{"id":141,"date":"2020-03-04T16:29:55","date_gmt":"2020-03-04T22:29:55","guid":{"rendered":"https:\/\/www.axigent.net\/blog\/?p=141"},"modified":"2020-03-04T16:29:56","modified_gmt":"2020-03-04T22:29:56","slug":"man-vs-machine","status":"publish","type":"post","link":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/","title":{"rendered":"Man vs. Machine"},"content":{"rendered":"\n<p>Cyber Security is very important and\nshould never be taken lightly. There are tons\nof people and organizations out to commit cybercrimes and they&#8217;re good at it.<\/p>\n\n\n\n<p>For example, there was a major\nretailer whose information was compromised because of one email and one\nemployee. This employee used their work computer at a coffee shop and opened a\nphishing email and from there everything was lost. The employee brought the\nlaptop back to their business and once they were on the company network, the virus spread quickly. Read the whole story here.<\/p>\n\n\n\n<p>So how can mistakes like these be\nprevented? With the right kind of security that prevents phishing, scamming, and cybercriminals from entering your network.\nWith Axigent Network Security, your business can rest easy knowing all your\ninformation is safe in the office and out of the office.<\/p>\n\n\n\n<p>The services we offer are\nfool-proof, easy to implement, and cost effective. Design, implement, and support next-generation firewall\nplatforms Develop robust security policies and procedures<\/p>\n\n\n\n<p>Recommend and\nimplement disaster recovery and planning<\/p>\n\n\n\n<p>Build policy definitions and enable\npolicy implementation and enforcement Provide wireless security evaluation<\/p>\n\n\n\n<p>Handle patch, change\nmanagement, and log monitoring services Provide end-user education with regard\nto types of attack vectors<\/p>\n\n\n\n<p>Your company is safe with Axigent, that&#8217;s a guarantee.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security is very important and should never be taken lightly. There are tons of people and organizations out to commit cybercrimes and they&#8217;re good at it. For example, there was a major retailer whose information was compromised because of one email and one employee. This employee used their work computer at a coffee shop [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":142,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[33,30,32,31,34,36,40,35,37,39,38],"class_list":["post-141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cloud-security","tag-compliance","tag-cyber-espionage","tag-data-loss-prevention","tag-endpoint-protection-platforms","tag-epp","tag-malware","tag-olp","tag-privacy","tag-ransomware","tag-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Man vs. Machine - Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axigent.net\/blog\/man-vs-machine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Man vs. Machine - Blog\" \/>\n<meta property=\"og:description\" content=\"Cyber Security is very important and should never be taken lightly. There are tons of people and organizations out to commit cybercrimes and they&#8217;re good at it. For example, there was a major retailer whose information was compromised because of one email and one employee. This employee used their work computer at a coffee shop [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axigent.net\/blog\/man-vs-machine\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Axigent\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-04T22:29:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-04T22:29:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/03\/Man-Vs.-Machine-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tenai Hensley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Axigent\" \/>\n<meta name=\"twitter:site\" content=\"@Axigent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tenai Hensley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/\"},\"author\":{\"name\":\"Tenai Hensley\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\"},\"headline\":\"Man vs. Machine\",\"datePublished\":\"2020-03-04T22:29:55+00:00\",\"dateModified\":\"2020-03-04T22:29:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/\"},\"wordCount\":216,\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Man-Vs.-Machine-scaled.jpg\",\"keywords\":[\"Cloud security\",\"Compliance\",\"Cyber Espionage\",\"Data Loss Prevention\",\"Endpoint Protection Platforms\",\"EPP\",\"Malware\",\"OLP\",\"Privacy\",\"Ransomware\",\"Risk Management\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/\",\"name\":\"Man vs. Machine - Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Man-Vs.-Machine-scaled.jpg\",\"datePublished\":\"2020-03-04T22:29:55+00:00\",\"dateModified\":\"2020-03-04T22:29:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Man-Vs.-Machine-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Man-Vs.-Machine-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/man-vs-machine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Man vs. Machine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"name\":\"Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\",\"name\":\"Blog\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"width\":269,\"height\":78,\"caption\":\"Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Axigent\",\"https:\\\/\\\/x.com\\\/Axigent\",\"https:\\\/\\\/instagram.com\\\/Axigent\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\",\"name\":\"Tenai Hensley\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/author\\\/tenai\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Man vs. Machine - Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/","og_locale":"en_US","og_type":"article","og_title":"Man vs. Machine - Blog","og_description":"Cyber Security is very important and should never be taken lightly. There are tons of people and organizations out to commit cybercrimes and they&#8217;re good at it. For example, there was a major retailer whose information was compromised because of one email and one employee. This employee used their work computer at a coffee shop [&hellip;]","og_url":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/Axigent","article_published_time":"2020-03-04T22:29:55+00:00","article_modified_time":"2020-03-04T22:29:56+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/03\/Man-Vs.-Machine-scaled.jpg","type":"image\/jpeg"}],"author":"Tenai Hensley","twitter_card":"summary_large_image","twitter_creator":"@Axigent","twitter_site":"@Axigent","twitter_misc":{"Written by":"Tenai Hensley","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#article","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/"},"author":{"name":"Tenai Hensley","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85"},"headline":"Man vs. Machine","datePublished":"2020-03-04T22:29:55+00:00","dateModified":"2020-03-04T22:29:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/"},"wordCount":216,"publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/03\/Man-Vs.-Machine-scaled.jpg","keywords":["Cloud security","Compliance","Cyber Espionage","Data Loss Prevention","Endpoint Protection Platforms","EPP","Malware","OLP","Privacy","Ransomware","Risk Management"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/","url":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/","name":"Man vs. Machine - Blog","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#primaryimage"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/03\/Man-Vs.-Machine-scaled.jpg","datePublished":"2020-03-04T22:29:55+00:00","dateModified":"2020-03-04T22:29:56+00:00","breadcrumb":{"@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axigent.net\/blog\/man-vs-machine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#primaryimage","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/03\/Man-Vs.-Machine-scaled.jpg","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/03\/Man-Vs.-Machine-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.axigent.net\/blog\/man-vs-machine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.axigent.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Man vs. Machine"}]},{"@type":"WebSite","@id":"https:\/\/www.axigent.net\/blog\/#website","url":"https:\/\/www.axigent.net\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axigent.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axigent.net\/blog\/#organization","name":"Blog","url":"https:\/\/www.axigent.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","width":269,"height":78,"caption":"Blog"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Axigent","https:\/\/x.com\/Axigent","https:\/\/instagram.com\/Axigent"]},{"@type":"Person","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85","name":"Tenai Hensley","url":"https:\/\/www.axigent.net\/blog\/author\/tenai\/"}]}},"_links":{"self":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":1,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":143,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions\/143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media\/142"}],"wp:attachment":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}