{"id":598,"date":"2023-03-21T08:00:00","date_gmt":"2023-03-21T08:00:00","guid":{"rendered":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/?p=598"},"modified":"2023-08-07T22:57:52","modified_gmt":"2023-08-07T22:57:52","slug":"hot-topics-in-systems-integration-security","status":"publish","type":"post","link":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/","title":{"rendered":"Hot Topics in Systems Integration Security"},"content":{"rendered":"\n<p>Security. At Integrated Advisors Network, our team is always on-the-lookout for the latest innovations and best systems integration security practices. Therefore, to better educate ourselves and our clients, we recently held a webinar with industry experts Wes Stillman, Chief Innovation Officer at Visory, and Theodore Toso, CEO and Co-Founder at Trinlogix to discuss hot security topics.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Below you will find highlights from these two tech innovators about what top advisory firms are doing today with cyber security technology and how it is helping them grow their business. <a href=\"https:\/\/vimeo.com\/802834656\/0f0a209243\">Watch<\/a> the entire webinar.&nbsp;<\/p>\n\n\n\n<p>First, ask yourself, is the system integration you want to make compatible with your system?\u00a0 When it comes to integration, you don\u2019t want to use an outlier that doesn\u2019t have a track record. For example, in our <a href=\"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">Integrated Advisors Network Alliance Program<\/a>, we use traditional, proven technology open to using independent contractors for security data purposes.<\/p>\n\n\n\n<p>Next, everyone at your company should be aware of their surroundings online. This is not a new security protocol. But, it is worth a reminder because security starts with individual employees. Educate employees not to hit risky links in their emails. Doing so could potentially give away credentials in a phishing attack.<\/p>\n\n\n\n<p>Note a lot of newer technologies feature New Gen Anti-Virus with AI running in the background to pick up malware and shut it down before any damage is done.<\/p>\n\n\n\n<p><strong> <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-at-least-one-day-a-quarter-or-at-least-once-a-year-review-your-tech-security\"><strong>At least one day a quarter (or at least once a year) review your tech security.<\/strong><\/h3>\n\n\n\n<p>By doing this you\u2019ll not only know what you have, but you\u2019ll also know how well it is working. By spending a few days a year reviewing your security, you\u2019ll save time and money in the long run by potentially avoiding security breaches and not buying technology you do not need.<\/p>\n\n\n\n<p>Below we\u2019ve listed a few best practices to keep your integrated systems secure.<\/p>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\">\n<li>Always make certain you have your cyber security policies and technology updated and in alignment. And this is a big one. Make certain that you are enforcing your cyber security policies.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In order to ensure retention of cyber security and technology policies in this fast-paced industry, keep track of new versions and how they have changed over the course of time.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be hyper vigilant about how you are controlling remote access. (Especially as more and more employees work from home.) Make certain all<em> <\/em>of your integrated applications are turned on to multi-factor authentication.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As we mentioned above, employee training is super important as a first line of defense. To empower employees, have them do online training exercises where they actually walk through scenarios of what could happen as far as security mishaps. In this way, they\u2019ll understand exactly what your company\u2019s security protocols are and how to use them effectively.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Last but not least, make certain to do due diligence for all of your vendors. They too should have cyber security and technologies up-to-date and in alignment with your company.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>In our ever-evolving world, we need to embrace technology. Staying on top of cyber security and the latest technologies is of the utmost importance for peace of mind. Security and technologies should be reviewed and updated at least once a year\u2014better yet once a month or once a quarter, to make certain your company is using them effectively. By spending this small amount of time upfront to make certain everything is in alignment, companies actually save time and money going forward.<\/p>\n\n\n\n<p>In short, you and your company will profit from paying regular attention to the latest in security and technology. And, as always, you can count on Integrated Advisors Network to support you every step of the way. All you have to do is call and we\u2019ll be there.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security. At Integrated Advisors Network, our team is always on-the-lookout for the latest innovations and best systems integration security practices. Therefore, to better educate ourselves and our clients, we recently held a webinar with industry experts Wes Stillman, Chief Innovation Officer at Visory, and Theodore Toso, CEO and Co-Founder at Trinlogix to discuss hot security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_et_pb_use_builder":"off","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>Security. At Integrated Advisors Network, our team is always on-the-lookout, so to speak, for the latest innovations and best practices. Therefore, to better educate ourselves and our clients, we recently held a webinar with industry experts Wes Stillman, Chief Innovation Officer at Visory, and Theodore Toso, CEO and Co-Founder at Trinlogix to discuss hot security topics.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Below you will find highlights from these two tech innovators about what top advisory firms are doing today with cyber security technology and how it is helping them grow their business. <a href=\"https:\/\/vimeo.com\/802834656\/0f0a209243\">Watch<\/a> the entire webinar.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>First ask yourself, is the system integration you want to make compatible with your system?&nbsp; When it comes to integration, you don\u2019t want to use an outlier that doesn\u2019t have a track record. For example, in our Integrated Advisors Network Alliance Program, we use traditional, proven technology open to using independent contractors for security data purposes.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Next, everyone at your company should be aware of their surroundings online. While this is not a new security protocol, it is worth a reminder because security starts with individual employees. Educate employees not to hit risky links in their emails that could potentially give away credentials in a phishing attack.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Note a lot of newer technologies feature New Gen Anti-Virus with AI running in the background to pick up malware and shut it down before any damage is done.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>At least one day a quarter (or at least once a year) review your tech security. <\/strong><strong><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>By doing this you\u2019ll not only know what you have, but you\u2019ll also know how well it is working. By spending a few days a year reviewing your security, you\u2019ll save time and money in the long run by potentially avoiding security breaches and not buying technology you do not need.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Below we\u2019ve listed a few best practices to keep your integrated systems secure.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list {\"ordered\":true,\"type\":\"1\"} -->\n<ol type=\"1\"><!-- wp:list-item -->\n<li>Always make certain you have your cyber security policies and technology updated and in alignment. And this is a big one. Make certain that you are enforcing your cyber security policies.<\/li>\n<!-- \/wp:list-item --><\/ol>\n<!-- \/wp:list -->\n\n<!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li>In order to ensure retention of cyber security and technology policies in this fast-paced industry, keep track of new versions and how they have changed over the course of time.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li>Be hyper vigilant about how you are controlling remote access. (Especially as more and more employees work from home.) Make certain all<em> <\/em>of your integrated applications are turned on to multi-factor authentication.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li>As we mentioned above, employee training is super important as a first line of defense. To empower employees, have them do online training exercises where they actually walk through scenarios of what could happen as far as security mishaps. In this way, they\u2019ll understand exactly what your company\u2019s security protocols are and how to use them effectively.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:list -->\n<ul><!-- wp:list-item -->\n<li>Last but not least, make certain to do due diligence for all of your vendors. They too should have cyber security and technologies up-to-date and in alignment with your company.&nbsp;<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>In our ever-evolving world, we need to embrace technology. Staying on top of cyber security and the latest technologies is of the utmost importance for peace of mind. Security and technologies should be reviewed and updated at least once a year\u2014better yet once a month or once a quarter, to make certain your company is using them effectively. By spending this small amount of time upfront to make certain everything is in alignment, companies actually save time and money going forward.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In short, you and your company will profit from paying regular attention to the latest in security and technology. And, as always, you can count on <a>Integrated<\/a> Advisors Network to support you every step of the way. All you have to do is call and we\u2019ll be there.<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","om_disable_all_campaigns":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[8],"tags":[53,52,31,27,36,28,54],"class_list":["post-598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-best-practices","tag-cybersecurity","tag-fin-tech","tag-financial-advisor","tag-independent-advisor","tag-independent-financial-advisor","tag-tech-innovation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hot Topics in Systems Integration Security - Integrated Advisors Network<\/title>\n<meta name=\"description\" content=\"Integrated Advisors Network, is always on-the-lookout for the latest innovations and best practices in systems integration security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hot Topics in Systems Integration Security\" \/>\n<meta property=\"og:description\" content=\"Integrated Advisors Network, is always on-the-lookout for the latest innovations and best practices in systems integration security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Integrated Advisors Network\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-21T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-07T22:57:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-content\/uploads\/2023\/03\/Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Integrated Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Integrated Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/\"},\"author\":{\"name\":\"The Integrated Team\",\"@id\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/#\\\/schema\\\/person\\\/f321bf0bb2a0e7aae220a26d95c33ef3\"},\"headline\":\"Hot Topics in Systems Integration Security\",\"datePublished\":\"2023-03-21T08:00:00+00:00\",\"dateModified\":\"2023-08-07T22:57:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/\"},\"wordCount\":639,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Security.jpg\",\"keywords\":[\"best practices\",\"cybersecurity\",\"fin tech\",\"financial advisor\",\"independent advisor\",\"independent financial advisor\",\"tech innovation\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/\",\"url\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/\",\"name\":\"Hot Topics in Systems Integration Security - Integrated Advisors Network\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Security.jpg\",\"datePublished\":\"2023-03-21T08:00:00+00:00\",\"dateModified\":\"2023-08-07T22:57:52+00:00\",\"author\":{\"@id\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/#\\\/schema\\\/person\\\/f321bf0bb2a0e7aae220a26d95c33ef3\"},\"description\":\"Integrated Advisors Network, is always on-the-lookout for the latest innovations and best practices in systems integration security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Security.jpg\",\"contentUrl\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Security.jpg\",\"width\":800,\"height\":533,\"caption\":\"Systems Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/hot-topics-in-systems-integration-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hot Topics in Systems Integration Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/#website\",\"url\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/\",\"name\":\"Integrated Advisors Network\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/box5382.temp.domains\\\/~ntegrbo0\\\/#\\\/schema\\\/person\\\/f321bf0bb2a0e7aae220a26d95c33ef3\",\"name\":\"The Integrated Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dcd758d736123665e85c3c4f3b57f70e93188ac8be7220832ff72c8f1e55175?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dcd758d736123665e85c3c4f3b57f70e93188ac8be7220832ff72c8f1e55175?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dcd758d736123665e85c3c4f3b57f70e93188ac8be7220832ff72c8f1e55175?s=96&d=mm&r=g\",\"caption\":\"The Integrated Team\"},\"url\":\"https:\\\/\\\/integratedadvisorsnetwork.com\\\/staging\\\/4015\\\/author\\\/media\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hot Topics in Systems Integration Security - Integrated Advisors Network","description":"Integrated Advisors Network, is always on-the-lookout for the latest innovations and best practices in systems integration security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/","og_locale":"en_US","og_type":"article","og_title":"Hot Topics in Systems Integration Security","og_description":"Integrated Advisors Network, is always on-the-lookout for the latest innovations and best practices in systems integration security.","og_url":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/","og_site_name":"Integrated Advisors Network","article_published_time":"2023-03-21T08:00:00+00:00","article_modified_time":"2023-08-07T22:57:52+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-content\/uploads\/2023\/03\/Security.jpg","type":"image\/jpeg"}],"author":"The Integrated Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Integrated Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#article","isPartOf":{"@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/"},"author":{"name":"The Integrated Team","@id":"http:\/\/box5382.temp.domains\/~ntegrbo0\/#\/schema\/person\/f321bf0bb2a0e7aae220a26d95c33ef3"},"headline":"Hot Topics in Systems Integration Security","datePublished":"2023-03-21T08:00:00+00:00","dateModified":"2023-08-07T22:57:52+00:00","mainEntityOfPage":{"@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/"},"wordCount":639,"commentCount":0,"image":{"@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#primaryimage"},"thumbnailUrl":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-content\/uploads\/2023\/03\/Security.jpg","keywords":["best practices","cybersecurity","fin tech","financial advisor","independent advisor","independent financial advisor","tech innovation"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/","url":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/","name":"Hot Topics in Systems Integration Security - Integrated Advisors Network","isPartOf":{"@id":"http:\/\/box5382.temp.domains\/~ntegrbo0\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#primaryimage"},"image":{"@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#primaryimage"},"thumbnailUrl":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-content\/uploads\/2023\/03\/Security.jpg","datePublished":"2023-03-21T08:00:00+00:00","dateModified":"2023-08-07T22:57:52+00:00","author":{"@id":"http:\/\/box5382.temp.domains\/~ntegrbo0\/#\/schema\/person\/f321bf0bb2a0e7aae220a26d95c33ef3"},"description":"Integrated Advisors Network, is always on-the-lookout for the latest innovations and best practices in systems integration security.","breadcrumb":{"@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#primaryimage","url":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-content\/uploads\/2023\/03\/Security.jpg","contentUrl":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-content\/uploads\/2023\/03\/Security.jpg","width":800,"height":533,"caption":"Systems Security"},{"@type":"BreadcrumbList","@id":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/hot-topics-in-systems-integration-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/"},{"@type":"ListItem","position":2,"name":"Hot Topics in Systems Integration Security"}]},{"@type":"WebSite","@id":"http:\/\/box5382.temp.domains\/~ntegrbo0\/#website","url":"http:\/\/box5382.temp.domains\/~ntegrbo0\/","name":"Integrated Advisors Network","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/box5382.temp.domains\/~ntegrbo0\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/box5382.temp.domains\/~ntegrbo0\/#\/schema\/person\/f321bf0bb2a0e7aae220a26d95c33ef3","name":"The Integrated Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2dcd758d736123665e85c3c4f3b57f70e93188ac8be7220832ff72c8f1e55175?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2dcd758d736123665e85c3c4f3b57f70e93188ac8be7220832ff72c8f1e55175?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dcd758d736123665e85c3c4f3b57f70e93188ac8be7220832ff72c8f1e55175?s=96&d=mm&r=g","caption":"The Integrated Team"},"url":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/author\/media\/"}]}},"_links":{"self":[{"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/posts\/598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/comments?post=598"}],"version-history":[{"count":5,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/posts\/598\/revisions"}],"predecessor-version":[{"id":708,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/posts\/598\/revisions\/708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/media\/602"}],"wp:attachment":[{"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/media?parent=598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/categories?post=598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integratedadvisorsnetwork.com\/staging\/4015\/wp-json\/wp\/v2\/tags?post=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}