{"id":1732,"date":"2003-11-03T00:00:00","date_gmt":"2003-11-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/03\/uk-firms-fare-poorly-in-virus-protection\/"},"modified":"2021-12-30T11:39:54","modified_gmt":"2021-12-30T11:39:54","slug":"uk-firms-fare-poorly-in-virus-protection","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/03\/uk-firms-fare-poorly-in-virus-protection\/","title":{"rendered":"UK firms fare poorly in virus protection"},"content":{"rendered":"<p>BRITISH firms are among the most lax in western Europe when it comes to electronic security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite new virus threats appearing regularly, almost one third of all companies in the region have failed to take any measures against digital attack, according to a survey by the McAfee security division of software firm Network Associates.<\/p>\n<p>The level of preparedness varies by country, with 12 per cent of German firms saying they remain undefended from such attacks while 42 per cent of British firms and 43 per cent of Dutch firms are unprotected.<\/p>\n<p>More info: [url=http:\/\/www.business.scotsman.com\/technology.cfm?id=1198692003]http:\/\/www.business.scotsman.com\/technology.cfm?id=1198692003[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1732","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1732"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1732\/revisions"}],"predecessor-version":[{"id":4219,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1732\/revisions\/4219"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}