{"id":893,"date":"2018-04-10T20:14:23","date_gmt":"2018-04-11T00:14:23","guid":{"rendered":"https:\/\/www.baronsoftware.com\/Blog\/?p=893"},"modified":"2018-04-10T20:14:23","modified_gmt":"2018-04-11T00:14:23","slug":"one-third-of-internal-user-accounts-are-ghost-users","status":"publish","type":"post","link":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","title":{"rendered":"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"737\" data-permalink=\"https:\/\/www.baronsoftware.com\/Blog\/will-facebook-dislike-button-not-question\/baronsoftwarelogo_2018-fw-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&amp;ssl=1\" data-orig-size=\"492,98\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"BaronSoftwareLogo_2018.fw\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&amp;ssl=1\" class=\"aligncenter size-medium wp-image-737\" src=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?resize=300%2C60&#038;ssl=1\" alt=\"\" width=\"300\" height=\"60\" srcset=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?resize=300%2C60&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?w=492&amp;ssl=1 492w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h3 style=\"text-align: center;\">One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;<\/h3>\n<p><span class=\"strong black\">Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.<\/span><\/p>\n<div class=\"divsplitter\">\u00a0Meager access controls on folders and file systems are leaving organizations wide open to the lateral movement of attackers and malware, according to a new report.<\/div>\n<div><\/div>\n<p>Security firm Varonis analyzed data risk assessments performed by its engineers on 130 companies and 5.5 petabyes of data through 2017. What concerns Varonis technical evangelist Brian Vecci most is that companies left 21% of all their folders open to everyone in the company.<\/p>\n<p>Sensitive folders and files are among the overexposed. Thirty percent of companies leave more than 1,000 sensitive folders accessible to all employees, and 41% have more than 1,000 sensitive files accessible to all employees, according to the report.<\/p>\n<p>Adding to the risk of attackers&#8217; lateral movement is the prevalence of user accounts that are &#8220;stale&#8221; &#8211; inactive, out of use &#8211; but still enabled. The Varonis assessments found that 34% of all users fall into this &#8220;ghost user&#8221; category; almost half (46%) of companies have over 1,000 ghost user accounts.<\/p>\n<p>Not only are users inactive, but the data is as well &#8211; more than half (54%) of companies&#8217; data is stale, according to the report. Not only could this be a needless storage expense, but it puts organizations at higher risk of breaches and regulatory compliance violations.<\/p>\n<p>His advice is to scan for sensitive data, map all access controls, and turn on monitoring. &#8220;In other words, know what you&#8217;ve got,&#8221; says Vecci. &#8220;If you just do these three things, companies would be so much further than they are right now. And it doesn&#8217;t need to be a big project.&#8221;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217; Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content. \u00a0Meager access controls on folders and file systems are leaving organizations wide open to the lateral movement of attackers and malware, according to a new report. Security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[153],"tags":[],"class_list":["post-893","post","type-post","status-publish","format-standard","hentry","category-news-items"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>One-Third of Internal User Accounts Are &#039;Ghost Users&#039; - Baron Software<\/title>\n<meta name=\"description\" content=\"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"One-Third of Internal User Accounts Are &#039;Ghost Users&#039;\" \/>\n<meta property=\"og:description\" content=\"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Baron Software\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-11T00:14:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"richard@baronsoftware.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"One-Third of Internal User Accounts Are &#039;Ghost Users&#039;\" \/>\n<meta name=\"twitter:description\" content=\"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&ssl=1\" \/>\n<meta name=\"twitter:creator\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:site\" content=\"@Rbaroniunas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"richard@baronsoftware.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/\"},\"author\":{\"name\":\"richard@baronsoftware.com\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\"},\"headline\":\"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;\",\"datePublished\":\"2018-04-11T00:14:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/\"},\"wordCount\":285,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/BaronSoftwareLogo_2018.fw_-1-300x60.png\",\"articleSection\":[\"News Items\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/\",\"name\":\"One-Third of Internal User Accounts Are 'Ghost Users' - Baron Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/BaronSoftwareLogo_2018.fw_-1-300x60.png\",\"datePublished\":\"2018-04-11T00:14:23+00:00\",\"description\":\"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&ssl=1\",\"width\":492,\"height\":98},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/one-third-of-internal-user-accounts-are-ghost-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#website\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"name\":\"Baron Software\",\"description\":\"Highest Quality Software Developed.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#organization\",\"name\":\"Baron Software\",\"url\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/www.baronsoftware.com\\\/Blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1\",\"width\":1920,\"height\":400,\"caption\":\"Baron Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/Rbaroniunas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.baronsoftware.com\\\/Blog\\\/#\\\/schema\\\/person\\\/079d370e4230be9d5f75885bb33dd8cd\",\"name\":\"richard@baronsoftware.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g\",\"caption\":\"richard@baronsoftware.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"One-Third of Internal User Accounts Are 'Ghost Users' - Baron Software","description":"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","og_locale":"en_US","og_type":"article","og_title":"One-Third of Internal User Accounts Are 'Ghost Users'","og_description":"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.","og_url":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","og_site_name":"Baron Software","article_published_time":"2018-04-11T00:14:23+00:00","og_image":[{"width":1920,"height":400,"url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","type":"image\/png"}],"author":"richard@baronsoftware.com","twitter_card":"summary_large_image","twitter_title":"One-Third of Internal User Accounts Are 'Ghost Users'","twitter_description":"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.","twitter_image":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&ssl=1","twitter_creator":"@Rbaroniunas","twitter_site":"@Rbaroniunas","twitter_misc":{"Written by":"richard@baronsoftware.com","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#article","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/"},"author":{"name":"richard@baronsoftware.com","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd"},"headline":"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;","datePublished":"2018-04-11T00:14:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/"},"wordCount":285,"commentCount":0,"publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png","articleSection":["News Items"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","url":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/","name":"One-Third of Internal User Accounts Are 'Ghost Users' - Baron Software","isPartOf":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#primaryimage"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1-300x60.png","datePublished":"2018-04-11T00:14:23+00:00","description":"Due to inadequate access controls on various systems attackers and malware can easily move laterally through an organization destroying content.","breadcrumb":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#primaryimage","url":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/BaronSoftwareLogo_2018.fw_-1.png?fit=492%2C98&ssl=1","width":492,"height":98},{"@type":"BreadcrumbList","@id":"https:\/\/www.baronsoftware.com\/Blog\/one-third-of-internal-user-accounts-are-ghost-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.baronsoftware.com\/Blog\/"},{"@type":"ListItem","position":2,"name":"One-Third of Internal User Accounts Are &#8216;Ghost Users&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.baronsoftware.com\/Blog\/#website","url":"https:\/\/www.baronsoftware.com\/Blog\/","name":"Baron Software","description":"Highest Quality Software Developed.","publisher":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.baronsoftware.com\/Blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.baronsoftware.com\/Blog\/#organization","name":"Baron Software","url":"https:\/\/www.baronsoftware.com\/Blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/01\/BaronSoftwareLogo.fw_.png?fit=1920%2C400&ssl=1","width":1920,"height":400,"caption":"Baron Software"},"image":{"@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Rbaroniunas"]},{"@type":"Person","@id":"https:\/\/www.baronsoftware.com\/Blog\/#\/schema\/person\/079d370e4230be9d5f75885bb33dd8cd","name":"richard@baronsoftware.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a3cc457a883c420e8af899f2639359d220ae6bfed4587ca7ed17f45ca0c21c?s=96&d=mm&r=g","caption":"richard@baronsoftware.com"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2e6qU-ep","jetpack-related-posts":[{"id":603,"url":"https:\/\/www.baronsoftware.com\/Blog\/10-important-feature-improvements-apples-ios-11\/","url_meta":{"origin":893,"position":0},"title":"10 Most Important Feature Improvements to Apple\u2019s iOS 11","author":"richard@baronsoftware.com","date":"September 30, 2017","format":false,"excerpt":"10 Most Important Feature Improvements to Apple\u2019s iOS 11 Apple iOS 11 is now available to download and install from the Apple store.\u00a0 There is a new update released 11.0.1 so most likely there were some software glitch that needed immediate repair. List of 10 improvements Apple\u2019s iOS 11 includes\u2026","rel":"","context":"In &quot;Software Events&quot;","block_context":{"text":"Software Events","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-events\/"},"img":{"alt_text":"iOS","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/02\/Apple.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1027,"url":"https:\/\/www.baronsoftware.com\/Blog\/purchase-a-western-digitial-my-cloud-nas-server\/","url_meta":{"origin":893,"position":1},"title":"Purchase a Western Digitial My Cloud NAS Server","author":"richard@baronsoftware.com","date":"July 31, 2020","format":false,"excerpt":"The WD 8 TB My Cloud EX2 Ultra NAS Server is a fantastic device to place in your work or home environment. Once connected a user can access the device from all of the internal machines within the office. They can also access the NAS server from the outside world\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2020\/07\/MyCloudEX2Ultra-Hero.jpg.thumb_.1280.1280.jpg?fit=1200%2C586&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":815,"url":"https:\/\/www.baronsoftware.com\/Blog\/npm-update-crashes-linux-systems-cases-forces-reinstallation\/","url_meta":{"origin":893,"position":2},"title":"NPM Update Crashes Linux Systems and in some cases forces re-installation","author":"richard@baronsoftware.com","date":"March 1, 2018","format":false,"excerpt":"NPM Update Crashes Linux Systems and in some cases forces re-installation A bug in npm (Node Package Manager), the most widely used JavaScript package manager, will change ownership of crucial Linux system folders, such as \/etc, \/usr, \/boot.\u00a0 \u00a0Changing ownership of these files either crashes the system, various local apps,\u2026","rel":"","context":"In &quot;Software Releases&quot;","block_context":{"text":"Software Releases","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/software-releases\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2018\/02\/cropped-BaronSoftwareLogo_2018.fw_-1-300x62.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":419,"url":"https:\/\/www.baronsoftware.com\/Blog\/cybersecurity-risks-expected-increase-2017\/","url_meta":{"origin":893,"position":3},"title":"Cybersecurity risks expected to increase in 2017","author":"richard@baronsoftware.com","date":"February 10, 2017","format":false,"excerpt":"Cybersecurity risks expected to increase in 2017 The year 2016 saw a rise in cyber-attacks, both ransomware and distributed denial-of-service (DDoS) on small and large corporations globally. \u00a0Close to 50 percent of companies were subjected to some form of cyber-ransom attack in 2016. \u00a0Whether the ransom was medical records or\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"Baron Software","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2014\/12\/logo-300x53.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":974,"url":"https:\/\/www.baronsoftware.com\/Blog\/importance-of-cyber-security\/","url_meta":{"origin":893,"position":4},"title":"Importance of Cyber security","author":"richard@baronsoftware.com","date":"December 23, 2019","format":false,"excerpt":"Data Security can no longer be a requirement of the IT Department. It is vital that the entire company that are within the network be on their utmost watch. Cyber security rules and staff must be in place as of today. Data Breaches Watching current events there has been reports\u2026","rel":"","context":"In &quot;Rad Studio Delphi Development&quot;","block_context":{"text":"Rad Studio Delphi Development","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/rad-studio-embarcadero-delphi-development\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":591,"url":"https:\/\/www.baronsoftware.com\/Blog\/hackers-hid-malware-ccleaner-software\/","url_meta":{"origin":893,"position":5},"title":"Hackers hid malware in CCleaner software","author":"richard@baronsoftware.com","date":"September 20, 2017","format":false,"excerpt":"Hackers hid malware in CCleaner software Hackers have successfully breached CCleaner\u2019s security to inject malware into the app and distribute it to millions of users.\u00a0Security researchers at Cisco Talos discovered\u00a0that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. CCleaner Version 5.33\u2026","rel":"","context":"In &quot;Computer PC Tips - bits and bytes&quot;","block_context":{"text":"Computer PC Tips - bits and bytes","link":"https:\/\/www.baronsoftware.com\/Blog\/category\/pc-tips-bits-bytes\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.baronsoftware.com\/Blog\/wp-content\/uploads\/2017\/09\/cc_128.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/comments?post=893"}],"version-history":[{"count":1,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/893\/revisions"}],"predecessor-version":[{"id":894,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/posts\/893\/revisions\/894"}],"wp:attachment":[{"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/media?parent=893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/categories?post=893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.baronsoftware.com\/Blog\/wp-json\/wp\/v2\/tags?post=893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}