{"id":67343,"date":"2024-06-14T11:46:38","date_gmt":"2024-06-14T16:46:38","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67343"},"modified":"2024-06-14T11:52:22","modified_gmt":"2024-06-14T16:52:22","slug":"understanding-cybersecurity-insights-from-rob-cheng","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/","title":{"rendered":"Understanding Cybersecurity: Insights from Rob Cheng"},"content":{"rendered":"\n<p>In today&#8217;s digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of &#8220;Insights,&#8221; hosted by Ben Segal, Managing Director and Private Wealth Manager at UBS Financial Services, delves into this pressing issue with guest Rob Cheng, CEO of PC Matic, a leading cybersecurity firm. Here are the key takeaways from their enlightening discussion on the state of cybersecurity.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>The State of Cybersecurity<\/strong><\/h4>\n\n\n\n<p>Rob Cheng paints a bleak picture of the current cybersecurity landscape. Since the rise of ransomware attacks in 2013, the frequency and severity of these attacks have escalated dramatically. Cheng emphasizes that no one is truly safe in the digital world, citing the alarming rise in cyberattacks across various sectors, from small businesses to large corporations and even federal governments.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Why Cybersecurity Measures Are Failing<\/strong><\/h4>\n\n\n\n<p>Despite the availability of numerous cybersecurity tools, the problem persists. Cheng points out two main reasons for this: the lack of a coordinated national defense strategy and the fragmented approach to cybersecurity. Unlike traditional warfare, where national defense forces protect cities from attacks, there is no equivalent in the cyber realm. Each entity, whether a small business or a large corporation, is left to fend for itself.<\/p>\n\n\n\n<p>Additionally, the cybersecurity landscape is patchwork, with varying levels of protection across different organizations. Even the most well-protected entities are vulnerable to nation-state attacks, which could potentially target multiple victims simultaneously.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>The Internet of Things (IoT) Vulnerability<\/strong><\/h4>\n\n\n\n<p>Cheng highlights a particularly concerning issue: the lack of security in IoT devices. With over 15 billion IoT devices in use, none of which have built-in security software, they represent a massive vulnerability. These devices can be easily transformed into surveillance tools, as demonstrated by incidents in places like Guam.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Preventative Measures<\/strong><\/h4>\n\n\n\n<p>The discussion shifts towards what can be done to improve cybersecurity. Cheng advocates for a shift from reactive to proactive measures. Over the past decade, the focus has been on responding to attacks rather than preventing them. To combat this, he suggests adopting a balanced approach that includes both prevention and reaction.<\/p>\n\n\n\n<p>One effective strategy is to follow established cybersecurity frameworks, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This framework emphasizes the importance of knowing all the assets on your network\u2014people, hardware, and software\u2014and ensuring that only authorized entities are allowed access.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Role of Cyber Insurance<\/strong><\/h4>\n\n\n\n<p>Cyber insurance has not kept pace with the evolving threat landscape. Cheng argues that the industry has failed to accurately measure and mitigate risks, leading to significant financial losses. He suggests that better risk assessment and updated models are needed to provide effective coverage and reduce the likelihood of future claims.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Simple Yet Effective Cyber Hygiene Practices<\/strong><\/h4>\n\n\n\n<p>For businesses and individuals, Chang recommends a few basic but crucial cybersecurity practices:<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">1. Password Protection<\/h6>\n\n\n\n<p>Always use strong, unique passwords for all devices and accounts.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">2. Logging Off<\/h6>\n\n\n\n<p>Ensure that computers are logged off when not in use to prevent unauthorized access.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">3. Software and Hardware Management<\/h6>\n\n\n\n<p>Know what software and hardware are on your network and ensure they are necessary and secure.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">4. Regular Backups<\/h6>\n\n\n\n<p>Regularly back up data to mitigate the impact of potential attacks.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Future Outlook<\/strong><\/h4>\n\n\n\n<p>Despite the current challenges, Cheng remains optimistic. He believes that by simplifying cybersecurity measures and adopting comprehensive frameworks, we can improve our defenses against cyber threats. However, it requires a collective effort from individuals, businesses, and governments to create a more secure digital environment.<\/p>\n\n\n\n<p>In conclusion, cybersecurity is an ever-evolving field that demands constant vigilance and adaptation. By understanding the current threats and implementing robust preventive measures, we can better protect ourselves in the digital age.<\/p>\n\n\n\n<p>Listen to the full podcast <a href=\"https:\/\/www.ubs.com\/us\/en\/wealth-management\/podcast\/kahner-segal-partners.html\">here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of &#8220;Insights,&#8221; hosted by Ben Segal, Managing Director and Private Wealth Manager at UBS Financial Services, delves into this pressing issue with guest Rob Cheng, CEO of PC Matic, a leading cybersecurity firm. Here are the key [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67345,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-67343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding Cybersecurity: Insights from Rob Cheng<\/title>\n<meta name=\"description\" content=\"In today&#039;s digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of &quot;Insights,&quot; hosted by Ben\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Cybersecurity: Insights from Rob Cheng\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of &quot;Insights,&quot; hosted by Ben\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-14T16:46:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-14T16:52:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/USB-Blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Understanding Cybersecurity: Insights from Rob Cheng\",\"datePublished\":\"2024-06-14T16:46:38+00:00\",\"dateModified\":\"2024-06-14T16:52:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/\"},\"wordCount\":613,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/USB-Blog.png\",\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/\",\"name\":\"Understanding Cybersecurity: Insights from Rob Cheng\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/USB-Blog.png\",\"datePublished\":\"2024-06-14T16:46:38+00:00\",\"dateModified\":\"2024-06-14T16:52:22+00:00\",\"description\":\"In today's digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of \\\"Insights,\\\" hosted by Ben\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/USB-Blog.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/USB-Blog.png\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/understanding-cybersecurity-insights-from-rob-cheng\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Cybersecurity: Insights from Rob Cheng\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Cybersecurity: Insights from Rob Cheng","description":"In today's digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of \"Insights,\" hosted by Ben","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Cybersecurity: Insights from Rob Cheng","og_description":"In today's digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of \"Insights,\" hosted by Ben","og_url":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2024-06-14T16:46:38+00:00","article_modified_time":"2024-06-14T16:52:22+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/USB-Blog.png","type":"image\/png"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Understanding Cybersecurity: Insights from Rob Cheng","datePublished":"2024-06-14T16:46:38+00:00","dateModified":"2024-06-14T16:52:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/"},"wordCount":613,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/USB-Blog.png","articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/","url":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/","name":"Understanding Cybersecurity: Insights from Rob Cheng","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/USB-Blog.png","datePublished":"2024-06-14T16:46:38+00:00","dateModified":"2024-06-14T16:52:22+00:00","description":"In today's digital age, cybersecurity remains a critical concern for individuals and businesses alike. In the first episode of \"Insights,\" hosted by Ben","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/USB-Blog.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/USB-Blog.png","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/understanding-cybersecurity-insights-from-rob-cheng\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding Cybersecurity: Insights from Rob Cheng"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67343"}],"version-history":[{"count":3,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67343\/revisions"}],"predecessor-version":[{"id":67347,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67343\/revisions\/67347"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67345"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}