{"id":9492,"date":"2023-08-09T09:35:16","date_gmt":"2023-08-09T09:35:16","guid":{"rendered":"https:\/\/intelliworx.wpenginepowered.com\/uk\/?p=9492"},"modified":"2025-08-06T02:58:57","modified_gmt":"2025-08-06T02:58:57","slug":"building-a-resilient-cyber-security-framework","status":"publish","type":"post","link":"https:\/\/intelliworx.co\/uk\/blog\/building-a-resilient-cyber-security-framework\/","title":{"rendered":"Building a Resilient Cyber Security Framework: Your Shield Against Cyber Threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9492\" class=\"elementor elementor-9492\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9320498 e-flex e-con-boxed e-con e-parent\" data-id=\"9320498\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1068c8c elementor-widget elementor-widget-text-editor\" data-id=\"1068c8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a utopian world, an organisation&#8217;s systems would hum along smoothly 24\/7, all year round. But let&#8217;s face it \u2013 real life isn&#8217;t always that kind. Cyber threats loom large, whether they&#8217;re intentional hacks or accidental slip-ups, and they can throw a wrench in a business\u2019 daily operations.<\/p><p>By constructing a resilient cyber security framework, we can fortify our defences and navigate the digital landscape with confidence. In this article, we will embark on a journey to explore the key elements of a robust cyber security framework, empowering you to stay one step ahead of cyber adversaries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e29125 elementor-widget elementor-widget-heading\" data-id=\"4e29125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding the Digital Battleground<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5fc406 elementor-widget elementor-widget-text-editor\" data-id=\"f5fc406\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before we delve into the nitty-gritty of building a resilient cybersecurity framework, it&#8217;s crucial to comprehend the dynamic nature of the digital battleground. By acknowledging the ever-changing tactics of cyber adversaries, we lay the foundation for a proactive and adaptable security strategy.<\/p><p>Cyber threats can be broadly categorised into two main groups:<\/p><ol><li><strong>Network-Targeted Crimes: <\/strong>This category encompasses cybercrimes that directly focus on compromising networks or devices. It includes the deployment of viruses, malicious software (malware), and Denial of Service (DoS) attacks. These tactics are designed to infiltrate systems, cause disruptions, or gain unauthorised access.<\/li><li><strong>Device-Enabled Criminal Activities: <\/strong>In this category, cybercriminals employ devices as tools to engage in various forms of criminal activities. These activities include the distribution of phishing emails aimed at deceiving recipients, engaging in cyberstalking to harass victims online, and perpetrating identity theft by illicitly acquiring and exploiting personal information. Such actions often involve exploiting individuals&#8217; vulnerabilities or trust to achieve their criminal objectives.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57e30a7 elementor-widget elementor-widget-heading\" data-id=\"57e30a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">10 most common cyber threats to watch out for<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1987147 elementor-widget elementor-widget-ld_accordion\" data-id=\"1987147\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"accordion accordion-body-bordered accordion-md accordion-side-spacing accordion-title-bg-transparent accordion-body-shadow\" id=\"accordion-69fea930b1c03\" role=\"tablist\" aria-multiselectable=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel  active\">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2671\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2671\" \n\t\t\t\t\taria-expanded=\"true\" aria-controls=\"collapse-2671\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">DDoS (Distributed Denial of Service) Attacks<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2671\" class=\"accordion-collapse collapse  in\" role=\"tabpanel\" aria-labelledby=\"heading-2671\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>DDoS attacks overload websites to make them crash by flooding them with too much traffic. Hackers use networks of infected computers called botnets to carry out these attacks<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2672\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2672\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2672\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Botnets<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2672\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2672\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Botnets are groups of compromised computers controlled by hackers from afar. Hackers use these botnets to send spam, launch attacks, or perform harmful actions.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2673\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2673\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2673\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Identity Theft<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2673\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2673\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Identity theft happens when criminals steal personal information to commit fraud. They might access accounts, create fake ones, or exploit your identity for financial gain.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2674\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2674\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2674\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Cyberstalking<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2674\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2674\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Cyberstalking involves online harassment aimed at frightening victims. This can be done through emails, social media, or other online means to create fear.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2675\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2675\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2675\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Social Engineering<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2675\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2675\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Social engineering is when hackers manipulate people into revealing information. They might pretend to be customer service representatives or exploit details from social media to gain your trust.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2676\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2676\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2676\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">PUPs (Potentially Unwanted Programs)<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2676\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2676\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>PUPs are programs that you might not want on your computer, often with harmful effects. They can include spyware or adware that can compromise your privacy.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2677\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2677\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2677\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Phishing<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2677\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2677\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Phishing is a tactic where hackers send fake emails or links to trick people into giving away sensitive information or access. These messages often look legitimate but are meant to deceive.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2678\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2678\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2678\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Illegal Content<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2678\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2678\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Criminals share offensive or illegal content online, including explicit, violent, or criminal materials. This content can be distressing and may be found on both regular websites and hidden parts of the internet.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-2679\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-2679\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-2679\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Online Scams<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-2679\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-2679\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Online scams involve enticing offers or promises of large rewards that are too good to be true. Clicking on these can lead to malware or compromise of personal information.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\t\t\t\t\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-26710\">\n\t\t\t\t<h3 class=\"accordion-title \">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" \n\t\t\t\t\tdata-parent=\"#accordion-69fea930b1c03\" href=\"#collapse-26710\" \n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-26710\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">Exploit Kits<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"fa fa-chevron-down\"><\/i><i class=\"fa fa-chevron-up\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div id=\"collapse-26710\" class=\"accordion-collapse collapse \" role=\"tabpanel\" aria-labelledby=\"heading-26710\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>Exploit kits are tools that hackers use to take advantage of vulnerabilities in software, gaining control of computers. These kits are available for purchase and are often used on the dark web.<\/p>\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"DDoS (Distributed Denial of Service) Attacks\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DDoS attacks overload websites to make them crash by flooding them with too much traffic. Hackers use networks of infected computers called botnets to carry out these attacks\"}},{\"@type\":\"Question\",\"name\":\"Botnets\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Botnets are groups of compromised computers controlled by hackers from afar. Hackers use these botnets to send spam, launch attacks, or perform harmful actions.\"}},{\"@type\":\"Question\",\"name\":\"Identity Theft\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Identity theft happens when criminals steal personal information to commit fraud. They might access accounts, create fake ones, or exploit your identity for financial gain.\"}},{\"@type\":\"Question\",\"name\":\"Cyberstalking\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Cyberstalking involves online harassment aimed at frightening victims. This can be done through emails, social media, or other online means to create fear.\"}},{\"@type\":\"Question\",\"name\":\"Social Engineering\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Social engineering is when hackers manipulate people into revealing information. They might pretend to be customer service representatives or exploit details from social media to gain your trust.\"}},{\"@type\":\"Question\",\"name\":\"PUPs (Potentially Unwanted Programs)\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"PUPs are programs that you might not want on your computer, often with harmful effects. They can include spyware or adware that can compromise your privacy.\"}},{\"@type\":\"Question\",\"name\":\"Phishing\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Phishing is a tactic where hackers send fake emails or links to trick people into giving away sensitive information or access. These messages often look legitimate but are meant to deceive.\"}},{\"@type\":\"Question\",\"name\":\"Illegal Content\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Criminals share offensive or illegal content online, including explicit, violent, or criminal materials. This content can be distressing and may be found on both regular websites and hidden parts of the internet.\"}},{\"@type\":\"Question\",\"name\":\"Online Scams\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Online scams involve enticing offers or promises of large rewards that are too good to be true. Clicking on these can lead to malware or compromise of personal information.\"}},{\"@type\":\"Question\",\"name\":\"Exploit Kits\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Exploit kits are tools that hackers use to take advantage of vulnerabilities in software, gaining control of computers. These kits are available for purchase and are often used on the dark web.\"}}]}<\/script>\n\t\t\t\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baada76 e-flex e-con-boxed e-con e-parent\" data-id=\"baada76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7758d elementor-widget elementor-widget-heading\" data-id=\"0f7758d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Pillars of Cyber Resilience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a441697 elementor-widget elementor-widget-text-editor\" data-id=\"a441697\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>According to <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/cyber_resiliency\" target=\"_blank\" rel=\"noopener\">Computer Security Resource Centre<\/a>, cyber resilience is the ability of an organisation to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.<\/p><p>In today&#8217;s ever-evolving cyberspace, it is important for organisations to have cyber resilience to protect themselves from cybercrimes, mitigate the risks and severity of attacks, and enable business continuity. A cyber-resilient organisation is well prepared to tackle cybersecurity incidents and can effectively respond to and quickly recover when such events do occur.<\/p><p>A resilient cyber security framework stands tall on several key pillars, each supporting and reinforcing the others.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fbaa6b7 e-flex e-con-boxed e-con e-parent\" data-id=\"fbaa6b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01fc8a0 elementor-widget elementor-widget-text-editor\" data-id=\"01fc8a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Identification:<\/strong> This is the initial element of a resilient cyber security framework which involves determining key business functions and assets, as well as evaluating potential cybersecurity risks to your organisation\u2019s network, IT infrastructure and information systems.<\/li><li><strong>Prevention:<\/strong> Prevention is always better than cure! Educating users about best practices, enforcing strong password policies, and implementing robust access controls are fundamental preventive measures that form a strong line of defence.<\/li><li><strong>Protection:<\/strong> This step involves deploying security tools and implementing security measures to protect systems, applications, and data. It also includes training employees, creating security policies, managing identities and access, and maintaining IT infrastructure.<\/li><li><strong>Detection:<\/strong> No cyber defence is perfect, but timely detection can be a game-changer. By employing advanced threat detection tools and monitoring systems, we can swiftly identify and neutralise potential threats before they escalate.<\/li><li><strong>Response:<\/strong> In the face of a cyber-attack, a well-orchestrated response plan can minimize damage and expedite recovery. Developing an incident response strategy, including the involvement of key stakeholders, is crucial to mitigating the fallout of a breach.<\/li><li><strong>Recovery:<\/strong> Resilience isn&#8217;t just about having a fortified cyber strategy in place; it&#8217;s also about bouncing back stronger. A robust recovery plan involves data backups, system restoration protocols, and regular testing to ensure continuity even in the wake of a significant cyber incident.<\/li><li><strong>Acclimatisation:<\/strong> Rather than a \u201cset it and forget it\u201d kind of a program, cyber resilience must be continuously improved and modified to withstand the ever-evolving threat landscape.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2fca736 e-flex e-con-boxed e-con e-parent\" data-id=\"2fca736\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d8b047 elementor-widget elementor-widget-heading\" data-id=\"0d8b047\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Embracing a Multi-Layered Approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e6c8b elementor-widget elementor-widget-text-editor\" data-id=\"83e6c8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Traditional security strategies focus on protecting sensitive data by creating a defensive perimeter around it. This is typically made up of firewalls, antivirus software, and other security controls that are designed to prevent unauthorised access to the data. However, this approach has some limitations. For example, it can be difficult to keep up with the latest threats, and it can be vulnerable to attacks that come from inside the organisation.<\/p><p>A multi-layered approach in cybersecurity, on the other hand, is a security strategy that uses multiple layers of defence to protect sensitive data from potential threats. Each layer offers distinct protection, combining to establish a robust cybersecurity stance that covers the entire attack surface against unauthorised access or exposure, effectively addressing multiple aspects simultaneously.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76388f9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"76388f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69fea930b5919\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What are the three elements of a multi-layered approach in cybersecurity?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f85b71 premium-floating-effects-yes elementor-widget elementor-widget-ld_roadmap\" data-id=\"5f85b71\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_fe_trigger&quot;:&quot;load&quot;,&quot;premium_fe_direction&quot;:&quot;alternate&quot;,&quot;premium_fe_loop&quot;:&quot;default&quot;,&quot;premium_fe_easing&quot;:&quot;easeInOutSine&quot;}\" data-widget_type=\"ld_roadmap.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div id=\"lqd-roadmap-5f85b71\" class=\"lqd-roadmap\" >\n\n\t\t\t<div class=\"lqd-roadmap-inner\">\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"lqd-roadmap-item d-flex flex-wrap align-items-center pos-rel text-start elementor-repeater-item-96e839f\">\n\n\t\t\t\t\t\t\t<span class=\"lqd-roadmap-bar lqd-overlay border-radius-circle\"><\/span>\n\n\t\t\t\t\t\t\t<div class=\"lqd-roadmap-info\">\n\t\t\t\t\t\t\t\t<h6 class=\"m-0\"><h3><strong>Physical Security<\/strong><\/h3> <\/h6><p>This layer of security is the foundation of any good cybersecurity program.<\/p>\n<ul>\n<li>Secure perimeters around buildings and data centres<\/li>\n<li>Access control systems to control who can enter and exit buildings and data centres<\/li>\n<li>Security guards and\/or cameras to monitor for suspicious activity<\/li>\n<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<span class=\"lqd-roadmap-mark d-inline-flex align-items-center justify-content-center ms-auto\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"lqd-roadmap-item d-flex flex-wrap align-items-center pos-rel text-start elementor-repeater-item-340b31f\">\n\n\t\t\t\t\t\t\t<span class=\"lqd-roadmap-bar lqd-overlay border-radius-circle\"><\/span>\n\n\t\t\t\t\t\t\t<div class=\"lqd-roadmap-info\">\n\t\t\t\t\t\t\t\t<h6 class=\"m-0\"><h3><strong>Administrative Security<\/strong><\/h3> <\/h6><p>This layer of security is important for ensuring that employees follow security best practices:<\/p>\n<ul>\n<li>Strong password policies<\/li>\n<li>Security awareness training for employees<\/li>\n<li>Incident response plans to deal with security breaches<\/li>\n<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<span class=\"lqd-roadmap-mark d-inline-flex align-items-center justify-content-center ms-auto\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"lqd-roadmap-item d-flex flex-wrap align-items-center pos-rel text-start elementor-repeater-item-8a5c247\">\n\n\t\t\t\t\t\t\t<span class=\"lqd-roadmap-bar lqd-overlay border-radius-circle\"><\/span>\n\n\t\t\t\t\t\t\t<div class=\"lqd-roadmap-info\">\n\t\t\t\t\t\t\t\t<h6 class=\"m-0\"><h3><strong>Technical Security<\/strong><\/h3> <\/h6><p>This layer of security is the most visible layer of cybersecurity.<\/p>\n<ul>\n<li>Firewalls to block unauthorized traffic<\/li>\n<li>Antivirus software to scan for and remove malware<\/li>\n<li>Intrusion detection systems to monitor for suspicious network activity<\/li>\n<li>Data loss prevention (DLP) systems to prevent sensitive data from being leaked<\/li>\n<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<span class=\"lqd-roadmap-mark d-inline-flex align-items-center justify-content-center ms-auto\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b411962 elementor-widget elementor-widget-text-editor\" data-id=\"b411962\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By implementing all three elements of multi-layered cybersecurity, organisations can create a more secure environment that is less vulnerable to attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a9ccf elementor-widget elementor-widget-heading\" data-id=\"e9a9ccf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding the Human Element in Cyber Resiliency <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9938a6 elementor-widget elementor-widget-text-editor\" data-id=\"b9938a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite the entire technological prowess at our disposal, the human element remains both the weakest link and our greatest asset. Cyber attackers often rely on exploiting human vulnerabilities through tactics like phishing and social engineering. Regular training and awareness programs are invaluable in empowering your team to be the first line of defence against such threats. More importantly, incorporating behavioural analytics into cyber risk assessment services empowers organisations to observe and analyse user behaviour patterns. This enables proactive identification of risky activities and anomalies before potential breaches.<\/p><p><a href=\"https:\/\/intelliworx.co\/uk\/cyber-security\/\">Intelliworx Cybersecurity Services<\/a> evaluate human cybersecurity risk through realistic scenarios, offering comprehensive insights that aid businesses in identifying vulnerabilities and planning tailored strategies to counter cyber threats. This comprehensive solution encompasses human risk management and training \u2013 going beyond compliance through actionable insights that could help strengthen an organisation\u2019s cyber resilience.<\/p><p><a href=\"https:\/\/intelliworx.co\/uk\/contact\/\">Speak with an Intelliworx cybersecurity expert<\/a> to find out if our advanced security analytics program fits your needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Explore key elements of a strong cybersecurity framework to ensure digital safety. Join us on this insightful journey.<\/p>\n","protected":false},"author":20,"featured_media":9527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[204,49,29],"tags":[67,36],"class_list":["post-9492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-disaster-recovery","category-security","tag-disaster-recovery","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Shield Against Cyber Threats - Intelliworx United Kingdom<\/title>\n<meta name=\"description\" content=\"Explore key elements of a strong cybersecurity framework to ensure digital safety. Join us on this insightful journey.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Shield Against Cyber Threats - Intelliworx United Kingdom\" \/>\n<meta property=\"og:description\" content=\"Explore key elements of a strong cybersecurity framework to ensure digital safety. Join us on this insightful journey.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelliworx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntelliworxGlobal\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-09T09:35:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T02:58:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/08\/iStock-1350595566.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"781\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Shield Against Cyber Threats - Intelliworx United Kingdom","description":"Explore key elements of a strong cybersecurity framework to ensure digital safety. Join us on this insightful journey.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/","og_locale":"en_US","og_type":"article","og_title":"Your Shield Against Cyber Threats - Intelliworx United Kingdom","og_description":"Explore key elements of a strong cybersecurity framework to ensure digital safety. Join us on this insightful journey.","og_url":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/","og_site_name":"Intelliworx","article_publisher":"https:\/\/www.facebook.com\/IntelliworxGlobal","article_published_time":"2023-08-09T09:35:16+00:00","article_modified_time":"2025-08-06T02:58:57+00:00","og_image":[{"width":1344,"height":781,"url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/08\/iStock-1350595566.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#article","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/"},"author":{"name":"","@id":""},"headline":"Building a Resilient Cyber Security Framework: Your Shield Against Cyber Threats","datePublished":"2023-08-09T09:35:16+00:00","dateModified":"2025-08-06T02:58:57+00:00","mainEntityOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/"},"wordCount":1385,"commentCount":0,"publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/08\/iStock-1350595566.jpg","keywords":["Disaster Recovery","Security"],"articleSection":["Blog","Disaster Recovery","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/","url":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/","name":"Your Shield Against Cyber Threats - Intelliworx United Kingdom","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#primaryimage"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/08\/iStock-1350595566.jpg","datePublished":"2023-08-09T09:35:16+00:00","dateModified":"2025-08-06T02:58:57+00:00","description":"Explore key elements of a strong cybersecurity framework to ensure digital safety. Join us on this insightful journey.","breadcrumb":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#primaryimage","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/08\/iStock-1350595566.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/08\/iStock-1350595566.jpg","width":1344,"height":781,"caption":"Cyber security firewall interface protection concept. Businesswoman protecting herself from cyber attacks. Personal data security and banking"},{"@type":"BreadcrumbList","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/building-a-resilient-cyber-security-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intelliworx.co\/uk\/"},{"@type":"ListItem","position":2,"name":"Building a Resilient Cyber Security Framework: Your Shield Against Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/intelliworx.co\/uk\/#website","url":"https:\/\/intelliworx.co\/uk\/","name":"Intelliworx","description":"Managed IT Services","publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelliworx.co\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intelliworx.co\/uk\/#organization","name":"Intelliworx","alternateName":"INTELLIWORX","url":"https:\/\/intelliworx.co\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","width":600,"height":90,"caption":"Intelliworx"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntelliworxGlobal","https:\/\/www.linkedin.com\/company\/intelliworx\/"]},{"@type":"Person","@id":"","url":"https:\/\/intelliworx.co\/uk\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/9492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/comments?post=9492"}],"version-history":[{"count":0,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/9492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media\/9527"}],"wp:attachment":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media?parent=9492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/categories?post=9492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/tags?post=9492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}