{"id":5151,"date":"2015-07-28T21:50:08","date_gmt":"2015-07-29T13:50:08","guid":{"rendered":"http:\/\/vspherestorage.com\/?p=5151"},"modified":"2015-07-28T21:50:09","modified_gmt":"2015-07-29T05:50:09","slug":"this-security-procedure-takes-five-seconds-and","status":"publish","type":"post","link":"https:\/\/vspherestorage.com\/?p=5151","title":{"rendered":"This security procedure takes five seconds and&#8230;"},"content":{"rendered":"<p>This security procedure takes five seconds and could save your business millions<\/p>\n<p><a href='http:\/\/vmw.re\/1VMvJSc' target='_blank'><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/cae0034b-72d9-489c-b801-675a92b19cdc\/?size=Box320'><\/a><\/p>\n<h4><a href='http:\/\/vmw.re\/1VMvJSc' style='text-decoration: none;' target='_blank'>This security procedure takes five seconds and&#8230;<\/a><\/h4>\n<p>Implementing a simple five second security process using two-factor authentication could prevent a data breach, potentially avoiding breathtaking costs<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.vmware.com' target='_blank'>VMware Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This security procedure takes five seconds and could save your business millions This security procedure takes five seconds and&#8230; Implementing a simple five second security process using two-factor authentication could prevent a data breach, potentially avoiding breathtaking costs VMware Advocacy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-5151","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4m26N-1l5","jetpack-related-posts":[{"id":13740,"url":"https:\/\/vspherestorage.com\/?p=13740","url_meta":{"origin":5151,"position":0},"title":"VMware Report Warns of Deepfake Attacks and&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"? The findings from our 2022 Global Incident Response Threat Report are in. Download the report now to learn how the global threat landscape has evolved and the key areas that security leaders must prioritize, including cyber pro wellness:VMware Report Warns of Deepfake Attacks and...The Global Incident Response Threat Report\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11907,"url":"https:\/\/vspherestorage.com\/?p=11907","url_meta":{"origin":5151,"position":1},"title":"5 Steps to Less Risky Remote Work","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"5 Steps to Less Risky Remote Work5 Steps to Less Risky Remote WorkIn early 2020, remote work skyrocketed by more than 70%. And cybercriminals took advantage immediately. From February to March 2020 alone, ransomware attacks increased by over 148%. This sharp rise in activity calls for a look at cybersecurity\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":780,"url":"https:\/\/vspherestorage.com\/?p=780","url_meta":{"origin":5151,"position":2},"title":"vSphere 6 Security Webinar","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"vSphere 6 Security WebinarvSphere 6 Security WebinarJust a reminder on the vSphere 6 Webcast series. The next webcast will be on the topic of vSphere 6 Security happening on June 16 at 9am PST. Security at the top of mind? Learn about security in vSphere 6 including considerations for Platform\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2193,"url":"https:\/\/vspherestorage.com\/?p=2193","url_meta":{"origin":5151,"position":3},"title":"Removing VMware Data Security after vShield to&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"Removing #VMware Data Security after #vShield to #NSX upgradeRemoving VMware Data Security after vShield to...An existing vShield environment can be upgraded to a full NSX environment, as described in my VCIX post \u201cUpgrade VMware NSX Components\u201d. All vShield components can be upgraded, except for one; vShield Data Security. The documentation\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14471,"url":"https:\/\/vspherestorage.com\/?p=14471","url_meta":{"origin":5151,"position":4},"title":"The Security Toolbox: 8 In-Demand Cybersecurity&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"The Security Toolbox: 8 In-Demand Cybersecurity JobsThe Security Toolbox: 8 In-Demand Cybersecurity...This blog is part of a series to help organizations of any size optimize their security. Our experts provide insights and recommendations based on common security use cases, customer questions, and security software developer needs. If you\u2019re a technical\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14475,"url":"https:\/\/vspherestorage.com\/?p=14475","url_meta":{"origin":5151,"position":5},"title":"The Security Toolbox: 8 In-Demand Cybersecurity&#8230;","author":"Mostafa Khalil","date":"11 years ago","format":false,"excerpt":"The Security Toolbox: 8 In-Demand Cybersecurity JobsThe Security Toolbox: 8 In-Demand Cybersecurity...This blog is part of a series to help organizations of any size optimize their security. Our experts provide insights and recommendations based on common security use cases, customer questions, and security software developer needs. If you\u2019re a technical\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/5151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5151"}],"version-history":[{"count":1,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/5151\/revisions"}],"predecessor-version":[{"id":5152,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=\/wp\/v2\/posts\/5151\/revisions\/5152"}],"wp:attachment":[{"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vspherestorage.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}