{"id":29973,"date":"2024-10-10T09:00:25","date_gmt":"2024-10-10T08:00:25","guid":{"rendered":"https:\/\/www.topdesk.com\/en\/?p=29973"},"modified":"2025-03-28T13:58:09","modified_gmt":"2025-03-28T13:58:09","slug":"security-issues-itsm","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/","title":{"rendered":"Security issues: how ITSM can reduce cyber threats"},"content":{"rendered":"<p>Cybersecurity has always been a major concern for IT organizations. And with good reason. According to IBM, the <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">global average cost of a data breach in 2024 was USD 4.88 million<\/a>.<\/p>\n<p>Now, with directives like <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noopener\">NIS 2<\/a> placing even stricter cybersecurity requirements on businesses, getting on top of security issues with ITSM is more crucial than ever.<\/p>\n<h2>How are ITSM and security related?<\/h2>\n<p>While ITSM provides a framework for managing how IT is used in your organization, cybersecurity involves safeguarding your systems, networks, and data from cyber threats.\u00a0 Although their focuses are different, cybersecurity and <a href=\"https:\/\/www.topdesk.com\/en\/glossary\/what-is-itsm\/\">IT Service Management (ITSM)<\/a> are very much intertwined.<\/p>\n<p>Integrating <a href=\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\">security best practices<\/a> into your service management processes ensures that you\u2019re designing and delivering IT services in a way that sticks to high security standards, reducing the risk of breaches or cyber-attacks. Plus, combining <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm-cybersecurity\/\">ITSM and cybersecurity<\/a> means you can educate your end users and the wider organization on security best practices, which will make life easier for both your IT service desk and your security team in the long run. For a deeper dive into how IT Service Management (ITSM) plays a crucial role in strengthening cybersecurity, check out <a href=\"https:\/\/www.topdesk.com\/en\/e-books\/cybersecurity\/\">our e-book on ITSM and cybersecurity<\/a>.<\/p>\n<p>But how do you align your ITSM with cybersecurity best practices? Here&#8217;s how you can use 4 key ITSM processes and <a href=\"https:\/\/www.topdesk.com\/en\/itsm-software\/\">ITSM software<\/a> to minimize security issues:<\/p>\n<h2>Incident Management<\/h2>\n<p><a href=\"https:\/\/www.topdesk.com\/en\/glossary\/what-is-incident-management\/\">Incident Management<\/a> is usually the first line of defense when a security issue arises. Perhaps one of your more security-savvy end users has noticed a potential security issue and has already alerted the IT service desk. Or maybe, as is most often the case, the victim of the security issue doesn\u2019t even know they\u2019re a victim yet. Either way, it\u2019s your service desk\u2019s job to identify, log, and categorize the security incident \u2014 and then coordinate the response.<\/p>\n<h3>How can Incident Management help minimize security issues?<\/h3>\n<p>A solid Incident Management process can help you identify and respond to security incidents faster. A speedy incident response gives attackers a smaller window of opportunity to exploit a vulnerability and do even more damage.<\/p>\n<p>Incident Management also helps you to prioritize your responses to incidents like cyber attacks, based on the severity and the (potential) impact, so you can deal with critical security issues first. And by using a <a href=\"https:\/\/www.topdesk.com\/en\/features\/incident-management-software\/\">dedicated ITSM tool for Incident Management<\/a>, you can save even more time with automatic incident categorization and prioritization.<\/p>\n<p>Did you know that dealing with significant security issues quickly isn\u2019t just a cybersecurity best practice? It\u2019s actually a requirement of the <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"_blank\" rel=\"noopener\">EU\u2019s NIS 2 directive<\/a>. Under NIS 2, organizations are required to inform relevant authorities of any major incidents as soon as possible or they could risk a penalty. So, setting up solid processes for responding to and reporting significant incidents are now a must if you want to stay compliant.<\/p>\n<h2>Asset Management<\/h2>\n<p>How does <a href=\"https:\/\/www.topdesk.com\/en\/glossary\/what-is-it-asset-management\/\">IT Asset Management (ITAM)<\/a> relate to cybersecurity? The answer is simple: You can\u2019t protect what you don\u2019t know you have. Asset Management helps you to get a clear overview of your assets, so you can ensure they\u2019re properly secure and compliant.<\/p>\n<h3>How can Asset Management help minimize security issues?<\/h3>\n<p>Because ITAM allows you to see all the assets your organization is working with, it also helps you to pinpoint potential security risks. Having a clear overview of your IT assets and their configurations can help you to identify outdated software or hardware that may be susceptible to common vulnerabilities. This way, you can proactively address potential weaknesses before attackers can exploit them.<\/p>\n<p>As well as helping you create a detailed inventory of your assets, Asset Management can also help you manage and control your end users\u2019 access to your assets. <a href=\"https:\/\/www.topdesk.com\/en\/features\/it-asset-management-software\/\">TOPdesk\u2019s Asset Management software<\/a>, for example, employs role-based access control, so that users can only access information and assets that are strictly relevant to their role. This prevents users from gaining unauthorized access to sensitive data and can reduce the risk of internal threats.<\/p>\n<h2>Change Management<\/h2>\n<p>A change in IT can be defined as any alteration made to the IT infrastructure \u2014 this can be as simple as installing a new printer or as complex as implementing a new piece of software. Big or small, any change comes with its own risk of security issues, so aligning your <a href=\"https:\/\/www.topdesk.com\/en\/features\/it-change-management-software\/\">Change Management<\/a> process with security best practices is crucial.<\/p>\n<h3>How can Change Management help minimize security issues?<\/h3>\n<p>Change Management involves assessing the potential risks associated with a proposed change, including potential security issues. Will a change introduce new vulnerabilities, for example? A good risk assessment as part of Change Management should help you to pinpoint any weaknesses that might be created as part of a new change, so you can put measures in place to prevent breaches down the line.<\/p>\n<p>Another big part of Change Management is documenting every change \u2014 and the steps involved. This provides your service desk with a detailed audit trail, which can make it much easier for you to identify the cause of any security issues that arise after the change.<\/p>\n<h2>Knowledge Management<\/h2>\n<p>Cybersecurity isn\u2019t just a concern for IT \u2014 it\u2019s something your end users need to be actively thinking about, too. After all, studies show that <a href=\"https:\/\/www.weforum.org\/agenda\/2020\/12\/cyber-risk-cyber-security-education\/\" target=\"_blank\" rel=\"noopener\">95% of cybersecurity breaches can be traced back to human error<\/a>. This is where <a href=\"https:\/\/www.topdesk.com\/en\/glossary\/what-is-knowledge-management\/\">Knowledge Management<\/a> comes in. By ensuring that security-related knowledge is shared throughout the organization, you can reduce the likelihood of one of your end users accidentally causing a breach.<\/p>\n<h3>How can Knowledge Management help minimize security issues?<\/h3>\n<p>There\u2019s no better asset for your IT department than a security-smart end user. A well-maintained <a href=\"https:\/\/www.topdesk.com\/en\/features\/knowledge-base\/\">knowledge base<\/a> can be used to train your customers in cybersecurity awareness and best practices.<\/p>\n<blockquote><p>With Knowledge Management you can:<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Share practical information about common threats<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Teach users how to recognize phishing attempts<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\">Provide guidance on password setting and safety<\/li>\n<\/ul>\n<\/blockquote>\n<p>Your agents can make use of your knowledge base, too. If a security incident does occur, a comprehensive knowledge base can help IT teams to quickly find solutions and guide them through standardized procedures to deal with the breach as quickly as possible.<\/p>\n<h2>Strengthen your ITSM security with TOPdesk\u2019s ITSM tool<\/h2>\n<p>When it comes to strengthening your cybersecurity, you want a service management tool that works with you, not against you.<\/p>\n<p><a href=\"https:\/\/www.topdesk.com\/en\/products\/it-service-management-platform\/\">TOPdesk\u2019s ITSM software<\/a> is fully aligned with ITIL and supports Incident Management, Asset Management, Change Management, and more, so aligning your security approach with these processes couldn\u2019t be easier.<\/p>\n<p>Our software easily integrates with cybersecurity tools such as monitoring software, making responding to and reporting on incidents a breeze. And with features such as multi-factor authentication (MFA) and role-based access control, you\u2019ll be set up to comply with cybersecurity frameworks and directives such as NIS 2.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Want to stay on top of security issues and keep compliant with frameworks like NIS2? Integrate security best practices into your ITSM.<\/p>\n","protected":false},"author":370,"featured_media":31266,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-29973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":37263,"blog_hubspot_cta_link":{"title":"Discover TOPdesk for cybersecurity","url":"https:\/\/www.topdesk.com\/en\/cybersecurity-solution\/","target":""},"toc_display":"compact","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ITSM Security Management: Addressing Security Issues in ITSM<\/title>\n<meta name=\"description\" content=\"Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security issues: how ITSM can reduce cyber threats | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-10T08:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-28T13:58:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Naima\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Naima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\"},\"author\":{\"name\":\"Naima\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895\"},\"headline\":\"Security issues: how ITSM can reduce cyber threats\",\"datePublished\":\"2024-10-10T08:00:25+00:00\",\"dateModified\":\"2025-03-28T13:58:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\"},\"wordCount\":1139,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\",\"name\":\"ITSM Security Management: Addressing Security Issues in ITSM\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg\",\"datePublished\":\"2024-10-10T08:00:25+00:00\",\"dateModified\":\"2025-03-28T13:58:09+00:00\",\"description\":\"Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security issues: how ITSM can reduce cyber threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895\",\"name\":\"Naima\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g\",\"caption\":\"Naima\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ITSM Security Management: Addressing Security Issues in ITSM","description":"Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/","og_locale":"en_US","og_type":"article","og_title":"Security issues: how ITSM can reduce cyber threats | Better support, happy customers | TOPdesk","og_description":"Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively.","og_url":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2024-10-10T08:00:25+00:00","article_modified_time":"2025-03-28T13:58:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg","type":"image\/jpeg"}],"author":"Naima","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Naima","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/"},"author":{"name":"Naima","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895"},"headline":"Security issues: how ITSM can reduce cyber threats","datePublished":"2024-10-10T08:00:25+00:00","dateModified":"2025-03-28T13:58:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/"},"wordCount":1139,"publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/","url":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/","name":"ITSM Security Management: Addressing Security Issues in ITSM","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg","datePublished":"2024-10-10T08:00:25+00:00","dateModified":"2025-03-28T13:58:09+00:00","description":"Discover essential strategies to enhance ITSM security management in our latest blog post. Stay informed and protect your organization effectively.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#primaryimage","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/blog-8.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/en\/blog\/security-issues-itsm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security issues: how ITSM can reduce cyber threats"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/en\/#website","url":"https:\/\/www.topdesk.com\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895","name":"Naima","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g","caption":"Naima"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/29973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/users\/370"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/comments?post=29973"}],"version-history":[{"count":10,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/29973\/revisions"}],"predecessor-version":[{"id":41550,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/29973\/revisions\/41550"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/person\/37263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media\/31266"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media?parent=29973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}