{"id":2249,"date":"2010-10-10T00:00:00","date_gmt":"2010-10-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/10\/global-critical-infrastructure-increasingly-being-penetrated-by-cyber-crooks\/"},"modified":"2021-12-30T11:40:56","modified_gmt":"2021-12-30T11:40:56","slug":"global-critical-infrastructure-increasingly-being-penetrated-by-cyber-crooks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/10\/global-critical-infrastructure-increasingly-being-penetrated-by-cyber-crooks\/","title":{"rendered":"Global Critical Infrastructure Increasingly Being Penetrated By Cyber Crooks"},"content":{"rendered":"<p>A new study called &#8216;Symantec 2010 Critical Infrastructure Protection Study has been conducted by the security firm Symantec that shows how frequent criminals do that.  According to Mark Bregman, Chief Technology Officer at Symantec, half of the organizations surveyed stated that they had experienced politically provoked attacks in the past, as reported by investors on October 6, 2010.  Only one third of the respondents were found to be extremely ready against such risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As per the report, among those who have been already targeted, companies usually reported sustaining around 10 attacks in the last five years.<\/p>\n<p>Cris Paden, a Symantec Spokesman stated that the Stuxnet worm was an instance that politically provoked attacks, while unusual, was real and could be successful, as reported by SCMagazineUS on October 7, 2010.<\/p>\n<p>http:\/\/www.spamfighter.com\/News-15211-Global-Critical-Infrastructure-Increasingly-Being-Penetrated-By-Cyber-Crooks.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2249","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2249"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2249\/revisions"}],"predecessor-version":[{"id":4736,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2249\/revisions\/4736"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}