{"id":35108,"date":"2019-09-12T16:31:08","date_gmt":"2019-09-12T23:31:08","guid":{"rendered":"https:\/\/careersingovernment.com\/tools\/?p=35108"},"modified":"2019-09-12T16:31:10","modified_gmt":"2019-09-12T23:31:10","slug":"information-governance-insights-repeat-after-me-cyber-security-is-everyones-business","status":"publish","type":"post","link":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/","title":{"rendered":"Information Governance Insights: Repeat After Me &#8211; Cyber Security is Everyone&#8217;s Business"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.19.9&#8243; background_image=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg&#8221; custom_padding=&#8221;24.3906px|0px|0|0px|false|false&#8221;][et_pb_row custom_padding=&#8221;6px|0px|143px|0px&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][et_pb_text _builder_version=&#8221;3.19.9&#8243; text_font=&#8221;PT Sans||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;72&#8243; text_font_size_tablet=&#8221;52&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.1em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; max_width=&#8221;900px&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;0px||0px|&#8221;]<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\">Information Governance Insights:<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Repeat After Me &#8211; Cyber Security is Everyone&#8217;s Business<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;0px|0px|24.3906px|0px&#8221;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; custom_padding=&#8221;35px||0px|&#8221; custom_padding_tablet=&#8221;0px|||&#8221; column_padding_mobile=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/03\/robin-woolen.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.74&#8243; animation=&#8221;off&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_text disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Sans|on|||&#8221; text_text_color=&#8221;#02b875&#8243; text_font_size=&#8221;20&#8243; text_line_height=&#8221;1.2em&#8221; header_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;140px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;20px||0px|&#8221;]<span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.careersingovernment.com\/tools\/author\/robinw\/\" target=\"_blank\" rel=\"noopener noreferrer\">ROBIN WOOLEN<\/a><\/span><br \/>\n[\/et_pb_text][et_pb_text disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.62&#8243; text_font=&#8221;PT Serif||on||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;16&#8243; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;140px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;10px||60px|&#8221;]Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management.<br \/>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.19.9&#8243; text_font=&#8221;PT Serif||||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;24&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.5em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; max_width=&#8221;720px&#8221; custom_margin=&#8221;0px||0px|&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">\u201cHacks\u201d and Identity Theft have been around for a very long time, but over the past few years, the hackers have changed tactics and are targeting whole systems for attack. Ransomware is the latest incarnation of this where clicking on a single email can launch an attack that will lock down an entire organization and render their computer inaccessible until a \u201cransom\u201d is paid to the hacker for the promise of an access code to unlock the system.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What started in the financial services sector quickly jumped to healthcare providers and has most recently begun showing up in the Governmental sector. Entire cities have been shut down for days due to such attacks. The practice is so prevalent that Insurance companies are now offering policies to pay off hackers in the event of a successful attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of these ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs. Entire organizations are shut down because someone opened a phishing email and exposed their systems, which were not current with the latest operating system or security patches, to the attack. So, in reality, it was a lack of training and deferred maintenance that caused the problem. These are the types of issues Information Governance professionals must deal with every day.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.74&#8243; background_color=&#8221;#f7f7f4&#8243; custom_padding=&#8221;0px||0px|&#8221;][et_pb_row make_fullwidth=&#8221;on&#8221; custom_width_px=&#8221;680px&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding=&#8221;0px||0px|&#8221; make_equal=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; background_color_2=&#8221;#efefe9&#8243; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber2.jpg&#8221; show_bottom_space=&#8221;off&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.19.9&#8243; animation=&#8221;off&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; background_color=&#8221;#efefe9&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber3.jpg&#8221; show_bottom_space=&#8221;off&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.19.9&#8243; animation=&#8221;off&#8221;][\/et_pb_image][et_pb_text disabled_on=&#8221;off|off|&#8221; _builder_version=&#8221;3.19.9&#8243; text_font=&#8221;PT Serif||||&#8221; text_text_color=&#8221;#818178&#8243; text_font_size=&#8221;24&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;20%|10%||10%&#8221; custom_margin_tablet=&#8221;|10%||10%&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">All of these ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Sans|on|||&#8221; text_text_color=&#8221;#888888&#8243; text_font_size=&#8221;12&#8243; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;20px||20%|&#8221; custom_margin_tablet=&#8221;20px|||&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;]ROBIN WOOLEN<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;0px||0px|&#8221;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;4&#8243; custom_padding=&#8221;20px||0px|&#8221; custom_padding_tablet=&#8221;0px|||&#8221; column_padding_mobile=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; parallax_method_3=&#8221;off&#8221; parallax_method_4=&#8221;off&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.19.9&#8243; text_font=&#8221;||||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;30px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;60px||0px|&#8221; custom_margin_tablet=&#8221;40px||0px|&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s start by addressing the training issue first: Nobody wants to be the one that takes down their entire organization due to something they did, but they can\u2019t help out if they don\u2019t know how to spot malicious emails that make through the firewall. This takes constant training and reminders to what is going on in the cyber world, how it can affect them and what they can do to deal with it effectively. Training is one of the easiest and most cost-effective ways to deal with cyberattacks because most attacks are aimed at the individual rather than a system. If you can educate your staff to these threats you will go a long way to plugging the holes in your security program.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now let&#8217;s talk about the real elephant in the room &#8211; deferred maintenance.\u00a0 The WannaCry virus exposed a dirty little secret that many, if not all, organizations have been dealing with forever. As odd as it may seem entire international organizations were taken down because they are still running on the Microsoft Vista operating system. This really shouldn&#8217;t be so unfamiliar when you think that most organizations have an old system that runs some critical functions with customization done over time that now simply can&#8217;t be upgraded without a substantial financial commitment nobody is willing to make.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To be honest, deferred maintenance is something that has always happened and probably always will. As long as Information Technology can keep it going there never was an issue. It is only now with these attacks that an organization may have to rethink how they plan their upgrade schedule because of the risk these systems represent. It is the responsibility of the information technology department to inform Management of these vulnerabilities, but it is Management\u2019s responsibility to take these warnings seriously and budget accordingly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So as you can see, cybersecurity is really everyone\u2019s business. The information technology department can only do so much to keep the wolves at bay. It is up to everyone to be aware of tactics being used, how to respond to them and for Management to understand that the risk of deferred maintenance has become more critical.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;75px|0px|30px|0px&#8221;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;780px&#8221; custom_padding=&#8221;0px|0px|73.90625px|0px&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Serif||||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;36&#8243; text_font_size_tablet=&#8221;26&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||70px|&#8221;]Want new articles before they get published? Subscribe to our Awesome Newsletter.<br \/>\n[\/et_pb_text][et_pb_contact_form captcha=&#8221;off&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;3.0.87&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#02b875&#8243; button_border_width=&#8221;8&#8243; button_border_color=&#8221;#02b875&#8243; button_border_radius=&#8221;4&#8243;][et_pb_contact_field field_id=&#8221;E-mail Address&#8221; field_title=&#8221;E-mail Address&#8221; field_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;3.16&#8243; form_field_font=&#8221;PT Sans||||&#8221; form_field_text_color=&#8221;#adadab&#8221; form_field_font_size=&#8221;20&#8243; form_field_font_size_tablet=&#8221;20&#8243; form_field_font_size_phone=&#8221;20&#8243; form_field_line_height=&#8221;1.4em&#8221; form_field_line_height_tablet=&#8221;1.4em&#8221; form_field_line_height_phone=&#8221;1.4em&#8221; border_radii=&#8221;on||||&#8221; border_width_all=&#8221;1&#8243; border_color_all=&#8221;#adadab&#8221; border_style_all=&#8221;solid&#8221; custom_css_main_element=&#8221;height:64px;&#8221; use_border_color=&#8221;on&#8221; border_color=&#8221;#adadab&#8221; border_width=&#8221;1&#8243; border_style=&#8221;solid&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;First Name&#8221; field_title=&#8221;First Name&#8221; field_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;3.16&#8243; form_field_font=&#8221;PT Sans||||&#8221; form_field_text_color=&#8221;#adadab&#8221; form_field_font_size=&#8221;20&#8243; form_field_font_size_tablet=&#8221;20&#8243; form_field_font_size_phone=&#8221;20&#8243; form_field_line_height=&#8221;1.4em&#8221; form_field_line_height_tablet=&#8221;1.4em&#8221; form_field_line_height_phone=&#8221;1.4em&#8221; border_radii=&#8221;on||||&#8221; border_width_all=&#8221;1&#8243; border_color_all=&#8221;#adadab&#8221; border_style_all=&#8221;solid&#8221; custom_css_main_element=&#8221;height:64px;&#8221; use_border_color=&#8221;on&#8221; border_color=&#8221;#adadab&#8221; border_width=&#8221;1&#8243; border_style=&#8221;solid&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.74&#8243; background_color=&#8221;#222222&#8243; custom_padding=&#8221;78px||78px|&#8221;][et_pb_row make_fullwidth=&#8221;on&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding=&#8221;0px|0px|0px|0px&#8221; padding_mobile=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; parallax_method_3=&#8221;off&#8221; parallax_method_4=&#8221;off&#8221; module_class=&#8221;border-hover&#8221; _builder_version=&#8221;3.0.47&#8243; background_color=&#8221;#f5f5f5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/typing.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.74&#8243; animation=&#8221;off&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_cta title=&#8221;CAREER ADVICE&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/gov-talk\/career-advice\/&#8221; button_text=&#8221;CAREER ADVICE&#8221; _builder_version=&#8221;3.16&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; use_background_color=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]Advice from top Career specialists<br \/>\n[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/news-cig.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.74&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_cta title=&#8221;GOV TALK&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/gov-talk-page\/&#8221; button_text=&#8221;Government Updates&#8221; _builder_version=&#8221;3.16&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; use_background_color=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]Articles about the Public Sector<br \/>\n[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/public-secot-trends.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.74&#8243; animation=&#8221;off&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_cta title=&#8221;TRENDS&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/hr-tips-and-strategies\/&#8221; button_text=&#8221;TRENDS&#8221; _builder_version=&#8221;3.16&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; use_background_color=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]Public Sector Trends<br \/>\n[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cHacks\u201d and Identity Theft have been around for a very long time, but over the past few years, the hackers have changed tactics and are targeting whole systems for attack. Ransomware is the latest incarnation of this where clicking on a single email can launch an attack that will lock down an entire organization and render their computer inaccessible until a \u201cransom\u201d is paid to the hacker for the promise of an access code to unlock the system. <\/p>\n","protected":false},"author":3025,"featured_media":35109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_cbd_carousel_blocks":"[]","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[604,53],"class_list":["post-35108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-about-gov","tag-information-technology","tag-workplace-issues"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Governance Insights: Repeat After Me - Cyber Security is Everyone&#039;s Business - Careers in Government<\/title>\n<meta name=\"description\" content=\"Ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Governance Insights: Repeat After Me - Cyber Security is Everyone&#039;s Business - Careers in Government\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Careers in Government\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CareersInGovernment\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-12T23:31:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-12T23:31:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robin Woolen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheRecordsGuru\" \/>\n<meta name=\"twitter:site\" content=\"@careersingov\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robin Woolen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/\"},\"author\":{\"name\":\"Robin Woolen\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/person\\\/ec95718fa854647f303538bd817f572f\"},\"headline\":\"Information Governance Insights: Repeat After Me &#8211; Cyber Security is Everyone&#8217;s Business\",\"datePublished\":\"2019-09-12T23:31:08+00:00\",\"dateModified\":\"2019-09-12T23:31:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/\"},\"wordCount\":2982,\"publisher\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/cyber1.jpg\",\"keywords\":[\"Information Technology\",\"workplace issues\"],\"articleSection\":[\"About the Public Sector\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/\",\"name\":\"Information Governance Insights: Repeat After Me - Cyber Security is Everyone's Business - Careers in Government\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/cyber1.jpg\",\"datePublished\":\"2019-09-12T23:31:08+00:00\",\"dateModified\":\"2019-09-12T23:31:10+00:00\",\"description\":\"Ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/cyber1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/cyber1.jpg\",\"width\":960,\"height\":640,\"caption\":\"A person in a hooded sweatshirt is surrounded by digital code and binary numbers, evoking themes of cyber security and hacking. The dark, shadowy figure blends with the monochrome background filled with lines of computer text and data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tools\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government Talk\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/newdesign\\\/tools\\\/gov-talk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"About the Public Sector\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/newdesign\\\/tools\\\/gov-talk\\\/about-gov\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Governance Insights: Repeat After Me &#8211; Cyber Security is Everyone&#8217;s Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#website\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\",\"name\":\"Careers in Government\",\"description\":\"Oldest and largest, award-winning site for finding jobs in government, education and other public sector agencies. Valuable tools for job seekers and employers.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\",\"name\":\"Careers in Government\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/CIG-horizontal-dark-v2.png\",\"contentUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/CIG-horizontal-dark-v2.png\",\"width\":\"708\",\"height\":\"480\",\"caption\":\"Careers in Government\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CareersInGovernment\",\"https:\\\/\\\/x.com\\\/careersingov\",\"https:\\\/\\\/www.instagram.com\\\/careersingov\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/person\\\/ec95718fa854647f303538bd817f572f\",\"name\":\"Robin Woolen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"caption\":\"Robin Woolen\"},\"description\":\"Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management systems. His career includes both Public and Private sectors with a client list from the nation\u2019s top 25 cities and the Fortune 500. Mr. Woolen is a recognized leader in the field of information governance and a national speaker teaching others how to improve their own programs. Mr. Woolen holds a Masters of Business Administration in Management of Information Systems from Park University and is a certified Information Governance Professional from ARMA International, the authority on governing information as a strategic asset.\",\"sameAs\":[\"http:\\\/\\\/www.TheRecordsGuru.com\",\"https:\\\/\\\/x.com\\\/TheRecordsGuru\"],\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/author\\\/robinw\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Governance Insights: Repeat After Me - Cyber Security is Everyone's Business - Careers in Government","description":"Ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/","og_locale":"en_US","og_type":"article","og_title":"Information Governance Insights: Repeat After Me - Cyber Security is Everyone's Business - Careers in Government","og_description":"Ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.","og_url":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/","og_site_name":"Careers in Government","article_publisher":"https:\/\/www.facebook.com\/CareersInGovernment","article_published_time":"2019-09-12T23:31:08+00:00","article_modified_time":"2019-09-12T23:31:10+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg","type":"image\/jpeg"}],"author":"Robin Woolen","twitter_card":"summary_large_image","twitter_creator":"@TheRecordsGuru","twitter_site":"@careersingov","twitter_misc":{"Written by":"Robin Woolen","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#article","isPartOf":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/"},"author":{"name":"Robin Woolen","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/person\/ec95718fa854647f303538bd817f572f"},"headline":"Information Governance Insights: Repeat After Me &#8211; Cyber Security is Everyone&#8217;s Business","datePublished":"2019-09-12T23:31:08+00:00","dateModified":"2019-09-12T23:31:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/"},"wordCount":2982,"publisher":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#organization"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg","keywords":["Information Technology","workplace issues"],"articleSection":["About the Public Sector"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/","url":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/","name":"Information Governance Insights: Repeat After Me - Cyber Security is Everyone's Business - Careers in Government","isPartOf":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#primaryimage"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg","datePublished":"2019-09-12T23:31:08+00:00","dateModified":"2019-09-12T23:31:10+00:00","description":"Ransomware attacks are so successful not because of a failure of the information technology folks to do their job, but because of others in the organization not doing theirs.","breadcrumb":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#primaryimage","url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg","contentUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2019\/09\/cyber1.jpg","width":960,"height":640,"caption":"A person in a hooded sweatshirt is surrounded by digital code and binary numbers, evoking themes of cyber security and hacking. The dark, shadowy figure blends with the monochrome background filled with lines of computer text and data."},{"@type":"BreadcrumbList","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-repeat-after-me-cyber-security-is-everyones-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tools","item":"https:\/\/www.careersingovernment.com\/tools\/"},{"@type":"ListItem","position":2,"name":"Government Talk","item":"https:\/\/www.careersingovernment.com\/newdesign\/tools\/gov-talk\/"},{"@type":"ListItem","position":3,"name":"About the Public Sector","item":"https:\/\/www.careersingovernment.com\/newdesign\/tools\/gov-talk\/about-gov\/"},{"@type":"ListItem","position":4,"name":"Information Governance Insights: Repeat After Me &#8211; Cyber Security is Everyone&#8217;s Business"}]},{"@type":"WebSite","@id":"https:\/\/www.careersingovernment.com\/tools\/#website","url":"https:\/\/www.careersingovernment.com\/tools\/","name":"Careers in Government","description":"Oldest and largest, award-winning site for finding jobs in government, education and other public sector agencies. Valuable tools for job seekers and employers.","publisher":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.careersingovernment.com\/tools\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.careersingovernment.com\/tools\/#organization","name":"Careers in Government","url":"https:\/\/www.careersingovernment.com\/tools\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/logo\/image\/","url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2024\/11\/CIG-horizontal-dark-v2.png","contentUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2024\/11\/CIG-horizontal-dark-v2.png","width":"708","height":"480","caption":"Careers in Government"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CareersInGovernment","https:\/\/x.com\/careersingov","https:\/\/www.instagram.com\/careersingov\/"]},{"@type":"Person","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/person\/ec95718fa854647f303538bd817f572f","name":"Robin Woolen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","caption":"Robin Woolen"},"description":"Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management systems. His career includes both Public and Private sectors with a client list from the nation\u2019s top 25 cities and the Fortune 500. Mr. Woolen is a recognized leader in the field of information governance and a national speaker teaching others how to improve their own programs. Mr. Woolen holds a Masters of Business Administration in Management of Information Systems from Park University and is a certified Information Governance Professional from ARMA International, the authority on governing information as a strategic asset.","sameAs":["http:\/\/www.TheRecordsGuru.com","https:\/\/x.com\/TheRecordsGuru"],"url":"https:\/\/www.careersingovernment.com\/tools\/author\/robinw\/"}]}},"_links":{"self":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/35108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/users\/3025"}],"replies":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/comments?post=35108"}],"version-history":[{"count":2,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/35108\/revisions"}],"predecessor-version":[{"id":35114,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/35108\/revisions\/35114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/media\/35109"}],"wp:attachment":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/media?parent=35108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/categories?post=35108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/tags?post=35108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}