{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.the-future-of-commerce.com\/tag\/malware\/#CollectionPage","headline":"Malware Tag","description":"","url":"https:\/\/www.the-future-of-commerce.com\/tag\/malware\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2021\/05\/05\/data-breach-examples-definition-costs-consequences\/","headline":"Data breach examples, definition, consequences, costs","url":"https:\/\/www.the-future-of-commerce.com\/2021\/05\/05\/data-breach-examples-definition-costs-consequences\/","datePublished":"2021-05-05","dateModified":"2021-12-28","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2021\/05\/05\/data-breach-examples-definition-costs-consequences\/","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/amanda-magee\/#Person","name":"Amanda Magee","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/amanda-magee\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/d3d69f4ddce68f5d2823f63304be72f8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3d69f4ddce68f5d2823f63304be72f8?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Customer Engagement and Experience","logo":{"@type":"ImageObject","@id":"http:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2020\/03\/logo-fcee-schema-app.png","url":"http:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2020\/03\/logo-fcee-schema-app.png","width":278,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2021\/05\/DataBreach_1200x375.jpg","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2021\/05\/DataBreach_1200x375.jpg","height":375,"width":1200},"keywords":["Brand Management","CDP | Customer Data Platform","CIAM | Customer Identity and Access Management","Consent Data Management","Customer Profile Management","Data Breach","Data Privacy","Data Security","GDPR","Malware","Phishing"]},{"@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2019\/04\/22\/data-security-future-of-cx\/","headline":"Why data security is critical to the future of CX","url":"https:\/\/www.the-future-of-commerce.com\/2019\/04\/22\/data-security-future-of-cx\/","datePublished":"2019-04-22","dateModified":"2021-12-28","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2019\/04\/22\/data-security-future-of-cx\/","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/saj-hoffman-hussain\/#Person","name":"Saj Hoffman-Hussain","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/saj-hoffman-hussain\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/3dcbfe8bee2b24c079819168eee9fa25?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3dcbfe8bee2b24c079819168eee9fa25?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Customer Engagement and Experience","logo":{"@type":"ImageObject","@id":"http:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2020\/03\/logo-fcee-schema-app.png","url":"http:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2020\/03\/logo-fcee-schema-app.png","width":278,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2019\/04\/thumbnail-937c351a0c8a84043a707c5a13148eae.jpeg","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2019\/04\/thumbnail-937c351a0c8a84043a707c5a13148eae.jpeg","height":375,"width":1200},"keywords":["Cybersecurity","Data Breach","Malware","Phishing","Public Sector"]},{"@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","headline":"Malware attacks: Ransomware infection at the weakest point","url":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","datePublished":"2016-05-04","dateModified":"2021-12-28","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/dean-afzal\/#Person","name":"Dean Afzal","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/dean-afzal\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1a1818a8f2efbe7f1a47be18e44033a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1a1818a8f2efbe7f1a47be18e44033a2?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Customer Engagement and Experience","logo":{"@type":"ImageObject","@id":"http:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2020\/03\/logo-fcee-schema-app.png","url":"http:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2020\/03\/logo-fcee-schema-app.png","width":278,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2016\/05\/thumbnail-431b76564bfaa2caa0157271432b90bd-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2016\/05\/thumbnail-431b76564bfaa2caa0157271432b90bd-1.png","height":370,"width":1200},"keywords":["Cybersecurity","Malware","Phishing"]}],"about":["Commerce","Customer Data","Intelligent Enterprise"]}