{"id":12327,"date":"2017-07-13T12:46:29","date_gmt":"2017-07-13T17:46:29","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=12327"},"modified":"2025-10-23T10:56:41","modified_gmt":"2025-10-23T15:56:41","slug":"holistic-approach-cyber-security","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/","title":{"rendered":"The Holistic Approach to Cyber Security: A magical concept, but what does it look like?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12327\" class=\"elementor elementor-12327\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5207793a e-flex e-con-boxed e-con e-parent\" data-id=\"5207793a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1df5f853 elementor-widget elementor-widget-text-editor\" data-id=\"1df5f853\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you\u2019re reading this, chances are you spend a good chunk of your time keeping up with the latest news and opinions in the world of cyber security. And if that supposition is true, there\u2019s also a strong chance that you\u2019ve run across the concept of the \u201cholistic approach\u201d to cyber security culture already. In fact, headlines containing this phrase have been popping up like weeds everywhere info sec content grows. We sincerely hope that you\u2019re not writing it off as another trendy platitude to sell endpoint protection.<\/p>\n<p>The holistic cyber security approach is an idea that deserves discussion. It can be difficult though to glean some visualization clues as to what this holistic approach means beyond connotations of healing crystals and chakra therapy. What exactly would a holistic approach to cyber security look like in practice?<\/p>\n<p>It may be prudent to first examine why this shift in ideology is emerging. First I\u2019ll issue a warning: <em>the following answer may be too cynical for readers that are faint of heart. <\/em><\/p>\n<p>The truth is, we\u2019ve been fighting the bad guys for over a decade and are no closer to \u201cwinning\u201d the war than when it started. Don\u2019t get me wrong, we have always put up a hell of a fight but even Sisyphus stops celebrating when he crests his thousandth summit. Daily, millions of network architects, security engineers, programmers, pen testers, and more are engaging in noble work and boasting massive strides in the protection of your data.<\/p>\n<p>New security layers are being added, threat signatures are being documented, and packet scrutiny is intensifying. But the bad guys are at their battle stations too. Every new feature or program unveiled is accompanied by its own unique slew of exploits. Let me be clear: this is a never-ending battle.<\/p>\n<h3>What&#8217;s Happening?<\/h3>\n<p>Cyber attackers are finding these pursuits are clearly worth their time and effort. You don\u2019t have to dig very far into our previous blog posts to be reminded of the glaring statistical evidence that <a href=\"https:\/\/blog.sonicwall.com\/2017\/02\/sonicwall-threat-report-reveals-cybersecurity-arms-race\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware attacks are increasing at an extreme rate<\/a>. High-profile attacks such as WannaCry and Petya are making regular appearances in an already overwrought news cycle. As serious as these staggering trends are, though, the concept of the holistic approach did not emerge solely in response to highly publicized attacks or to surges in certain species of malware.<\/p>\n<p>In fact, nothing specifically birthed any new ideology in cyber security because the \u201cholistic approach\u201d is nothing new. It is, at best, a rebranding. A repackaging of the same advice that the info sec community has been preaching for years: train your staff to identify threats, patch your system often, secure your most sensitive data.<\/p>\n<p>The fact of the matter is the anatomy of a cyber attack has not changed much over the last few years. Someone in the office clicked something they shouldn\u2019t have, <a href=\"http:\/\/www.canadianunderwriter.ca\/insurance\/one-four-hide-cybersecurity-incidents-employers-global-kaspersky-survey-finds-1004116950\/\" target=\"_blank\" rel=\"noopener noreferrer\">they hesitated in reporting it<\/a> in fear of repercussions, your security patches just never got around to being installed, and no one\u2019s been accountable for data backups since Nelly was putting out new albums.<\/p>\n<p>Perhaps I am giving away the golden-egg-laying goose for info sec bloggers, but the holistic approach to cybersecurity is nothing more than fresh phrasing for the need of a cyber safety culture in the workplace. Dirty secrets aside, there are still pertinent lessons to be learned. Whether you consider this cutting-edge insight or a refresher course, let\u2019s dissect what the holistic approach to cyber security looks like in practice.<\/p>\n<h3><strong>Striking a Balance Between Efficiency &amp; Security<\/strong><\/h3>\n<p>We live in a dangerous world. In our virtual lives, we must remain vigilant in guarding our identities and data. In our real lives, we worry over crime and random misfortune. An ever-present aspect of our fight for safety rests on the delicate scales balancing security on one side and efficiency on the other. Certainly we could be 100% secure if each email and document entering our network was personally read and reviewed by a network engineer before getting the thumbs up or down. Unfortunately, this would eat up a lot of time and a lot of labor.<\/p>\n<p>Your employees can\u2019t sit around half the day while necessary emails trickle through the gateway. Likewise, it would be super efficient to hand over admin credentials to every employee, contractor, and vendor on your payroll so that they can help themselves to whatever resources are needed to get the job done. Somewhere in the middle, a balance must be struck. I may be biased here, but I encourage you to err on the side of security over productivity.<\/p>\n<h3><strong>You\u2019re On the Crew, Like It or Not<\/strong><\/h3>\n<p>If your employer has a computer on property, guess what: you\u2019re part of the cyber security team! Whether you\u2019re the sys admin or the janitor, everyone has a role to play. Empower and educate your employees at all levels in the basic habits most likely to prevent a breach. Email security best practices should not be optional curriculum for new hires or annual retraining.<\/p>\n<h3><strong>What Is Governance Anyway?<\/strong><\/h3>\n<p>Cyber security governance is a hefty phrase that could do with unpacking. In this case, governance is the codified operating procedures in place to manage and enforce cyber security in the workplace. This is the infrastructure behind the lectures. The bite behind the bark. Strong cyber security governance means having accountable parties tasked with monitoring and enforcing info sec protocol. It includes having clear, concise rules outlined in employee manuals. It includes real, visible consequences for flagrant disregard of those rules.<\/p>\n<p>Cyber security governance is corporate speak for a company walking the walk of cyber security instead of just talking the talk. If an employee unwittingly allows a threat onto the network because they\u2019re unaware of the procedures, you share the blame.<\/p>\n<h3><strong>With Our Powers Combined&#8230;<\/strong><\/h3>\n<p><a href=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/powers.gif\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-12328\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/powers.gif\" alt=\"firewalls are pretty much captain planet for computers\" width=\"480\" height=\"270\"\/><\/a><\/p>\n<p>Technical! Physical! <a href=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/Shrug.jpg\" target=\"_blank\" rel=\"noopener noreferrer\">Human!<\/a> Okay, maybe this dream team of cyber security assets isn\u2019t quite as screen ready as Captain Planet\u2019s squad, but it gets the job done. Another aspect of the holistic approach is a widening of your cyber security scope beyond <a href=\"https:\/\/www.firewalls.com\/blog\/firewalls-com-network-security-glossary\/\" target=\"_blank\" rel=\"noopener noreferrer\">UTMs<\/a>. Having the most secure network money can buy will amount to nothing if the bad guys walk into your unlocked server closet, unplug your appliances, and jet. Or worse yet, you may find yourself in a Scooby Doo situation wherein <a href=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/unmask.jpg\" target=\"_blank\" rel=\"noopener noreferrer\">unmasking the bad guy<\/a> reveals someone assumed to be on your side. <a href=\"https:\/\/hbr.org\/2016\/09\/the-biggest-cybersecurity-threats-are-inside-your-company\" target=\"_blank\" rel=\"noopener noreferrer\">Insider attacks are a growing concern<\/a>&nbsp;across industries of all shapes and sizes.<\/p>\n<p>Human beings are much more likely to be the wrench in your cyber security gears. A holistic approach incorporates staff training to combat social engineering as well as physical security measures to secure your hardware from break-ins.<\/p>\n<h3>The Inevitable<\/h3>\n<p>Your company will face with a cyber attack one day. The threat of ransomware has graduated from worrisome to inevitable. In the second quarter of 2017, UK businesses experienced an <a href=\"http:\/\/www.thisismoney.co.uk\/money\/smallbusiness\/article-4677650\/Cyber-attacks-rocket-50.html#ixzz4mQyzZmmZ\" target=\"_blank\" rel=\"noopener noreferrer\">average of 105 breach attempts per day<\/a>. A holistic approach, a culture of cyber security, a security awareness mentality, Uncle Admin\u2019s Special Funtime No-No\u2019s. You can call it whatever you dream up so long as you actually implement the pillars of breach prevention. Only when we all get on the same page and work towards a common goal will the dream of vanquishing the bad guys be possible.<\/p>\n<p>I encourage you to put me out of a job. If a ransomware attack is never again recorded in the info sec archives, Firewalls.com would be thrilled. Sure, we\u2019d have to hang up our lucky engineering pants, but we could always go make Mobile games or something. Unfortunately this dream world does not yet exist. Until then, we&#8217;ll do our part in the fight.<\/p>\n<p>What&#8217;s your next step?<\/p>\n<p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.firewalls.com\/contact\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">LET&#8217;S HAVE A STRATEGY MEETING<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.<\/p>\n","protected":false},"author":5,"featured_media":12478,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-12327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Holistic Approach to Cyber Security Culture in the Workplace<\/title>\n<meta name=\"description\" content=\"Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Holistic Approach to Cyber Security Culture in the Workplace\" \/>\n<meta property=\"og:description\" content=\"Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-13T17:46:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T15:56:41+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/HolisticFtrImg.png\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"The Holistic Approach to Cyber Security: A magical concept, but what does it look like?\",\"datePublished\":\"2017-07-13T17:46:29+00:00\",\"dateModified\":\"2025-10-23T15:56:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/\"},\"wordCount\":1320,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/HolisticFtrImg.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/\",\"name\":\"Holistic Approach to Cyber Security Culture in the Workplace\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/HolisticFtrImg.png\",\"datePublished\":\"2017-07-13T17:46:29+00:00\",\"dateModified\":\"2025-10-23T15:56:41+00:00\",\"description\":\"Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/HolisticFtrImg.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/HolisticFtrImg.png\",\"width\":780,\"height\":330,\"caption\":\"cyber security culture the holistic approach to internet safety\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/holistic-approach-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Holistic Approach to Cyber Security: A magical concept, but what does it look like?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Holistic Approach to Cyber Security Culture in the Workplace","description":"Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Holistic Approach to Cyber Security Culture in the Workplace","og_description":"Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.","og_url":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2017-07-13T17:46:29+00:00","article_modified_time":"2025-10-23T15:56:41+00:00","og_image":[{"width":780,"height":330,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/HolisticFtrImg.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"The Holistic Approach to Cyber Security: A magical concept, but what does it look like?","datePublished":"2017-07-13T17:46:29+00:00","dateModified":"2025-10-23T15:56:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/"},"wordCount":1320,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/HolisticFtrImg.png","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/","url":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/","name":"Holistic Approach to Cyber Security Culture in the Workplace","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/HolisticFtrImg.png","datePublished":"2017-07-13T17:46:29+00:00","dateModified":"2025-10-23T15:56:41+00:00","description":"Cyber security culture in the workplace is a subject that is discussed frequently, but practiced rarely. Now industries are calling for a holistic approach.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/HolisticFtrImg.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/07\/HolisticFtrImg.png","width":780,"height":330,"caption":"cyber security culture the holistic approach to internet safety"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/holistic-approach-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Holistic Approach to Cyber Security: A magical concept, but what does it look like?"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=12327"}],"version-history":[{"count":31,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12327\/revisions"}],"predecessor-version":[{"id":26116,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12327\/revisions\/26116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/12478"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=12327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=12327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=12327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}