{"id":3686,"date":"2016-05-30T22:08:34","date_gmt":"2016-05-30T22:08:34","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=3686"},"modified":"2016-05-30T22:37:31","modified_gmt":"2016-05-30T22:37:31","slug":"deception-security-stolen-documents-call-home","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/","title":{"rendered":"Deception Security: Get Your Stolen Documents to &#8216;Call home.&#8217;"},"content":{"rendered":"<h5>Have you considered the benefits of Deception Security?<\/h5>\n<p><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-medium wp-image-3690\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358-200x300.jpg\" alt=\"Deception Security\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358-200x300.jpg 200w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg 533w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/a><\/p>\n<p>Cybersecurity has never been a bigger concern for enterprises and large organizations. Security breaches constantly make headlines, as hackers manage to steal sensitive information, valuable assets, and confidential trade secrets.<\/p>\n<p>As these threats get more sophisticated, security systems need to invent new tactics and build a better mousetrap\u2014and that\u2019s exactly what deception security technology does.<\/p>\n<p>&nbsp;<\/p>\n<p>Deception security offers an ingenious new way to deter would-be attackers and defend your data. Just like a mousetrap attracts vermin with a tantalizing treat, deception tech baits hackers with what appear to be real assets\u2014only to misdirect them and shut down access to your actual data.<\/p>\n<p>&nbsp;<\/p>\n<p>Today\u2019s deception technology advanced from old-school honeypots\u2014a tried and true security mechanism that\u2019s been around for decades. But while honeypots were complex and limited, emerging deception solutions are increasingly automated and intelligent. According to Gartner, \u201cnew techniques and capabilities promise to deliver game-changing impact.\u201d The research firm also predicts that by 2018, \u201c10% of enterprises will use deception tools and tactics.\u201d Let\u2019s take a closer look.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h5><strong>How Deception Security Systems Protect Your Data\u00a0 <\/strong><\/h5>\n<p>&nbsp;<\/p>\n<p>Like an undercover cop who\u2019s pretending to collude with a criminal, deception security solutions fool hackers into thinking they\u2019ve infiltrated your system and are on the way to ill-gotten gains. These systems emulate fake servers, assets, and applications that are easier to access than your actual network.<\/p>\n<p>&nbsp;<\/p>\n<p>With multiple traps spread across every security layer in the kill chain, it\u2019s hard for hackers to resist your alluring\u2014but fake\u2014assets. Once they do, the deception security system sends an alert to your IT staff while immediately walling off your real data.<\/p>\n<p>&nbsp;<\/p>\n<p>Here\u2019s the genius part: instead of simply shutting the hacker out, deception security solutions divert them to a sandbox\u2014a fake environment that mimics an actual network without offering any valuable data. Intruders waste their time and energy wandering through this maze, giving you more time to understand and effectively neutralize the threat.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Why Deception Security Is So Valuable<\/strong><\/h5>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Are deception security solutions foolproof? The simple answer is no\u2014you shouldn\u2019t depend on any single cybersecurity solution to defend your organization\u2019s assets. But deception technology\u00a0is a powerful addition to your existing security strategies for two related reasons.<\/p>\n<p>&nbsp;<\/p>\n<p>First, deception diverts and distracts hackers, making them expend more effort to reach your data and dramatically slowing them down in the process. This affords your security team much more time and intelligence to stop any attacks.<\/p>\n<p>&nbsp;<\/p>\n<p>Second, by fortifying the barrier to entry, deception security discourages hackers\u2014you\u2019re no longer the lowest hanging fruit in town. Cybercriminals aren\u2019t known for their diligent work ethic: they\u2019d much rather pick off the easy prey. It\u2019s like the old joke: you don\u2019t have to be faster than a bear to get away\u2014you just have to be faster than the person next to you.<\/p>\n<p>Once attackers realize they\u2019ve wasted their time on a deception, they\u2019ll move on to the next target.<\/p>\n<p>&nbsp;<\/p>\n<p>Hospitals, schools, agencies, and enterprises are already embracing this next-generation cybersecurity approach.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"mailto:agibson@abrahamsconsulting.com\">Contact us<\/a> today to learn more about deception security and how to protect your organization.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you considered the benefits of Deception Security? Cybersecurity has never been a bigger concern for enterprises and large organizations. Security breaches constantly make headlines, as hackers manage to steal sensitive information, valuable assets, and confidential trade secrets. As these threats get more sophisticated, security systems need to invent new tactics and build a better [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3690,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[168],"tags":[],"class_list":["post-3686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-deception-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Deception Security: Get Your Stolen Documents to &#039;Call home.&#039; - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Deception Security fortifies your stolen data. It is Data-centric security that protects even after your documents are stolen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deception Security: Get Your Stolen Documents to &#039;Call home.&#039; - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Deception Security fortifies your stolen data. It is Data-centric security that protects even after your documents are stolen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-30T22:08:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-30T22:37:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"533\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Deception Security: Get Your Stolen Documents to &#8216;Call home.&#8217;\",\"datePublished\":\"2016-05-30T22:08:34+00:00\",\"dateModified\":\"2016-05-30T22:37:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\"},\"wordCount\":557,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg\",\"articleSection\":[\"Deception Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\",\"name\":\"Deception Security: Get Your Stolen Documents to 'Call home.' - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg\",\"datePublished\":\"2016-05-30T22:08:34+00:00\",\"dateModified\":\"2016-05-30T22:37:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Deception Security fortifies your stolen data. It is Data-centric security that protects even after your documents are stolen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg\",\"width\":533,\"height\":800,\"caption\":\"Deception Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deception Security: Get Your Stolen Documents to &#8216;Call home.&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deception Security: Get Your Stolen Documents to 'Call home.' - TechTonic Times","description":"Deception Security fortifies your stolen data. It is Data-centric security that protects even after your documents are stolen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/","og_locale":"en_US","og_type":"article","og_title":"Deception Security: Get Your Stolen Documents to 'Call home.' - TechTonic Times","og_description":"Deception Security fortifies your stolen data. It is Data-centric security that protects even after your documents are stolen.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/","og_site_name":"TechTonic Times","article_published_time":"2016-05-30T22:08:34+00:00","article_modified_time":"2016-05-30T22:37:31+00:00","og_image":[{"width":533,"height":800,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Deception Security: Get Your Stolen Documents to &#8216;Call home.&#8217;","datePublished":"2016-05-30T22:08:34+00:00","dateModified":"2016-05-30T22:37:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/"},"wordCount":557,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg","articleSection":["Deception Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/","name":"Deception Security: Get Your Stolen Documents to 'Call home.' - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg","datePublished":"2016-05-30T22:08:34+00:00","dateModified":"2016-05-30T22:37:31+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Deception Security fortifies your stolen data. It is Data-centric security that protects even after your documents are stolen.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2016\/05\/dreamstime_s_52314358.jpg","width":533,"height":800,"caption":"Deception Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/deception-security-stolen-documents-call-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Deception Security: Get Your Stolen Documents to &#8216;Call home.&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=3686"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3686\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/3690"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=3686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=3686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=3686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}