoSec and compliance features that they’ve purchased, according to Cognni.<\/p>\n

This statistic stands in stark contrast to the fact that 89%<\/strong> of C-level execs believe that their IT teams have deployed all the InfoSec and compliance features that their companies have paid for, revealing that there\u2019s a major gap between perception and reality when it comes to information security, according to the report.<\/p>\n

According to Cognni, there are three main reasons InfoSec implementations aren’t successful. Let’s take a closer look at them below.<\/p>\n

Companies Fail To Detect Sensitive Personal Information<\/h3>\n

To protect against unauthorized access or disclosure of regulated information, organizations need to identify where that information resides. Cognni explained:<\/p>\n

\n

“However, many organizations possess such a narrow scope of detection that they are incapable of adequately protecting their data assets.”<\/p>\n<\/blockquote>\n

Companies may not be able to detect all their sensitive personal information (SPI)<\/a> because they don’t know the sources of that data or the types of documents that contain that data. In addition, even if they know what to look for, they may not have the tools or processes they need to identify, monitor, and secure their information.<\/p>\n

Organizations that don’t properly detect and protect SPI will likely suffer privacy violations, data breaches<\/a>, and serious damage to their reputations.<\/p>\n

Many companies may find it difficult to train machine learning<\/a> to detect protected health information \u2013 i.e., any health information that is protected by law, including treatment plans, test results, and medical records.\u00a0However, detecting sensitive personal information, such as disciplinary hearings, employment contracts, and pay slips, proves nearly impossible for almost every organization.<\/p>\n

It’s much harder to train machine learning to detect specific types of documents than it is to detect specific terms within the text. The result is that most types of SPI aren’t classified, monitored, or protected.<\/p>\n

Organizations Don’t Protect Internal Confidential Information<\/h3>\n

Every organization has proprietary information and\/or sensitive and confidential documents that they must often share securely inside and outside the company. However, companies that don’t protect their confidential documents will likely suffer the loss of revenue and damage to their brands, and may also have to pay massive fines for regulatory noncompliance.<\/p>\n

Consequently, protecting confidential and sensitive information is critical to the long-term success of InfoSec initiatives. Encryption<\/a> is an excellent option to keep sensitive corporate data secure.<\/p>\n

The Cognni report made an example:<\/p>\n

\n

“[For example], a company in the tourism industry was breached. The hacker gained control to one of their data privileged accounts and stole gigabytes of sensitive data, including internal confidential information. This information was accessible because the company\u2019s data was not labeled or otherwise encrypted.”<\/p>\n<\/blockquote>\n

Sharing Sensitive Information Leads to Risks<\/h3>\n

Organizations\u2019 sensitive data comes in many forms, including employee HR records, customer information, legal and financial documents, operational data, and more. The kind of information that employees need to do their jobs but shouldn’t share publicly as it could damage their companies if it was exposed.<\/p>\n

The fact is, though, that to get their work done, employees must frequently collaborate with others inside as well as outside their organizations. And that often means they share sensitive corporate data with individuals and businesses without permission to access it.<\/p>\n

There are two main types of such exposures: internal and external.<\/p>\n

“Internal exposures occur when sensitive information is accessed by employees who are not trusted to have access,” the report noted.<\/p>\n

\n

“External exposures happen when sensitive information is shared outside of an organization to individuals or organizations that have no right to this information.”<\/p>\n<\/blockquote>\n

To ensure their sensitive data is protected, organizations must understand what types of information employees are accessing and how they typically share that information. To detect these kinds of exposures effectively, companies need to establish clear policies governing which employees have permission to access which types of data and pay close attention to how and with whom employees are sharing this information.<\/p>\n

Businesses must ensure that their employees are aware of the sensitive nature of the information they access on a day-to-day basis and understand how they should handle that information. If organizations’ sensitive corporate data ends up in the wrong hands, it could be used for fraud, identity theft, or other malicious activities.<\/p>\n

Therefore, employees must ensure they protect this information and only share it with those who have permission to access it.<\/p>\n

The Bottom Line<\/span><\/h2>\n

Organizations that want to ensure that their InfoSec initiatives are successful must take the necessary proactive measures to protect their sensitive corporate information and keep it out of the hands of bad actors.<\/p>\n

Cognni suggests considering the following steps:<\/p>\n

    \n
  • Mapping critical data as most companies lack visibility into their critical data, including its existence and exposure;<\/li>\n
  • Labeling and encrypting internal confidential data;<\/li>\n
  • Classifying and labeling confidential data so employees know which information is most sensitive and educating them so they can manage and mitigate potential risks associated with the data.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"

    Organizations implement information security (IS, InfoSec) and compliance features to keep their data safe. However, getting this done right is not an easy proposition, as advancements in technology constantly pose new threats and open up new avenues for bad actors to breach cybersecurity software. And since data exists in so many forms \u2013 including operational […]<\/p>\n","protected":false},"author":7924,"featured_media":53717,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[557,560],"tags":[],"category_partsoff":[],"class_list":["post-72949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-management","category-privacy-and-compliance"],"acf":[],"yoast_head":"\nWhy Companies Fail to Implement InfoSec & Compliance Features<\/title>\n<meta name=\"description\" content=\"Struggling with information security implementation? Read on to learn about key obstacles and steps to protect sensitive data effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features\" \/>\n<meta property=\"og:description\" content=\"Struggling with information security implementation? Read on to learn about key obstacles and steps to protect sensitive data effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30T11:38:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T12:39:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linda Rosencrance\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@techopedia\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linda Rosencrance\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\"},\"author\":{\"name\":\"Linda Rosencrance\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/ff3011bad14269de3fd0319f42c662c9\"},\"headline\":\"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features\",\"datePublished\":\"2023-05-30T11:38:01+00:00\",\"dateModified\":\"2023-07-12T12:39:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\"},\"wordCount\":1018,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg\",\"articleSection\":\"\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\",\"url\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\",\"name\":\"Why Companies Fail to Implement InfoSec & Compliance Features\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg\",\"datePublished\":\"2023-05-30T11:38:01+00:00\",\"dateModified\":\"2023-07-12T12:39:14+00:00\",\"description\":\"Struggling with information security implementation? Read on to learn about key obstacles and steps to protect sensitive data effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg\",\"width\":800,\"height\":450,\"caption\":\"Photo source: Getty Images\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Management\",\"item\":\"https:\/\/www.techopedia.com\/topic\/20\/data-management\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privacy and Compliance\",\"item\":\"https:\/\/www.techopedia.com\/topic\/30\/privacy-and-compliance\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg\",\"width\":209,\"height\":37,\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/ff3011bad14269de3fd0319f42c662c9\",\"name\":\"Linda Rosencrance\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/linda-rosencrance.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/linda-rosencrance.jpg\",\"caption\":\"Linda Rosencrance\"},\"description\":\"Linda Rosencrance is a freelance writer and editor based in the Boston area with expertise ranging from AI and machine learning to cybersecurity and DevOps. She has covered IT topics since 1999 as an investigative reporter for several newspapers in the greater Boston area. She also writes white papers, case studies, e-books, and blog posts for a variety of corporate clients, interviewing key stakeholders including CIOs, CISOs, and other C-suite executives.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/linda-rosencrance-a8508876\/\"],\"knowsAbout\":[\"Tech Journalist\"],\"url\":\"https:\/\/www.techopedia.com\/contributors\/linda-rosencrance\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Companies Fail to Implement InfoSec & Compliance Features","description":"Struggling with information security implementation? Read on to learn about key obstacles and steps to protect sensitive data effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features","og_locale":"en_US","og_type":"article","og_title":"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features","og_description":"Struggling with information security implementation? Read on to learn about key obstacles and steps to protect sensitive data effectively.","og_url":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_published_time":"2023-05-30T11:38:01+00:00","article_modified_time":"2023-07-12T12:39:14+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg","type":"image\/jpeg"}],"author":"Linda Rosencrance","twitter_card":"summary_large_image","twitter_creator":"@techopedia","twitter_site":"@techopedia","twitter_misc":{"Written by":"Linda Rosencrance","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features"},"author":{"name":"Linda Rosencrance","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/ff3011bad14269de3fd0319f42c662c9"},"headline":"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features","datePublished":"2023-05-30T11:38:01+00:00","dateModified":"2023-07-12T12:39:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features"},"wordCount":1018,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"image":{"@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg","articleSection":"","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features","url":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features","name":"Why Companies Fail to Implement InfoSec & Compliance Features","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage"},"image":{"@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg","datePublished":"2023-05-30T11:38:01+00:00","dateModified":"2023-07-12T12:39:14+00:00","description":"Struggling with information security implementation? Read on to learn about key obstacles and steps to protect sensitive data effectively.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#primaryimage","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/03\/enterprise-cybersecurity-solutions1.jpg","width":800,"height":450,"caption":"Photo source: Getty Images"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/why-companies-fail-to-implement-infosec-and-compliance-features#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Data Management","item":"https:\/\/www.techopedia.com\/topic\/20\/data-management"},{"@type":"ListItem","position":3,"name":"Privacy and Compliance","item":"https:\/\/www.techopedia.com\/topic\/30\/privacy-and-compliance"},{"@type":"ListItem","position":4,"name":"Why Most Companies Fail To Successfully Implement Information Security & Compliance Features"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/08\/techopedia-light.svg","width":209,"height":37,"caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/ff3011bad14269de3fd0319f42c662c9","name":"Linda Rosencrance","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/linda-rosencrance.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/linda-rosencrance.jpg","caption":"Linda Rosencrance"},"description":"Linda Rosencrance is a freelance writer and editor based in the Boston area with expertise ranging from AI and machine learning to cybersecurity and DevOps. She has covered IT topics since 1999 as an investigative reporter for several newspapers in the greater Boston area. She also writes white papers, case studies, e-books, and blog posts for a variety of corporate clients, interviewing key stakeholders including CIOs, CISOs, and other C-suite executives.","sameAs":["https:\/\/www.linkedin.com\/in\/linda-rosencrance-a8508876\/"],"knowsAbout":["Tech Journalist"],"url":"https:\/\/www.techopedia.com\/contributors\/linda-rosencrance"}]}},"modified_by":"vukstojkovic","_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/72949"}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7924"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=72949"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/72949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media\/53717"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=72949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/categories?post=72949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/tags?post=72949"},{"taxonomy":"category_partsoff","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/category_partsoff?post=72949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}