{"id":22404,"date":"2025-01-20T09:00:29","date_gmt":"2025-01-20T07:00:29","guid":{"rendered":"https:\/\/digitalschoolofmarketing.co.za\/?p=22404"},"modified":"2025-01-17T11:00:10","modified_gmt":"2025-01-17T09:00:10","slug":"building-a-security-operations-center-soc-for-enhanced-cybersecurity","status":"publish","type":"post","link":"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/building-a-security-operations-center-soc-for-enhanced-cybersecurity\/","title":{"rendered":"Building a Security Operations Center (SOC) for Enhanced Cybersecurity"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_3-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>the growing complexity of threats and an exponential spike in the\u2002number of attack vectors, businesses \u2014 from small gamers to global retailers \u2014 are facing <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> vulnerabilities. Several organisations are developing a Security Operations Centre (SOC) as a\u2002centralized infrastructure for observing, identifying, and responding to security events.<\/p>\n<p>A security operations centre (SOC) ensures an organisation&#8217;s more assertive\u2002security posture. With its real-time threat detection and response capabilities, it is the core of cybersecurity, allowing people, processes, and technology to come together\u2002to provide complete protection against possible attacks.<\/p>\n<h2><strong>Core Components of a Security Operations Center<\/strong><\/h2>\n<p>The Four Pillars of Success A well-designed Security Operations Center involves several core components that work together to provide effective <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity\u2002<\/a>operations. Together, these elements build a framework for a SOC\u2002to run on, allowing for real-time threat intelligence delivery.<\/p>\n<p>The first major\u2002area is the team structure. An SOC usually consists of a\u2002team of analysts, engineers, and managers who work together to monitor systems, analyse data, and respond to incidents. Roles include Tier 1 analysts, who\u2002respond to initial alerts, and Tier 3 experts, who perform deep-dive investigations and threat hunting.<\/p>\n<p>Next is technology and tools. The SOC employs a\u2002comprehensive stack of security solutions, including security information and event management (SIEM) systems, endpoint detection and response (EDR) technologies, and threat intelligence platforms. This enables the SOC to collect, analyze, and correlate massive volumes of data from disparate\u2002sources.<\/p>\n<p>Another essential part is\u2002processes and procedures. Standard operating procedures\u2002(SOPs), escalation workflows, and well-defined incident response playbooks help the SOC respond quickly and effectively to security incidents. These processes\u2002are reviewed and updated regularly to maintain alignment between the SOC and the threat landscape.<\/p>\n<p>Finally, monitoring &amp; reporting capabilities are\u2002critical. Real-time tracking of networks, applications\u2002, and endpoints facilitates insight into threats and their activities, while extensive reporting capabilities help organisations understand their security posture and compliance with statutory requirements.<\/p>\n<p>When these central components are effectively combined, a Security\u2002Operations Center can be a formidable ally in defending an organisation\u2019s digital landscape against cyber threats.<\/p>\n<h2><strong>Essential Tools for an Effective SOC<\/strong><\/h2>\n<p>Well-defined SOC processes, supported by the right mix\u2002of tools and technologies, allow <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> teams to identify, investigate and respond to potential threats in real time. These tools are at the core\u2002of proactive defence, offering visibility, automation, and actionable intelligence.<\/p>\n<p>SIEM System A Security Information and Event Management (SIEM) System is one\u2002of the core tools deployed in a SOC. SIEM solutions collect and analyse data \u2002throughout the organisation\u2019s infrastructure, providing centralised visibility. They\u2002spot unusual activity and link events to recognise patterns that suggest cyberattacks \u2014 giving early warning of possible threats.<\/p>\n<p>Endpoint Detection and Response\u2002(EDR) tools are just as critical. These tools\u2002look for malicious activity on endpoints, such as laptops, servers, and mobile devices. EDR tools provide alerts and enable responses in real-time, helping prevent malware and other attacks that\u2002target endpoints from spreading.<\/p>\n<p>Threat intelligence platforms improve the SOC\u2019s\u2002ability to predict and avert cyber threats. These platforms have become invaluable for analysts\u2002as they synthesise data across geographies to offer timely intelligence on the latest attack vectors, helping analysts guard against advanced tactics, techniques and procedures (TTPs.)<\/p>\n<p>Network monitoring tools are essential for monitoring traffic patterns, detecting anomalies, and\u2002preventing unauthorised access. These AI and machine learning tools analyse network activity for\u2002continuous visibility, enabling the security team to detect breaches before they explode.<\/p>\n<p>Automation tools such as Security\u2002Orchestration, Automation, and Response (SOAR) platforms automate and streamline an organisation&#8217;s operations. SOAR streamlines time-consuming tasks like alert triage and incident response so that cybersecurity experts have more time to devote to complex threats.<\/p>\n<p>With these tools in place, the SOC becomes a truly\u2002proactive, resilient fortress against cyber threats. These technologies strengthen an organisation&#8217;s cybersecurity posture and ensure timely and efficient real-time responses to possible breaches of critical\u2002systems and data.<\/p>\n<h2><strong>\u00a0Best Practices for Building a Security Operations Center<\/strong><\/h2>\n<p>Best Practices for Building A Successful SOC Creating a successful SOC requires following best practices that will help ensure its effectiveness and adaptability to ever-evolving\u2002cyber threats. These practices range from team structure and processes to technology implementation and continual improvement.<\/p>\n<p>Establish Clear Goals: Start by defining the key objectives of your SOC, including increased threat detection, improved\u2002incident response, and compliance. The SOC\u2002will be designed and operated based on these objectives.<\/p>\n<p>An expert team: Hire experts in cyber risk, investigation, and forensics and continuously train them to stay current on emerging technologies\u2002and threat environments.<\/p>\n<p>Not just the Right People: Build the SOC team with the right people and the right tools (state-of-the-art tools like SIEM, EDR,\u2002and SOAR platforms). Make sure these tools are stitched together and can deliver end-to-end visibility into your organisation\u2019s\u2002infrastructure.<\/p>\n<p>Implement\u2002Strong Processes: Establish clear incident response playbooks and standard operating procedures. These should define the process for\u2002responding to common threats, escalating incidents, and corresponding with stakeholders in a crisis.<\/p>\n<p>Continuous Monitoring Should Be the Focus: An ideal SOC works 24\/7 and uses automated tools for real-time visibility into systems,\u2002networks, and endpoints. It continuously assesses and enhances surveillance measures to\u2002counter new threats.<\/p>\n<p>Regular Audits: Use audits, penetration tests\u2002, and tabletop exercises to measure and evaluate the SOC&#8217;s overall performance regularly. These assessments can highlight gaps and help make\u2002improvements.<\/p>\n<p>Promote Interdepartmental Cooperation: Work with other departments, such as IT and compliance, and the SOC to develop a unified <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> plan that\u2002supports company objectives.<\/p>\n<p>A well-designed SOC can provide stability and protection and also serve as a springboard for implementing proactive security measures that keep pace with new threats. By\u2002implementing best practices in its design and operation, organisations can create a SOC that forms a key part of their overall <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> strategy in the face of constantly evolving threats.<\/p>\n<h2><strong>\u00a0Conclusion<\/strong><\/h2>\n<p>Implementing a Security Operations Center is essential\u2002for entities wishing to improve security measures. A SOC uses a\u2002combination of skilled people, advanced technology, and defined processes to provide real-time monitoring and response capability to avert modern cyber threats. Whether setting up a strong team structure or utilising technologies such as SIEM (Security Information and Event Management) and EDR (Endpoint Detection and Response), everything in a SOC revolves around securing digital assets\u2002and adhering to compliance. By following best practices and continuously improving their operations, organisations can build a SOC that reduces risk and enhances their security\u2002posture. With the cyberattack landscape increasingly becoming advanced, the security operations centre (SOC) investment is one step toward\u2002building resilience and trust in the digital space.<\/p>\n<h2><strong><a href=\"https:\/\/digitalschoolofmarketing.co.za\/contact-us\/\">GET IN TOUCH WITH THE DIGITAL SCHOOL OF MARKETING<\/a><\/strong><\/h2>\n<p>Equip yourself with the essential skills to protect digital assets and maintain consumer trust by enrolling in the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security Course<\/a>\u00a0at the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/\">Digital School of Marketing<\/a>. Join us today to become a leader in the dynamic field of cybersecurity.<\/p>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20852 size-woocommerce_single entered lazyloaded\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" alt=\"DSM Digital School of Marketing - Cyber Security\" width=\"600\" height=\"96\" data-lazy-srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" data-lazy-sizes=\"(max-width: 600px) 100vw, 600px\" data-lazy-src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" data-ll-status=\"loaded\" \/><\/a><\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Frequently Asked Questions<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-tabs style_default switch_click accordion has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"teb7\"><button class=\"w-tabs-section-header\" aria-controls=\"content-teb7\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What is a Security Operations Center (SOC)?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-teb7\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>A security operations centre (SOC) is\u2002a centralised unit that deals with security on an organisational and technical level. It unites people, processes, and technologies to safeguard an\u2002organisation\u2019s digital assets from cyber threats. The SOC works round the clock to continuously monitor the systems, networks, and applications\u2002in real-time to detect vulnerabilities and threats. Improving cybersecurity by proactively detecting\u2002and preventing threats before they spread is crucial. Soc services also facilitate regulatory compliance and assist in incident response\u2002activities. Pairing skilled people with SIEM and EDR tools and defensive processes\u2002is integral to an organisation&#8217;s overall cybersecurity strategy.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"m083\"><button class=\"w-tabs-section-header\" aria-controls=\"content-m083\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Why is a Security Operations Center important for cybersecurity?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-m083\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>It helps companies see and respond to cyber threats in real-time. With increasingly sophisticated cyber-attacks, organisations require\u2002a central system to monitor risks and vulnerabilities. The SOC aggregates data from various data sources and enables threat detection\u2002and monitoring, which leads to the proactive discovery of threats. It also ensures stakeholders comply with industry regulations\u2002\u2014 a critical aspect of establishing trust and avoiding penalties. A well-defined SOC considerably reduces downtime and total impact in case of a breach with\u2002a structured approach to incident response. This proactive approach helps fortify an organisation\u2019s defences, safeguarding sensitive data and ensuring business continuity\u2002in the face of ever-evolving cyber risks.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"r213\"><button class=\"w-tabs-section-header\" aria-controls=\"content-r213\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What tools are essential for an effective security operations centre?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-r213\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>A security operations centre works with innovative tools, providing\u2002visibility, intelligence, and automation. Key components include siem systems that analyse diverse data sources in a centralised manner and facilitate real-time alerts, tools for observability of endpoints, and threat intelligence\u2002platforms for insights into emerging threats. Network monitoring tools, many augmented by AI, measure traffic patterns and identify\u2002deviations. Soar (security orchestration, automation, and response) platforms also optimise workflows by automating alert triaging and\u2002incident response jobs. Tools\u2002such as 14 combine to improve an organisation\u2019s cybersecurity posture, allowing it to respond to threats more efficiently and proactively.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"h39f\"><button class=\"w-tabs-section-header\" aria-controls=\"content-h39f\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How can an organisation build an effective security operations centre team?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-h39f\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>This takes talented cyber security hands and builds\u2002on continuous learning. In this structure, the team usually consists of tier 1 analysts to monitor alert triage initially, tier 2 analysts for broader investigations, and tier 3 experts who perform advanced threat analysis\u2002and incident response. Security operations centre engineers manage the infrastructure and tools, and managers coordinate\u2002operations and strategy. Continuous training is also necessary to keep the team updated\u2002on the latest technologies and cyber threats. Team knowledge sharing: working with the team and\u2002other departments. Organisations can improve their capabilities in detecting and\u2002responding to cyber threats by building a skilled and dynamic security operations centre team.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"r527\"><button class=\"w-tabs-section-header\" aria-controls=\"content-r527\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What are the best practices for building a security operations centre?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-r527\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>A well-defined goal for the security operations centre, having the right people, tools, and\u2002processes in place, is essential for an effective system. Begin with defining the objectives for the SOC, e.g., enhancing threat\u2002detection and meeting compliance requirements. Provision the soc with tools,\u2002such as Siem, EDR and soar platforms, for visibility and automation. Write \u2002clear incident response playbooks and standard operating procedures to optimise the workflow. Periodic assessments, like penetration tests and audits, assist in finding gaps and pushing\u2002for maturation. Facilitating cooperation between the security operations centre and other departments promotes organisational\u2002goal alignment. These activities build a resilient SOC that fortifies cybersecurity\u2002postures.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"d6b1\"><button class=\"w-tabs-section-header\" aria-controls=\"content-d6b1\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\"> How does a SOC improve an organisation\u2019s cybersecurity posture?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-d6b1\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Real-time colour monitoring, threat\u2002identification, and occurrence reaction features from a SOC help to increase cybersecurity. It detects vulnerabilities and addresses\u2002risks before they can be leveraged, minimising the risk of data breaches and operational downtime. These tools, including SIEM and EDR, allow the SOC to record and review activity across the organisation in\u2002real-time, giving security teams actionable intelligence on potential threats. Above and beyond, it helps meet regulatory standards, creating stakeholder confidence. Revising them frequently\u2002helps ensure that processes and technologies within the SOC remain attuned to changes in the cyber threat landscape. In conclusion, a SOC makes an organisation more resilient, protects its\u2002digital assets, and prepares it to face new challenges in the cybersecurity space.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper align_justify\"><a class=\"w-btn us-btn-style_2\" href=\"#enquiry\"><span class=\"w-btn-label\">Enquire Today<\/span><\/a><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Blog Categories<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/blog\/content-marketing\/\">Content Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/digital-marketing\/\">Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/cyber-security-blog\/\">Cyber Security<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/graphic-design-blog\/\">Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/blog\/public-relations\/\">Public Relations<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/blog\/seo\/\">SEO<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/social-media-marketing\/\">Social Media Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/web-design-blog\/\">Web Design<\/a><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">You might also like<\/span><\/span><\/h3><div class=\"w-html\"><ul><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/social-media-marketing-blog\/zero-moment-of-truth-benefit-social-media-marketing\/\" rel=\"bookmark\">Use the Zero Moment of Truth to Benefit your Social Media Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/your-complete-guide-to-ppc-marketing-basic\/\" rel=\"bookmark\">Your Complete Guide to PPC Marketing Basics. Find out more.<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/blog\/you-can-convey-a-lot-of-meaning-with-just-one-graphic\/\" rel=\"bookmark\">You Can Convey a Lot Of Meaning With Just One Graphic<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/would-you-make-a-great-marketing-manager\/\" rel=\"bookmark\">Would you make a great marketing manager?<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-with-bona-magazine-and-the-digital-school-of-marketing\/\" rel=\"bookmark\">Win with Bona Magazine and the Digital School of Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-a-digital-marketing-course-valued-at-r12-000\/\" rel=\"bookmark\">Win a Digital Marketing Course Valued at  R12 000<\/a><\/li><\/ul><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Top Selling COurses<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/courses\/digital-marketing-course\/\">Intermediate Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/courses\/advanced-digital-marketing-course\/\">Advanced Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/courses\/social-media-marketing-course\/\">Intermediate Social media marketing<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/courses\/digital-brand-management-course\/\">Brand Management<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/courses\/graphic-design-course\/\">Basic Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-6\"><a href=\"\/courses\/advanced-graphic-design-course\/\">Advanced Graphic design<\/a><\/li>\n<li class=\"cat-item cat-item-7\"><a href=\"\/courses\/national-certificate-of-advertising\/\">National Certificate of Advertising<\/a><\/li>\n<li class=\"cat-item cat-item-8\"><a href=\"\/courses\/national-diploma-of-copywriting-course\/\">National Diploma of Copyrighting<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":950,"featured_media":22406,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[771],"tags":[],"class_list":["post-22404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/22404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/users\/950"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/comments?post=22404"}],"version-history":[{"count":0,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/22404\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media\/22406"}],"wp:attachment":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media?parent=22404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/categories?post=22404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/tags?post=22404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}