{"id":220,"date":"2024-08-01T23:00:00","date_gmt":"2024-08-01T23:00:00","guid":{"rendered":"https:\/\/kimlerforsc.com\/?post_type=project&#038;p=220"},"modified":"2024-08-07T19:52:04","modified_gmt":"2024-08-07T19:52:04","slug":"220","status":"publish","type":"project","link":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#2ea3f2&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;330deg&#8221; background_color_gradient_stops=&#8221;#2ea3f2 0%|#2e6df4 100%&#8221; background_color_gradient_start=&#8221;#2ea3f2&#8243; background_color_gradient_end=&#8221;#2e6df4&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Cyber Security&#8221; subhead=&#8221;Hacking, ransomware and data theft is modern warfare. We need to be prepared.&#8221; header_image_url=&#8221;https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png&#8221; _builder_version=&#8221;4.24.0&#8243; title_font=&#8221;||||||||&#8221; title_font_size=&#8221;38px&#8221; subhead_font=&#8221;||on||||||&#8221; subhead_font_size=&#8221;24px&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; hover_enabled=&#8221;0&#8243; border_radii_image=&#8221;off|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; title_text=&#8221;Cyber security 160&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>A Lurking Danger That Will Cost Lives If Ignored<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Every day, there are reports of local governments, law enforcement agencies, schools, hospitals and public utilities being knocked out of commission due to hacking and ransomware attacks. Eventually, we will experience a mass casualty event due to a breach in IT defenses.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;-33px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-1-2.png&#8221; title_text=&#8221;Cyber security 1&#8243; url=&#8221;https:\/\/www.cnn.com\/2024\/05\/10\/tech\/cyberattack-ascension-ambulances-hospitals\/index.html&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-2.png&#8221; title_text=&#8221;Cyber security 2&#8243; url=&#8221;https:\/\/arstechnica.com\/security\/2024\/04\/missouri-county-declares-state-of-emergency-amid-suspected-ransomware-attack\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-3.png&#8221; title_text=&#8221;Cyber security 3&#8243; url=&#8221;https:\/\/arstechnica.com\/cars\/2024\/07\/massive-car-dealer-ransom-attack-is-mostly-over-after-2-weeks-of-work-arounds\/&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>We Are Lacking Urgency From Lawmakers<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>While our lawmakers have been focused on transgender youth, CRT, DEI, book bans and other social issues that have no tangible benefit to South Carolinians at large, the topic of cyber security has not been getting any attention.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We have a department of <a href=\"https:\/\/www.admin.sc.gov\/services\/technology-services\/information-security-privacy\" target=\"_blank\" rel=\"noopener\">Information Security and Privacy<\/a> which is responsible only for governmental agencies. Aside from the <a href=\"Insurance%20Data Security Act\" target=\"_blank\" rel=\"noopener\">Insurance Data Security Act<\/a> enacted in 2019, we<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>We Need to Act Now<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cyber threats are our current reality and are here to stay. The State government can be an effective force to protect us by:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><strong>Establishing a &#8220;Cyber National Guard&#8221;<\/strong> modeled after our current National Guard, made up of trained volunteers that can be deployed to assist in recovery when a critical piece of infrastructure is attacked<\/li>\n<li><strong>Enacting data and technology safety education programs<\/strong> throughout schools, libraries and other institutions that serve citizens of all ages. Knowledge can be a powerful tool in preventing attacks and data theft<\/li>\n<li><strong>Coordinating resources<\/strong> with federal, private, and public institutions to develop policies that are effective in both preventing and reacting to cyber attacks<\/li>\n<li><strong>Working with private businesses<\/strong> to implement minimum protective measures and have a rapid response program to minimize the impact of outages to the citizens of South Carolina<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.24.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>Most Lawmakers Aren&#8217;t Capable of Speaking About Tech<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cyber Security policies simply cannot be developed by lawmakers whose tech skills are limited to using the CAPS LOCK button.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>I have decades of experience in Information Technology, both as a software and database developer as well as an Executive Leader. We must be able to speak the same language used by cloud architects, big data engineers and network technologists in order to develop meaningful, measurable and implementable policies.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Lawmakers unable to bridge that gap in communications will often do more harm than good with the policies they create.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.24.0&#8243; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; header_font=&#8221;||||||||&#8221; header_text_color=&#8221;#E09900&#8243; header_font_size=&#8221;13px&#8221; custom_padding=&#8221;0px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>My Position<\/h4>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; background_color=&#8221;#12876F&#8221; custom_margin=&#8221;-25px||||false|false&#8221; custom_padding=&#8221;15px|15px|15px|15px|false|false&#8221; box_shadow_style=&#8221;preset6&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>I will make the digital defense of our critical infrastructure a top priority of the next legislative cycle.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Lurking Danger That Will Cost Lives If IgnoredEvery day, there are reports of local governments, law enforcement agencies, schools, hospitals and public utilities being knocked out of commission due to hacking and ransomware attacks. Eventually, we will experience a mass casualty event due to a breach in IT defenses.We Are Lacking Urgency From LawmakersWhile [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":285,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"project_category":[8],"project_tag":[],"class_list":["post-220","project","type-project","status-publish","has-post-thumbnail","hentry","project_category-issues"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - Kimler For SC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Kimler For SC\" \/>\n<meta property=\"og:description\" content=\"A Lurking Danger That Will Cost Lives If IgnoredEvery day, there are reports of local governments, law enforcement agencies, schools, hospitals and public utilities being knocked out of commission due to hacking and ransomware attacks. Eventually, we will experience a mass casualty event due to a breach in IT defenses.We Are Lacking Urgency From LawmakersWhile [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/\" \/>\n<meta property=\"og:site_name\" content=\"Kimler For SC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KimlerForSC\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png\" \/>\n\t<meta property=\"og:image:width\" content=\"160\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@KimlerForSC\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/\",\"url\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/\",\"name\":\"Cyber Security - Kimler For SC\",\"isPartOf\":{\"@id\":\"https:\/\/kimlerforsc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png\",\"datePublished\":\"2024-08-01T23:00:00+00:00\",\"dateModified\":\"2024-08-07T19:52:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#primaryimage\",\"url\":\"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png\",\"contentUrl\":\"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png\",\"width\":160,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kimlerforsc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\/\/kimlerforsc.com\/index.php\/project\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kimlerforsc.com\/#website\",\"url\":\"https:\/\/kimlerforsc.com\/\",\"name\":\"Kimler For SC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kimlerforsc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kimlerforsc.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kimlerforsc.com\/#organization\",\"name\":\"Kimler For SC\",\"url\":\"https:\/\/kimlerforsc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kimlerforsc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/01\/Kimler-13-logo-white-bkgd-800.jpg\",\"contentUrl\":\"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/01\/Kimler-13-logo-white-bkgd-800.jpg\",\"width\":800,\"height\":321,\"caption\":\"Kimler For SC\"},\"image\":{\"@id\":\"https:\/\/kimlerforsc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/KimlerForSC\",\"https:\/\/x.com\/KimlerForSC\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Kimler For SC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Kimler For SC","og_description":"A Lurking Danger That Will Cost Lives If IgnoredEvery day, there are reports of local governments, law enforcement agencies, schools, hospitals and public utilities being knocked out of commission due to hacking and ransomware attacks. Eventually, we will experience a mass casualty event due to a breach in IT defenses.We Are Lacking Urgency From LawmakersWhile [&hellip;]","og_url":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/","og_site_name":"Kimler For SC","article_publisher":"https:\/\/www.facebook.com\/KimlerForSC","article_modified_time":"2024-08-07T19:52:04+00:00","og_image":[{"width":160,"height":150,"url":"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@KimlerForSC","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/","url":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/","name":"Cyber Security - Kimler For SC","isPartOf":{"@id":"https:\/\/kimlerforsc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#primaryimage"},"image":{"@id":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#primaryimage"},"thumbnailUrl":"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png","datePublished":"2024-08-01T23:00:00+00:00","dateModified":"2024-08-07T19:52:04+00:00","breadcrumb":{"@id":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kimlerforsc.com\/index.php\/project\/220\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#primaryimage","url":"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png","contentUrl":"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/08\/Cyber-security-160.png","width":160,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/kimlerforsc.com\/index.php\/project\/220\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kimlerforsc.com\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/kimlerforsc.com\/index.php\/project\/"},{"@type":"ListItem","position":3,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/kimlerforsc.com\/#website","url":"https:\/\/kimlerforsc.com\/","name":"Kimler For SC","description":"","publisher":{"@id":"https:\/\/kimlerforsc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kimlerforsc.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kimlerforsc.com\/#organization","name":"Kimler For SC","url":"https:\/\/kimlerforsc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kimlerforsc.com\/#\/schema\/logo\/image\/","url":"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/01\/Kimler-13-logo-white-bkgd-800.jpg","contentUrl":"https:\/\/kimlerforsc.com\/wp-content\/uploads\/2024\/01\/Kimler-13-logo-white-bkgd-800.jpg","width":800,"height":321,"caption":"Kimler For SC"},"image":{"@id":"https:\/\/kimlerforsc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KimlerForSC","https:\/\/x.com\/KimlerForSC"]}]}},"_links":{"self":[{"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/project\/220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/types\/project"}],"author":[{"embeddable":true,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/comments?post=220"}],"version-history":[{"count":14,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/project\/220\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/project\/220\/revisions\/286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/media\/285"}],"wp:attachment":[{"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/media?parent=220"}],"wp:term":[{"taxonomy":"project_category","embeddable":true,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/project_category?post=220"},{"taxonomy":"project_tag","embeddable":true,"href":"https:\/\/kimlerforsc.com\/index.php\/wp-json\/wp\/v2\/project_tag?post=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}