{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.the-future-of-commerce.com\/tag\/phishing\/#CollectionPage","headline":"Phishing Tag","description":"","url":"https:\/\/www.the-future-of-commerce.com\/tag\/phishing\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2021\/05\/05\/data-breach-examples-definition-costs-consequences\/","headline":"What is a data breach: definition, examples, consequences, costs","url":"https:\/\/www.the-future-of-commerce.com\/2021\/05\/05\/data-breach-examples-definition-costs-consequences\/","datePublished":"2021-05-05","dateModified":"2024-07-17","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2021\/05\/05\/data-breach-examples-definition-costs-consequences\/","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/amanda-magee\/#Person","name":"Amanda Magee","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/amanda-magee\/","identifier":383,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/31d192a92932f8061f51a1ebc0f27663f339079b63a5df3c859f0410e97e8775?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/31d192a92932f8061f51a1ebc0f27663f339079b63a5df3c859f0410e97e8775?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Commerce","logo":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","width":172,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2021\/05\/DataBreach_1200x375.jpg","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2021\/05\/DataBreach_1200x375.jpg","height":375,"width":1200},"keywords":["Brand Management","CDP | Customer Data Platform","CIAM | Customer Identity and Access Management","Consent Data Management","Customer Profile Management","Data Breach","Data Privacy","Data Security","GDPR","Malware","Phishing"]},{"@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2019\/04\/22\/data-security-future-of-cx\/","headline":"Why data security is critical to the future of CX","url":"https:\/\/www.the-future-of-commerce.com\/2019\/04\/22\/data-security-future-of-cx\/","datePublished":"2019-04-22","dateModified":"2021-12-28","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2019\/04\/22\/data-security-future-of-cx\/","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/saj-hoffman-hussain\/#Person","name":"Saj Hoffman-Hussain","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/saj-hoffman-hussain\/","identifier":269,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a970e648bf4902a5d709c8fbd3cf1b5bdb910d7904381d445dcf2e3a7a36d029?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a970e648bf4902a5d709c8fbd3cf1b5bdb910d7904381d445dcf2e3a7a36d029?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Commerce","logo":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","width":172,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2019\/04\/thumbnail-937c351a0c8a84043a707c5a13148eae.jpeg","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2019\/04\/thumbnail-937c351a0c8a84043a707c5a13148eae.jpeg","height":375,"width":1200},"keywords":["Cybersecurity","Data Breach","Malware","Phishing","Public Sector"]},{"@type":"BlogPosting","@id":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","headline":"Malware attacks: Ransomware infection at the weakest point","url":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","datePublished":"2016-05-04","dateModified":"2021-12-28","mainEntityOfPage":"https:\/\/www.the-future-of-commerce.com\/2016\/05\/04\/malware-attacks-security-preparedness\/","author":{"@type":"Person","@id":"https:\/\/www.the-future-of-commerce.com\/contributor\/dean-afzal\/#Person","name":"Dean Afzal","url":"https:\/\/www.the-future-of-commerce.com\/contributor\/dean-afzal\/","identifier":96,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/5d49f62f414d1e47fe8e3fbc00be870c1ef013abff0c510cad25a5ea62f153b7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d49f62f414d1e47fe8e3fbc00be870c1ef013abff0c510cad25a5ea62f153b7?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"The Future of Commerce","logo":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2023\/01\/logo-foc-schema-app-1.png","width":172,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2016\/05\/thumbnail-431b76564bfaa2caa0157271432b90bd-1.png","url":"https:\/\/www.the-future-of-commerce.com\/wp-content\/uploads\/2016\/05\/thumbnail-431b76564bfaa2caa0157271432b90bd-1.png","height":370,"width":1200},"keywords":["Cybersecurity","Malware","Phishing"]}],"about":[{"@type":"Thing","@id":"https:\/\/www.the-future-of-commerce.com\/commerce\/","name":"Commerce","sameAs":["https:\/\/en.wikipedia.org\/wiki\/Commerce","http:\/\/www.wikidata.org\/entity\/Q26643"]},{"@type":"Thing","@id":"https:\/\/www.the-future-of-commerce.com\/customer-experience\/customer-data\/","name":"Customer Data","sameAs":["https:\/\/en.wikipedia.org\/wiki\/Customer_data","http:\/\/www.wikidata.org\/entity\/Q56278300"]},{"@type":"Thing","@id":"https:\/\/www.the-future-of-commerce.com\/commerce\/intelligent-enterprise\/","name":"Intelligent Enterprise","sameAs":["https:\/\/en.wikipedia.org\/wiki\/Intelligent_enterprise","http:\/\/www.wikidata.org\/entity\/Q6044119"]}]}