{"id":38385,"date":"2024-09-30T09:47:06","date_gmt":"2024-09-30T09:47:06","guid":{"rendered":"https:\/\/www.mfec.co.th\/uncategorized\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/"},"modified":"2024-10-17T10:27:23","modified_gmt":"2024-10-17T10:27:23","slug":"reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec","status":"publish","type":"post","link":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/","title":{"rendered":"Reduce Vulnerabilities and Prevent Attacks with Reasonable Cybersecurity from Infosec"},"content":{"rendered":"\n<p><strong><span class=\"TextRun MacChromeBold SCXW158886091 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW158886091 BCX0\">Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d <\/span><\/span><\/strong><span class=\"TextRun SCXW158886091 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW158886091 BCX0\">&#8211; <\/span><\/span><span class=\"TextRun SCXW158886091 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW158886091 BCX0\">Protect your business from start to finish with comprehensive security solutions.<\/span><\/span><span class=\"EOP SCXW158886091 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559731&quot;:720,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n\n<p><strong><span class=\"TextRun SCXW233659202 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW233659202 BCX0\">4 Cybersecurity Pain Points Businesses Face:\u00a0<\/span><\/span><span class=\"EOP SCXW233659202 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/strong><\/p>\n\n<ol type=\"1\"><li><strong><span class=\"TextRun SCXW8778889 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW8778889 BCX0\">Budget Constraints<\/span><\/span><span class=\"EOP SCXW8778889 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/strong><\/li><\/ol>\n\n<p>Many businesses face budget limitations, especially when technology evolves rapidly, investing in high-performance security solutions requires significant financial resources, making it difficult for small to medium-sized businesses to allocate sufficient funds for comprehensive protection. <\/p>\n\n<ol start=\"2\"><li><strong><span class=\"TextRun MacChromeBold SCXW26334029 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW26334029 BCX0\">Personnel Shortages<\/span><\/span><span class=\"EOP SCXW26334029 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/strong><\/li><\/ol>\n\n<p>A shortage of skilled personnel is a major issue for many organizations. Without enough experienced cybersecurity professionals, it becomes challenging to effectively plan, consult, and address security issues, leading to delays and reduced efficiency in managing security threats <\/p>\n\n<ol start=\"3\"><li><strong><span class=\"TextRun MacChromeBold SCXW34628265 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW34628265 BCX0\">The Growing Complexity of Cyber Threats<\/span><\/span><span class=\"EOP SCXW34628265 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/strong><\/li><\/ol>\n\n<p>Cyber threats are evolving rapidly, becoming increasingly sophisticated and harder to detect. This growing complexity poses a major challenge for businesses, demanding constant vigilance and up-to-date tools to effectively protect systems and data from emerging risks. <\/p>\n\n<ol start=\"4\"><li><strong><span class=\"TextRun SCXW220048800 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW220048800 BCX0\">Complexity of System Management<\/span><\/span><span class=\"EOP SCXW220048800 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\">\u00a0<\/span><\/strong><\/li><\/ol>\n\n<p>As cybersecurity infrastructure and threats have evolved over time, managing these systems has become increasingly complex. Expert knowledge is crucial for helping businesses navigate these challenges and ensuring that their systems operate securely and efficiently. <\/p>\n\n<p>       Given these challenges, it&#8217;s clear that cybersecurity is something organizations cannot overlook in today\u2019s digital age, where threats are increasingly complex. That\u2019s why cybersecurity plays a crucial role in protecting data from attacks. At MFEC, we offer end-to-end cybersecurity solutions to support customers through every step. For robust and efficient cybersecurity, businesses must implement comprehensive protection through a range of cybersecurity services, including: <\/p>\n\n<p><strong>Assessment<\/strong><\/p>\n\n<p>Beginning with a security assessment, we offer services designed to evaluate the organization\u2019s current security posture, ensuring that existing equipment and solutions are sufficient while identifying areas for improvement. If an organization has an excess of security devices, maintenance costs can become unnecessarily high. This assessment is a crucial step in ensuring that resources are utilized efficiently and effectively. <\/p>\n\n<p><strong>Consult<\/strong><\/p>\n\n<p>After assessing the pain points, the next step is consultation services. Our expert team offers tailored solutions that meet the organization\u2019s needs and comply with its standards. We also focus on thoroughly reviewing configurations to ensure that the proposed solutions operate efficiently and truly meet security needs. <\/p>\n\n<p><strong>Implement<\/strong><\/p>\n\n<p>Once the suitable solutions have been identified, MFEC\u2019s expert implementation team, experienced in working with leading security brands, ensures that the chosen solutions are installed effectively and meet security requirements. <\/p>\n\n<p><strong>Operate<\/strong><\/p>\n\n<p>Additionally, we provide post-sales services as part of our cybersecurity services to ensure ongoing support. This continuous assistance gives customers the confidence that their security systems will function effectively in the long term. <\/p>\n\n<p><strong>Cyber Security Operation Center <\/strong><strong>(CSOC)<\/strong><\/p>\n\n<p>We also offer Cyber Security Operation Center (CSOC) services in two formats: Build Full CSOC and CSOC as a Service. These services monitor and track threats 24\/7. When we detect irregularities or threats, our team alerts the customer and provides appropriate recommendations to help manage those threats efficiently and quickly. <\/p>\n\n<p><strong>Incident Response<\/strong><\/p>\n\n<p>If customers require assistance for any incidents, we are ready to provide an Incident Response service. Our expert team helps resolve the situation and restore the system to normal operations, focusing on minimizing impact and enhancing organizational security. <\/p>\n\n<p><span class=\"TextRun SCXW266056017 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW266056017 BCX0\">If your organization is looking for end-to-end cybersecurity solutions, MFEC currently offers consulting services to assess your organization\u2019s security. This will help you understand your <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW266056017 BCX0\">current status<\/span><span class=\"NormalTextRun SCXW266056017 BCX0\"> and better strengthen your security. If <\/span><span class=\"NormalTextRun SCXW266056017 BCX0\">you\u2019re<\/span><span class=\"NormalTextRun SCXW266056017 BCX0\"> interested, feel free to contact us for more information at<\/span><\/span> <a class=\"Hyperlink SCXW266056017 BCX0\" href=\"https:\/\/www.mfec.co.th\/holistic-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW266056017 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW266056017 BCX0\" data-ccp-charstyle=\"Hyperlink\">Holistic Cybersecurity \u2013 MFEC | The Leading Tech Company in Thailand<\/span><\/span><\/a><span class=\"EOP SCXW266056017 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559731&quot;:720,&quot;335559738&quot;:0,&quot;335559739&quot;:405}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d &#8211; Protect your business from start to finish with comprehensive security solutions.\u00a0 4 Cybersecurity Pain Points Businesses Face:\u00a0\u00a0 Budget Constraints\u00a0 Many businesses face budget limitations, especially when technology evolves rapidly, investing in high-performance security solutions requires significant financial resources, making it difficult for small to medium-sized businesses to allocate [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":37849,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[17,185,110],"tags":[455,461,352],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Prevent cyberattacks with Infosec&#039;s Reasonable Cybersecurity<\/title>\n<meta name=\"description\" content=\"Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d - Protect your business from start to finish with comprehensive security solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prevent cyberattacks with Infosec&#039;s Reasonable Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d - Protect your business from start to finish with comprehensive security solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\" \/>\n<meta property=\"og:site_name\" content=\"MFEC | The Leading Tech Company in Thailand\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-30T09:47:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T10:27:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1097\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"MFEC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MFEC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\",\"name\":\"MFEC | The Leading Tech Company in Thailand\",\"url\":\"https:\/\/www.mfec.co.th\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png\",\"contentUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png\",\"width\":240,\"height\":77,\"caption\":\"MFEC | The Leading Tech Company in Thailand\"},\"image\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#website\",\"url\":\"https:\/\/www.mfec.co.th\/en\/\",\"name\":\"MFEC | The Leading Tech Company in Thailand\",\"description\":\"MFEC | The Leading Tech Company in Thailand\",\"publisher\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mfec.co.th\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#primaryimage\",\"url\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg\",\"width\":1920,\"height\":1097},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\",\"url\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\",\"name\":\"Prevent cyberattacks with Infosec's Reasonable Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#primaryimage\"},\"datePublished\":\"2024-09-30T09:47:06+00:00\",\"dateModified\":\"2024-10-17T10:27:23+00:00\",\"description\":\"Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d - Protect your business from start to finish with comprehensive security solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Reduce Vulnerabilities and Prevent Attacks with Reasonable Cybersecurity from Infosec\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\"},\"author\":{\"name\":\"MFEC\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c\"},\"headline\":\"Reduce Vulnerabilities and Prevent Attacks with Reasonable Cybersecurity from Infosec\",\"datePublished\":\"2024-09-30T09:47:06+00:00\",\"dateModified\":\"2024-10-17T10:27:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg\",\"keywords\":[\"Cybersecurity\",\"Infosec\",\"MFEC\"],\"articleSection\":[\"COE\",\"Solution and Services\",\"Tech Talk\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c\",\"name\":\"MFEC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g\",\"caption\":\"MFEC\"},\"url\":\"https:\/\/www.mfec.co.th\/en\/author\/admincc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prevent cyberattacks with Infosec's Reasonable Cybersecurity","description":"Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d - Protect your business from start to finish with comprehensive security solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/","og_locale":"en_US","og_type":"article","og_title":"Prevent cyberattacks with Infosec's Reasonable Cybersecurity","og_description":"Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d - Protect your business from start to finish with comprehensive security solutions.","og_url":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/","og_site_name":"MFEC | The Leading Tech Company in Thailand","article_published_time":"2024-09-30T09:47:06+00:00","article_modified_time":"2024-10-17T10:27:23+00:00","og_image":[{"width":1920,"height":1097,"url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg","type":"image\/jpeg"}],"author":"MFEC","twitter_card":"summary_large_image","twitter_misc":{"Written by":"MFEC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.mfec.co.th\/en\/#organization","name":"MFEC | The Leading Tech Company in Thailand","url":"https:\/\/www.mfec.co.th\/en\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png","contentUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png","width":240,"height":77,"caption":"MFEC | The Leading Tech Company in Thailand"},"image":{"@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.mfec.co.th\/en\/#website","url":"https:\/\/www.mfec.co.th\/en\/","name":"MFEC | The Leading Tech Company in Thailand","description":"MFEC | The Leading Tech Company in Thailand","publisher":{"@id":"https:\/\/www.mfec.co.th\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mfec.co.th\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#primaryimage","url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg","contentUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg","width":1920,"height":1097},{"@type":"WebPage","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/","url":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/","name":"Prevent cyberattacks with Infosec's Reasonable Cybersecurity","isPartOf":{"@id":"https:\/\/www.mfec.co.th\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#primaryimage"},"datePublished":"2024-09-30T09:47:06+00:00","dateModified":"2024-10-17T10:27:23+00:00","description":"Reasonable Cybersecurity \u201cFree Security Infrastructure Assessment\u201d - Protect your business from start to finish with comprehensive security solutions.","breadcrumb":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Reduce Vulnerabilities and Prevent Attacks with Reasonable Cybersecurity from Infosec"}]},{"@type":"Article","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#article","isPartOf":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/"},"author":{"name":"MFEC","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c"},"headline":"Reduce Vulnerabilities and Prevent Attacks with Reasonable Cybersecurity from Infosec","datePublished":"2024-09-30T09:47:06+00:00","dateModified":"2024-10-17T10:27:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/"},"wordCount":580,"publisher":{"@id":"https:\/\/www.mfec.co.th\/en\/#organization"},"image":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/coe\/reduce-vulnerabilities-and-prevent-attacks-with-reasonable-cybersecurity-from-infosec\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2024\/09\/PR_Reasonable-Cybersecurity.jpg","keywords":["Cybersecurity","Infosec","MFEC"],"articleSection":["COE","Solution and Services","Tech Talk"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c","name":"MFEC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g","caption":"MFEC"},"url":"https:\/\/www.mfec.co.th\/en\/author\/admincc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/38385"}],"collection":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/comments?post=38385"}],"version-history":[{"count":3,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/38385\/revisions"}],"predecessor-version":[{"id":38388,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/38385\/revisions\/38388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/media\/37849"}],"wp:attachment":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/media?parent=38385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/categories?post=38385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/tags?post=38385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}