{"id":153353,"date":"2016-12-15T14:19:00","date_gmt":"2016-12-15T19:19:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/"},"modified":"2016-12-15T14:19:00","modified_gmt":"2016-12-15T19:19:00","slug":"weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/weekly-tech-tip-establish-security-practices-and-policies-to-protect-sensitive-information\/","title":{"rendered":"Weekly Tech Tip: Establish security practices and policies to protect sensitive information"},"content":{"rendered":"
Establish policies on how employees should handle and protect personally identifiable information and other sensitive data. Clearly outline the consequences of violating your business’s cybersecurity policies.<\/p>\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Establish policies on how employees should handle and protect personally identifiable information and other sensitive data. Clearly outline the consequences of violating your business’s cybersecurity policies.<\/p>\n","protected":false},"author":5,"featured_media":153355,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-153353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\n