{"id":29372,"date":"2016-08-25T20:33:39","date_gmt":"2016-08-26T03:33:39","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/08\/so-your-companys-been-hacked-how-to-handle-the-aftermath"},"modified":"2017-06-04T14:20:47","modified_gmt":"2017-06-04T21:20:47","slug":"so-your-companys-been-hacked-how-to-handle-the-aftermath","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/08\/so-your-companys-been-hacked-how-to-handle-the-aftermath","title":{"rendered":"So your company\u2019s been hacked: How to handle the aftermath"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/so-your-companys-been-hacked-how-to-handle-the-aftermath.jpg\"><\/a><\/p>\n<p>I can honestly say that many of us working with QC hasn\u2019t warned folks for a while on the hacking risks around QC going against even today\u2019s most sophisticated encryption models &amp; methods; and to be developing a strategy in how to best handle this risk. With last weeks launch by China has shown the world that we are definitely not a decade away from this risk.<\/p>\n<hr>\n<p>Education and planning are key, cyber-security expert Tyler Cohen Wood says.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.itworld.com\/article\/3112421\/security\/so-your-company-s-been-hacked-how-to-handle-the-aftermath.html\">http:\/\/www.itworld.com\/article\/3112421\/security\/so-your-comp...rmath.html<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I can honestly say that many of us working with QC hasn\u2019t warned folks for a while on the hacking risks around QC going against even today\u2019s most sophisticated encryption models &amp; methods; and to be developing a strategy in how to best handle this risk. With last weeks launch by China has shown the [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,32,1625],"tags":[],"class_list":["post-29372","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-education","category-encryption"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/29372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=29372"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/29372\/revisions"}],"predecessor-version":[{"id":66434,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/29372\/revisions\/66434"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=29372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=29372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=29372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}