{"id":4913,"date":"2020-03-17T17:17:43","date_gmt":"2020-03-18T00:17:43","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4913"},"modified":"2020-05-06T10:26:50","modified_gmt":"2020-05-06T17:26:50","slug":"preparing-employees-to-be-cyber-safe-when-working-from-home","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/","title":{"rendered":"Preparing Employees to Be Cybersafe when Working from Home"},"content":{"rendered":"<p>As companies across sectors encourage\u2014and even mandate\u2014that their employees work from home to protect themselves and others from the spread of coronavirus, IT professionals are tasked with the increasingly complex and challenging responsibility of cyber safety for employees\u2019 devices and companies\u2019 networks.<\/p>\n<p>Last Friday, the <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-073a\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">U.S. Cybersecurity and Infrastructure Security Agency (CISA), issued an alert<\/span><\/a> that individuals and organizations are likely to face increased cyberthreats from malicious actors attempting to target weakened network security as a result of more people teleworking.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4921 size-large\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-WFH-1024x672.jpg\" alt=\"Learn cyber safety guidelines when working from home.\" width=\"1024\" height=\"672\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH-1024x672.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH-300x197.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH-768x504.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/photo-WFH.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>For organizations that already offer work-from-home options for all or many of their employees, their network infrastructure and institutional awareness are most likely prepared to protect them from outside cyberthreats. But for companies and employees where the option to work from home is new, it is important that IT professionals and individual employees take the steps necessary to prevent attacks.<\/p>\n<p>Infoblox recommends that businesses implement the following guidelines and best practices to ensure the security of their networks and corporate data while employees are working from home.<\/p>\n<h3>Develop and communicate clear and consistent cyber safety policies<\/h3>\n<p>It is essential that employees have clearly defined IT policies and protocols in place for working from home. These cyber safety guidelines should include, but are not limited to:<\/p>\n<ul>\n<li>Making sure that employees use only approved devices to access and store corporate data, where possible;<\/li>\n<li>Mandating the use of strong passwords\u2014at least 12 characters\u2014when accessing corporate networks; and<\/li>\n<li>Implementing multi-factor authentication\u2014ideally with hardware tokens instead of text messages (which can be spoofed).<\/li>\n<\/ul>\n<h3>Leverage technological solutions for cyber safety<\/h3>\n<p>Companies most likely already have a robust security infrastructure in place to ensure the cyber safety of their corporate networks. With users increasingly working from home, the traditional corporate security perimeter has vanished and VPNs are often no longer necessary to get work done. Instead, employees are increasingly using cloud applications, many of which have not been vetted for security issues.<\/p>\n<p>Network managers and security teams need to ensure that technologies used when working from home are ready and secure, including:<\/p>\n<ul>\n<li>Ensuring that all corporate security products are patched and updated to the most recent version across users;<\/li>\n<li>Providing a fast, secure, reliable and easy way to protect users, enforce acceptable use policies and ensure business continuity; and<\/li>\n<li>If they continue to use VPNs, ensuring that they are encrypted, updated and protected with strong passwords and 2-factor authentication; and<\/li>\n<li>Increasing the monitoring of endpoint, email and remote access security events.<\/li>\n<\/ul>\n<h3>Educate employees about the increased risk of cyberthreats<\/h3>\n<p>Above all, employers should make sure that employees are aware of the increased risk of cyberthreats tied to the coronavirus pandemic and train them on how to avoid them, including:<\/p>\n<ul>\n<li>Alerting employees to expect an increase in phishing attempts and other malware, and to not respond to any emails seeking personal, corporate or financial information;<\/li>\n<li>Reminding employees that malicious actors often disguise themselves using legitimate-looking email addresses and to verify a sender\u2019s identity before clicking on a link in an email; avoid clicking on links in unsolicited emails; and to be wary of email attachments (for example, malicious actors are using fears of <a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--62\" target=\"_blank\" rel=\"noopener noreferrer\">coronavirus<\/a> to distribute the LokiBot malware);<\/li>\n<li>Teaching employees how to make sure their work-from-home setup is secure and that WiFi and other devices are properly configured; and<\/li>\n<li>Re-enforcing with employees the importance of reporting suspected security events.<\/li>\n<\/ul>\n<p>As networks continue to be more decentralized and more employees take advantage of the benefits of working from home, securing networks from malware and other cyberthreats will remain a challenge. Emphasizing and implementing these cyber safety best practices for working from home will help IT managers ensure that corporate networks remain cyber-safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As companies across sectors encourage\u2014and even mandate\u2014that their employees work from home to protect themselves and others from the spread of coronavirus, IT professionals are tasked with the increasingly complex and challenging responsibility of cyber safety for employees\u2019 devices and companies\u2019 networks. Last Friday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), issued an alert [&hellip;]<\/p>\n","protected":false},"author":192,"featured_media":4922,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[189,15,248],"class_list":{"0":"post-4913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-cybersecurity","9":"tag-security","10":"tag-work-from-home","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Prepare Employees for Cyber Safety when Working from Home<\/title>\n<meta name=\"description\" content=\"Infoblox recommends that businesses implement Cyber Safety guidelines and best practices to ensure their network security while employees work remotely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparing Employees to Be Cybersafe when Working from Home\" \/>\n<meta property=\"og:description\" content=\"Infoblox recommends that businesses implement Cyber Safety guidelines and best practices to ensure their network security while employees work remotely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-18T00:17:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/thumb-WFH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ed Hunter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ed Hunter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/\"},\"author\":{\"name\":\"Ed Hunter\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e4216692b4e13f6d3391c3fdf8ea459a\"},\"headline\":\"Preparing Employees to Be Cybersafe when Working from Home\",\"datePublished\":\"2020-03-18T00:17:43+00:00\",\"dateModified\":\"2020-05-06T17:26:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/\"},\"wordCount\":620,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/thumb-WFH.jpg\",\"keywords\":[\"Cybersecurity\",\"Security\",\"Work From Home\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/\",\"name\":\"How to Prepare Employees for Cyber Safety when Working from Home\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/thumb-WFH.jpg\",\"datePublished\":\"2020-03-18T00:17:43+00:00\",\"dateModified\":\"2020-05-06T17:26:50+00:00\",\"description\":\"Infoblox recommends that businesses implement Cyber Safety guidelines and best practices to ensure their network security while employees work remotely.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/thumb-WFH.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/thumb-WFH.jpg\",\"width\":725,\"height\":483},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/preparing-employees-to-be-cyber-safe-when-working-from-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Preparing Employees to Be Cybersafe when Working from Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e4216692b4e13f6d3391c3fdf8ea459a\",\"name\":\"Ed Hunter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_192_1585668215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_192_1585668215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_192_1585668215-96x96.jpg\",\"caption\":\"Ed Hunter\"},\"description\":\"Ed Hunter, CISO, leads the Infoblox Information security security team. He came to Infoblox from Palo Alto Networks, where he founded the security information security team and program. Previous roles include various firms in manufacturing, research and defense.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ed-hunter\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Prepare Employees for Cyber Safety when Working from Home","description":"Infoblox recommends that businesses implement Cyber Safety guidelines and best practices to ensure their network security while employees work remotely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/","og_locale":"en_US","og_type":"article","og_title":"Preparing Employees to Be Cybersafe when Working from Home","og_description":"Infoblox recommends that businesses implement Cyber Safety guidelines and best practices to ensure their network security while employees work remotely.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/","og_site_name":"Infoblox Blog","article_published_time":"2020-03-18T00:17:43+00:00","article_modified_time":"2020-05-06T17:26:50+00:00","og_image":[{"width":725,"height":483,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/thumb-WFH.jpg","type":"image\/jpeg"}],"author":"Ed Hunter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ed Hunter","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/"},"author":{"name":"Ed Hunter","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e4216692b4e13f6d3391c3fdf8ea459a"},"headline":"Preparing Employees to Be Cybersafe when Working from Home","datePublished":"2020-03-18T00:17:43+00:00","dateModified":"2020-05-06T17:26:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/"},"wordCount":620,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/thumb-WFH.jpg","keywords":["Cybersecurity","Security","Work From Home"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/","url":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/","name":"How to Prepare Employees for Cyber Safety when Working from Home","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/thumb-WFH.jpg","datePublished":"2020-03-18T00:17:43+00:00","dateModified":"2020-05-06T17:26:50+00:00","description":"Infoblox recommends that businesses implement Cyber Safety guidelines and best practices to ensure their network security while employees work remotely.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/thumb-WFH.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/thumb-WFH.jpg","width":725,"height":483},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/preparing-employees-to-be-cyber-safe-when-working-from-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Preparing Employees to Be Cybersafe when Working from Home"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e4216692b4e13f6d3391c3fdf8ea459a","name":"Ed Hunter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_192_1585668215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_192_1585668215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_192_1585668215-96x96.jpg","caption":"Ed Hunter"},"description":"Ed Hunter, CISO, leads the Infoblox Information security security team. He came to Infoblox from Palo Alto Networks, where he founded the security information security team and program. Previous roles include various firms in manufacturing, research and defense.","url":"https:\/\/www.infoblox.com\/blog\/author\/ed-hunter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/192"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4913"}],"version-history":[{"count":12,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4913\/revisions"}],"predecessor-version":[{"id":5104,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4913\/revisions\/5104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4922"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}