{"id":15738,"date":"2023-12-04T12:13:44","date_gmt":"2023-12-04T12:13:44","guid":{"rendered":"https:\/\/acora.s.nomatter.dev\/?post_type=service&#038;p=15738\/"},"modified":"2024-06-20T12:06:16","modified_gmt":"2024-06-20T12:06:16","slug":"crown-jewels-assessment","status":"publish","type":"service","link":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/","title":{"rendered":"Crown Jewels Assessment"},"excerpt":{"rendered":"<p>Protect the most valuable data at the heart of your organisation. The Crown Jewels Risk Assessment identifies your most valuable assets, helps prioritise security efforts and investment.<\/p>\n","protected":false},"parent":0,"template":"service-single.blade.php","service-category":[339,323],"service-type":[336],"service-tag":[],"class_list":["post-15738","service","type-service","status-publish","hentry","service-category-cyber-security-cs","service-category-consultancy-services","service-type-cyber-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Crown Jewels Risk Assessment - Acora<\/title>\n<meta name=\"description\" content=\"Crown Jewels Risk Assessment - In an age of persistent targeted cyber attacks, a company&#039;s crown jewels have never been more vulnerable.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crown Jewels Assessment\" \/>\n<meta property=\"og:description\" content=\"Crown Jewels Risk Assessment - In an age of persistent targeted cyber attacks, a company&#039;s crown jewels have never been more vulnerable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora NL Test\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T12:06:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2023\/12\/crown-jewels-risk-assessment-analysis.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1017\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/cyber-security-cs\\\/crown-jewels-assessment\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/cyber-security-cs\\\/crown-jewels-assessment\\\/\",\"name\":\"Crown Jewels Risk Assessment - Acora\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\"},\"datePublished\":\"2023-12-04T12:13:44+00:00\",\"dateModified\":\"2024-06-20T12:06:16+00:00\",\"description\":\"Crown Jewels Risk Assessment - In an age of persistent targeted cyber attacks, a company's crown jewels have never been more vulnerable.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/cyber-security-cs\\\/crown-jewels-assessment\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/cyber-security-cs\\\/crown-jewels-assessment\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/cyber-security-cs\\\/crown-jewels-assessment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consultancy Services\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/our-services\\\/consultancy-services\\\/cyber-security-cs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Crown Jewels Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\",\"name\":\"Acora NL Test\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Crown Jewels Risk Assessment - Acora","description":"Crown Jewels Risk Assessment - In an age of persistent targeted cyber attacks, a company's crown jewels have never been more vulnerable.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Crown Jewels Assessment","og_description":"Crown Jewels Risk Assessment - In an age of persistent targeted cyber attacks, a company's crown jewels have never been more vulnerable.","og_url":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/","og_site_name":"Acora NL Test","article_modified_time":"2024-06-20T12:06:16+00:00","og_image":[{"width":1920,"height":1017,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2023\/12\/crown-jewels-risk-assessment-analysis.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/","url":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/","name":"Crown Jewels Risk Assessment - Acora","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website"},"datePublished":"2023-12-04T12:13:44+00:00","dateModified":"2024-06-20T12:06:16+00:00","description":"Crown Jewels Risk Assessment - In an age of persistent targeted cyber attacks, a company's crown jewels have never been more vulnerable.","breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/crown-jewels-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nltest\/"},{"@type":"ListItem","position":2,"name":"Consultancy Services","item":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/"},{"@type":"ListItem","position":3,"name":"Cyber Security","item":"https:\/\/acora.s.nomatter.dev\/nltest\/our-services\/consultancy-services\/cyber-security-cs\/"},{"@type":"ListItem","position":4,"name":"Crown Jewels Assessment"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website","url":"https:\/\/acora.s.nomatter.dev\/nltest\/","name":"Acora NL Test","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nltest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service\/15738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/types\/service"}],"version-history":[{"count":19,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service\/15738\/revisions"}],"predecessor-version":[{"id":18196,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service\/15738\/revisions\/18196"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media?parent=15738"}],"wp:term":[{"taxonomy":"service-category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-category?post=15738"},{"taxonomy":"service-type","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-type?post=15738"},{"taxonomy":"service-tag","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/service-tag?post=15738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}