{"id":2570,"date":"2018-08-07T14:00:28","date_gmt":"2018-08-07T20:00:28","guid":{"rendered":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/"},"modified":"2018-08-07T14:00:28","modified_gmt":"2018-08-07T20:00:28","slug":"simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/","title":{"rendered":"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers"},"content":{"rendered":"

Cyber attacks have become an issue of growing concern for institutions across a variety of industries. With so much of everyday life conducted online, it\u2019s no wonder a new breed of hackers is intent on stealing information. How can you be sure your business is protected?<\/p>\n

\"Cyber<\/p>\n

In 2018, a number of high-profile companies have already experienced data breaches. Now they are left to deal with the repercussions of a dip in consumer trust, along with penalties, fines and perhaps even lawsuits.<\/p>\n

The Meltdown, Spectre, Heartbleed, and ShellShock cyber breaches in recent years have proven that there is no one-size-fits-all solution to this growing problem. The time for businesses to act is now. Man-in-the-middle attacks, distributed denial of service attacks, and session cookie tampering all played a role in these data breaches<\/a>, leading to the conclusion that businesses must do more to prepare themselves against a range of attacks.<\/p>\n

According to CSO<\/a>, cybercrime damage is expected to cost over $6 trillion annually by the year 2021. Software firm Rapid7, intent on cracking down on cyber attacks, conducted hundreds of penetration tests over the past 10 months to determine how well networks can combat cyber threats. The study, named \u201cUnder the Hoodie 2018\u201d is filled with interesting data that sheds light on some of the most common cyber targets and what businesses can do to arm themselves.<\/p>\n

What Is A Penetration Test?<\/strong><\/p>\n

A penetration test, or pentest, is a simulated cyber attack conducted to determine exploitable vulnerabilities in any given computer system. Pen tests can involve the attempted breach of a variety of application systems, including APIs, front and backend servers, and others. These tests are designed to uncover network vulnerabilities that may make a company susceptible to breaches.<\/p>\n

Studies of this nature are vital for pinpointing which type of network misconfigurations are liable for hacker access, and how user credentials are being used. The insights provided by pen tests can help businesses create a plan of action against attacks, allowing them to fine-tune their security policies and find solutions to fix vulnerabilities before they\u2019re impacted.<\/p>\n

What Are The Stages Of Pen Testing? <\/strong><\/p>\n

Pen testing is typically divided into five stages. The first involves planning and reconnaissance, which means defining the goals of a test and clearly outlining the systems and testing methods that will be addressed. Gathering data is another important part of this stage, as it allows the test conductors to more clearly understand a target and the potential vulnerabilities to be encountered.<\/p>\n

The second stage involves scanning and static analysis, which means inspecting an application\u2019s code to determine its behaviors. Dynamic analysis, also part of the second stage, involves inspecting this code in a running state, offering a real-time view into its performance.<\/p>\n

A pen test\u2019s third phase most often includes gaining access to a network by way of web application attacks to uncover a specific target\u2019s vulnerabilities. It is then the duty of the tester to attempt to exploit these by escalating privileges, intercepting traffic, stealing data, or doing other damage.<\/p>\n

Maintaining access, the fourth stage of a pen test, involves determining how a specific vulnerability can be used to present a persistent threat. Often, persistent threats are used to steal sensitive data from an organization over a period of months.<\/p>\n

Finally, comes the analysis of collected data. The tester will compile a report that details which specific vulnerabilities were exploited, what type of data was accessed, and the amount of time the tester was able to maintain access to the system while remaining undetected. All of this information combined paints a clear picture of what a business can do to protect itself against similar attacks in the future.<\/p>\n

What Were The Results? <\/strong><\/p>\n

Rapid7 conducted more than 268 pen tests across a wide range of industries, 251 of which involved live production networks likely to hold real and confidential data. Of these 268 tests, 59% of the simulated hackers attacked from outside the target network, which would most likely be the case for the majority of today\u2019s businesses.<\/p>\n

The study helped gather a world of insight into the everyday user\u2019s online security habits, or lack thereof. One interesting finding was that of password patterns. The findings suggest that the majority of users choose passwords of the minimum required length, and tend to use numbers at the end of the password.<\/p>\n

The most common password used? \u00a0\u201cPassword1.\u201d According to a popular password hacking website<\/a>, it would take hackers .29 milliseconds to crack this password.<\/p>\n

Overall, the study concluded that Rapid7 testers exploited at least one in-production vulnerability in nearly 85% of all engagements. For internally-based penetration tests in which the pen tester had local network access, that number rose to 96%. This means that success rates are significantly higher for penetration testers when they have access to internal LAN or WLANs.<\/p>\n

This type of information is imperative in giving businesses a leg up in preparing their defense against cyber attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"

Cyber attacks have become an issue of growing concern for institutions across a variety of industries. With so much of everyday life conducted online, it\u2019s no wonder a new breed of hackers […]<\/p>\n","protected":false},"author":1,"featured_media":2571,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nSimulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers – KTG<\/title>\n<meta name=\"description\" content=\"Click Here to learn more \ud83c\udf1f Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers - Since 1992 - Nashville's Top IT Services Company\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers\" \/>\n<meta property=\"og:description\" content=\"Click Here to learn more \ud83c\udf1f Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers - Since 1992 - Nashville's Top IT Services Company\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"KTG\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/krafttechgroup\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-07T20:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"553\" \/>\n\t<meta property=\"og:image:height\" content=\"311\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/krafttechgroup\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\"},\"author\":{\"name\":\"Brian Gray\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36\"},\"headline\":\"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers\",\"datePublished\":\"2018-08-07T20:00:28+00:00\",\"dateModified\":\"2018-08-07T20:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\"},\"wordCount\":827,\"publisher\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\",\"url\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\",\"name\":\"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers – KTG\",\"isPartOf\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg\",\"datePublished\":\"2018-08-07T20:00:28+00:00\",\"dateModified\":\"2018-08-07T20:00:28+00:00\",\"description\":\"Click Here to learn more \ud83c\udf1f Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers - Since 1992 - Nashville's Top IT Services Company\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage\",\"url\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg\",\"contentUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg\",\"width\":553,\"height\":311},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kraftgrp.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kraftgrp.com\/#website\",\"url\":\"https:\/\/www.kraftgrp.com\/\",\"name\":\"KTG\",\"description\":\"Nashville IT Support & IT Services\",\"publisher\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kraftgrp.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\",\"name\":\"Kraft Technology Group\",\"url\":\"https:\/\/www.kraftgrp.com\/\",\"logo\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-organization-logo\"},\"address\":{\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"36.1941464\",\"longitude\":\"-86.807833\"},\"telephone\":[\"(615) 600-4411\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Sunday\",\"Saturday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}],\"email\":\"info@kraftgrp.com\",\"faxNumber\":\"(615) 600-4411\",\"areaServed\":\"Tennessee\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36\",\"name\":\"Brian Gray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g\",\"caption\":\"Brian Gray\"},\"description\":\"Brian Gray, MCP, is the President at Kraft Technology Group, LLC (KTG), an affiliate of KraftCPAs PLLC. Within his role, Brian is responsible for all aspects of service delivery to our clients. Brian has a decade of experience working for managed service providers. He has worked with clients in a variety of industries, including financial services, accounting, legal, healthcare, manufacturing, and retail.\",\"sameAs\":[\"https:\/\/www.facebook.com\/krafttechgroup\/\",\"https:\/\/www.instagram.com\/kraft.tech.group\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/krafttechgroup\",\"https:\/\/www.youtube.com\/channel\/UCtyhZQ69LpOjdaHg6HxNwQg\/videos\"]},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-place-address\",\"streetAddress\":\"555 Great Circle, Road Nashville\",\"addressLocality\":\"Nashville\",\"postalCode\":\"37228\",\"addressRegion\":\"TN\",\"addressCountry\":\"US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-organization-logo\",\"url\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png\",\"contentUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png\",\"width\":504,\"height\":100,\"caption\":\"Kraft Technology Group\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Nashville\" \/>\n<meta name=\"geo.position\" content=\"36.1941464;-86.807833\" \/>\n<meta name=\"geo.region\" content=\"United States (US)\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers – KTG","description":"Click Here to learn more \ud83c\udf1f Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers - Since 1992 - Nashville's Top IT Services Company","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers","og_description":"Click Here to learn more \ud83c\udf1f Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers - Since 1992 - Nashville's Top IT Services Company","og_url":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/","og_site_name":"KTG","article_author":"https:\/\/www.facebook.com\/krafttechgroup\/","article_published_time":"2018-08-07T20:00:28+00:00","og_image":[{"width":553,"height":311,"url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg","type":"image\/jpeg"}],"author":"Brian Gray","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/krafttechgroup","twitter_misc":{"Written by":"Brian Gray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#article","isPartOf":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/"},"author":{"name":"Brian Gray","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36"},"headline":"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers","datePublished":"2018-08-07T20:00:28+00:00","dateModified":"2018-08-07T20:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/"},"wordCount":827,"publisher":{"@id":"https:\/\/www.kraftgrp.com\/#organization"},"image":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/","url":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/","name":"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers – KTG","isPartOf":{"@id":"https:\/\/www.kraftgrp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg","datePublished":"2018-08-07T20:00:28+00:00","dateModified":"2018-08-07T20:00:28+00:00","description":"Click Here to learn more \ud83c\udf1f Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers - Since 1992 - Nashville's Top IT Services Company","breadcrumb":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#primaryimage","url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg","contentUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/08\/ThinkstockPhotos-817486028.jpg","width":553,"height":311},{"@type":"BreadcrumbList","@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kraftgrp.com\/"},{"@type":"ListItem","position":2,"name":"Simulated Attacks Reveal How Easily Corporate Networks Fall Prey to Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.kraftgrp.com\/#website","url":"https:\/\/www.kraftgrp.com\/","name":"KTG","description":"Nashville IT Support & IT Services","publisher":{"@id":"https:\/\/www.kraftgrp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kraftgrp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Organization","Place"],"@id":"https:\/\/www.kraftgrp.com\/#organization","name":"Kraft Technology Group","url":"https:\/\/www.kraftgrp.com\/","logo":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-organization-logo"},"address":{"@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"36.1941464","longitude":"-86.807833"},"telephone":["(615) 600-4411"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Sunday","Saturday"],"opens":"00:00","closes":"00:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"17:00"}],"email":"info@kraftgrp.com","faxNumber":"(615) 600-4411","areaServed":"Tennessee"},{"@type":"Person","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36","name":"Brian Gray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g","caption":"Brian Gray"},"description":"Brian Gray, MCP, is the President at Kraft Technology Group, LLC (KTG), an affiliate of KraftCPAs PLLC. Within his role, Brian is responsible for all aspects of service delivery to our clients. Brian has a decade of experience working for managed service providers. He has worked with clients in a variety of industries, including financial services, accounting, legal, healthcare, manufacturing, and retail.","sameAs":["https:\/\/www.facebook.com\/krafttechgroup\/","https:\/\/www.instagram.com\/kraft.tech.group\/","https:\/\/x.com\/https:\/\/twitter.com\/krafttechgroup","https:\/\/www.youtube.com\/channel\/UCtyhZQ69LpOjdaHg6HxNwQg\/videos"]},{"@type":"PostalAddress","@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-place-address","streetAddress":"555 Great Circle, Road Nashville","addressLocality":"Nashville","postalCode":"37228","addressRegion":"TN","addressCountry":"US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/simulated-attacks-reveal-how-easily-corporate-networks-fall-prey-to-hackers\/#local-main-organization-logo","url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png","contentUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png","width":504,"height":100,"caption":"Kraft Technology Group"}]},"geo.placename":"Nashville","geo.position":{"lat":"36.1941464","long":"-86.807833"},"geo.region":"United States (US)"},"_links":{"self":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts\/2570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/comments?post=2570"}],"version-history":[{"count":0,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts\/2570\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/media\/2571"}],"wp:attachment":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/media?parent=2570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/categories?post=2570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/tags?post=2570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}