{"id":15570,"date":"2024-01-03T13:48:25","date_gmt":"2024-01-03T13:48:25","guid":{"rendered":"https:\/\/acora.s.nomatter.dev\/?p=15570"},"modified":"2024-05-24T14:50:01","modified_gmt":"2024-05-24T14:50:01","slug":"the-3-golden-rules-of-information-security","status":"publish","type":"post","link":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/","title":{"rendered":"The 3 Golden Rules of Information Security"},"content":{"rendered":"<p>A security incident can have devastating consequences when you take into account lost revenue, lost customer and employee trust, regulatory fines and damage to an organisation\u2019s reputation. Whilst it is often the stories about the big brands that make the press, the financial impact of suffering a data breach remains high for companies of all shapes and sizes, and cyber protection is a priority for all<\/p>\n<p>According to a 2023 report from <a href=\"https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\" rel=\"external noopener noreferrer\" data-wpel-link=\"external\">IBM<\/a> and the Ponemon Institute, the average total cost of a data breach was $4.45 million, a 15% increase over 3 years. And the longer it takes to respond, the greater the damage will be. Considering companies take about 197 days to identify and 69 days to contain a breach, being able to defend against breaches and react quickly to incidents can help ensure against both financial and reputational losses.<\/p>\n<p>As a full spectrum cyber security solutions provider, we work hard to cover all bases for our clients, enabling them to be cyber resilient and to minimise threats and losses. Our team of cyber experts provide both the tools and measures to protect against serious cyber security threats and to respond quickly to any cyber incidents.<\/p>\n<h3>In order to stop cyber criminals in their tracks, here at Acora we live and breathe by our 3 golden rules of Information Security; Protection, Detection and Reaction.<\/h3>\n<h2><span class=\"ez-toc-section\" id=\"PROTECTION\"><\/span>PROTECTION:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We provide the technology, processes and practices required to protect networks, data, devices and applications from attack. Our integrated fabric of security controls provide advanced protection to counter the ever evolving nature of security threats. We support any-vendor-any-device, so are best placed to recommend the best solution set for you. As a\u00a0<a href=\"https:\/\/acora.s.nomatter.dev\/about-us\/our-partners\/fortinet\/\" data-wpel-link=\"internal\">Fortinet UK Partner of Excellence<\/a>, we can advise on and support all of their leading security applications.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"DETECTION\"><\/span>DETECTION:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With updates being made to your network and human error frequently being a factor, there is always the risk that security threats bypass your protection defences to gain entry to your network. The speed of detection is critical in the event of a breach. Our highly skilled security analysts and threat intelligence personnel are on hand 24\/7 to detect and respond to the latest cyber-threats. Through our range of comprehensive managed security services, we can monitor systems, highlight vulnerabilities and detect intrusions. As one of the few\u00a0managed security service providers\u00a0to deliver full-spectrum security whilst supporting <a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/managed-services\/cyber-security\/device-security\/\">any-vendor any-device<\/a>, we can recognise and respond to breaches no matter what security platforms you are using.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"REACTION\"><\/span>REACTION:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Containing a breach quickly is critical. Working towards the worst-case scenario of \u2018it\u2019s not if, but when\u2019, we can work with you to develop an effective cyber incident response plan. We can go one step further and take care of the \u201cheavy lifting\u201d of incident response on your behalf. Working as part of your organisation we will be ready to act on any security breach however large, undertaking all aspects of <a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/managed-services\/cyber-security\/incident-response\/\">response<\/a>, including threat intelligence, vulnerability management and forensic analysis.<\/p>\n<p>With security attacks becoming more frequent and complex, you simply cannot afford to cut corners. Organisations must be able to recognise the signs of an attack, and be ready to act on any security breach, however large.<\/p>\n<p>With more than 15 years experience in implementing mission-critical data security, risk, and\u00a0compliance\u00a0programs, we believe that a culture of preparedness is the only way to be cyber resilient.<\/p>\n<h3>ARE YOU CYBER READY? TALK TO ACORA ABOUT the best way of Implementing our 3 golden rules of\u00a0 information security<\/h3>\n<p>Get in touch with the Acora team to discuss how our full-spectrum security services can minimise the cyber risk to your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security incident can have devastating consequences when you take into account lost revenue, lost customer and employee trust, regulatory fines and damage to an organisation\u2019s reputation. Whilst it is often the stories about the big brands that make the&#8230;<\/p>\n","protected":false},"author":16,"featured_media":15576,"comment_status":"closed","ping_status":"open","sticky":false,"template":"full-width-single-post.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[348],"tags":[],"class_list":["post-15570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The 3 Golden Rules of Information Security<\/title>\n<meta name=\"description\" content=\"To stop cyber criminals in their tracks Acora operate using the following 3 rules of information security: Protection, detection &amp; reaction\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 3 Golden Rules of Information Security\" \/>\n<meta property=\"og:description\" content=\"To stop cyber criminals in their tracks Acora operate using the following 3 rules of information security: Protection, detection &amp; reaction\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora Netherlands\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-03T13:48:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-24T14:50:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2023\/11\/golden-rules-of-information-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Acora Press Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Acora Press Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/\"},\"author\":{\"name\":\"The Acora Press Team\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"headline\":\"The 3 Golden Rules of Information Security\",\"datePublished\":\"2024-01-03T13:48:25+00:00\",\"dateModified\":\"2024-05-24T14:50:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/\"},\"wordCount\":599,\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2023\\\/11\\\/golden-rules-of-information-security.jpg\",\"articleSection\":[\"Announcements\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/\",\"name\":\"The 3 Golden Rules of Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2023\\\/11\\\/golden-rules-of-information-security.jpg\",\"datePublished\":\"2024-01-03T13:48:25+00:00\",\"dateModified\":\"2024-05-24T14:50:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"description\":\"To stop cyber criminals in their tracks Acora operate using the following 3 rules of information security: Protection, detection & reaction\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2023\\\/11\\\/golden-rules-of-information-security.jpg\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2023\\\/11\\\/golden-rules-of-information-security.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"The 3 golden rules of information security & cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/announcements\\\/the-3-golden-rules-of-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/category\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The 3 Golden Rules of Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/\",\"name\":\"Acora Netherlands\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\",\"name\":\"The Acora Press Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"caption\":\"The Acora Press Team\"},\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/author\\\/marketingteamacora-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The 3 Golden Rules of Information Security","description":"To stop cyber criminals in their tracks Acora operate using the following 3 rules of information security: Protection, detection & reaction","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"The 3 Golden Rules of Information Security","og_description":"To stop cyber criminals in their tracks Acora operate using the following 3 rules of information security: Protection, detection & reaction","og_url":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/","og_site_name":"Acora Netherlands","article_published_time":"2024-01-03T13:48:25+00:00","article_modified_time":"2024-05-24T14:50:01+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2023\/11\/golden-rules-of-information-security.jpg","type":"image\/jpeg"}],"author":"The Acora Press Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Acora Press Team","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#article","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/"},"author":{"name":"The Acora Press Team","@id":"https:\/\/acora.s.nomatter.dev\/nl\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"headline":"The 3 Golden Rules of Information Security","datePublished":"2024-01-03T13:48:25+00:00","dateModified":"2024-05-24T14:50:01+00:00","mainEntityOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/"},"wordCount":599,"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2023\/11\/golden-rules-of-information-security.jpg","articleSection":["Announcements"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/","url":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/","name":"The 3 Golden Rules of Information Security","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2023\/11\/golden-rules-of-information-security.jpg","datePublished":"2024-01-03T13:48:25+00:00","dateModified":"2024-05-24T14:50:01+00:00","author":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"description":"To stop cyber criminals in their tracks Acora operate using the following 3 rules of information security: Protection, detection & reaction","breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2023\/11\/golden-rules-of-information-security.jpg","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2023\/11\/golden-rules-of-information-security.jpg","width":1920,"height":1080,"caption":"The 3 golden rules of information security & cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/announcements\/the-3-golden-rules-of-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/acora.s.nomatter.dev\/nl\/news\/category\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"The 3 Golden Rules of Information Security"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nl\/#website","url":"https:\/\/acora.s.nomatter.dev\/nl\/","name":"Acora Netherlands","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/acora.s.nomatter.dev\/nl\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267","name":"The Acora Press Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","caption":"The Acora Press Team"},"url":"https:\/\/acora.s.nomatter.dev\/nl\/news\/author\/marketingteamacora-com\/"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts\/15570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/comments?post=15570"}],"version-history":[{"count":5,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts\/15570\/revisions"}],"predecessor-version":[{"id":16729,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts\/15570\/revisions\/16729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/media\/15576"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/media?parent=15570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/categories?post=15570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/tags?post=15570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}