{"id":616074,"date":"2024-02-28T00:00:00","date_gmt":"2024-02-28T00:00:00","guid":{"rendered":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/"},"modified":"2024-02-28T00:00:00","modified_gmt":"2024-02-28T00:00:00","slug":"in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies","status":"publish","type":"hardhat","link":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/","title":{"rendered":"In the wake of several large-scale cyber attacks, what's stopping Egypt\u2019s business sector from adopting cybersecurity policies?"},"content":{"rendered":"<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"> <strong>Egypt under (cyber) attack:<\/strong> In recent years, Egypt\u2019s public and private sectors havewitnessed a considerable increase in high-profile cyber attacks, from claims that hackers have obtained and sold online the <a target=\"_blank\" href=\"https:\/\/cybernews.com\/news\/whatsapp-data-leak\/\" style=\"\" rel=\"noopener\">WhatsApp numbers of 45 mn Egyptians<\/a> to unconfirmed reports alleging that <a target=\"_blank\" href=\"https:\/\/enterprise.news\/egypt\/en\/news\/story\/64121833-7675-4fb0-b223-e5da836c416e\" style=\"\" rel=\"noopener\">two Egyptian blue chip companies<\/a> were hacked by LockBit \u2014 the world\u2019s most successful ransomware gang at the time \u2014 compromising personal and financial data. The attacks suggest that cybercriminals have turned their sights on Egypt and other emerging markets, banking on companies here taking a less-sophisticated approach to cybersecurity and having a less than efficient cybersecurity infrastructure. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>** Enterprise <\/strong><strong><a target=\"_blank\" href=\"https:\/\/enterprise.news\/egypt\/en\/news\/story\/a4457b19-b82f-4016-9455-edd61d94f112\" style=\"\" rel=\"noopener\">sat down with Fawry CEO Ashraf Sabry<\/a><\/strong>to discuss the nitty gritty of what happened when the company was hacked and the steps they\u2019re taking to prevent this from happening again.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Cybercrime is a global issue, but one that is especially prevalent in the Middle East:<\/strong>Global data breaches increased 20% y-o-y in 2023, writes the <a target=\"_blank\" href=\"https:\/\/hbr.org\/2024\/02\/why-data-breaches-spiked-in-2023#:~:text=Understandably%2C%20companies%20put%20more%20and,data%20stored%20in%20the%20cloud.\" style=\"\" rel=\"noopener\">Harvard Business Review<\/a>, with ransomware gang activity in the Middle East surging a whopping 77%. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Egypt\u2019s business environment makes it vulnerable:<\/strong> In the past year, more than 50% ofglobal cyber attacks have been carried out on SMEs, vice chair of ins. brokerage Medmark Ins. Brokerage\u2019 Walid Auf said during a BEBA cybersecurity-focused breakfast meeting attended by Enterprise. SMEs account for over 90% of all enterprises active in Egypt, according to figures collected by <a target=\"_blank\" href=\"https:\/\/www.business.hsbc.com.eg\/en-gb\/insights\/growing-my-business\/hsbc-is-committed-to-support-smes-in-egypt#:~:text=Egypt%20is%20home%20to%20as,Economic%20Co%2Doperation%20and%20Development.\" style=\"\" rel=\"noopener\">HSBC<\/a>. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>To add fuel to the fire: <\/strong>Historically, banks and telecom firms have been the mainstay clients of cybersecurity solution providers, yet the landscape has changed over the past few years. \u201cCovid shifted a lot of businesses online, exposing them to various threats that they previously were not exposed to. Egypt saw the emergence of a number of fintech startups that build their services and customer offerings around cloud technologies,\u201d cybersecurity consultancy <a target=\"_blank\" href=\"https:\/\/liquidc2.com\/\" style=\"\" rel=\"noopener\">Liquid C2\u2019s<\/a> Regional Manager Sherif Shaltout told Enterprise. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>High cost makes cybersecurity services a little inaccessible: <\/strong>Outsourced cybersecurityservices in some areas across the globe start at <a target=\"_blank\" href=\"https:\/\/www.vc3.com\/blog\/managed-cyber-security-services-cost\" style=\"\" rel=\"noopener\">USD 2k-3.5k a month<\/a> and can increase depending on the size of the business and how many users or clients it has. \u201cMany companies are trying to bring that cost down, but the fact is that there are very few cybersecurity experts compared to the demand, which tends to keep the price of the services on the higher end,\u201d Shaltout told us. \u201cGiven that [cybersecurity investments] are not revenue-generating spending, but more of an ins. policy, it\u2019s also not always easy to explain the return on investment, especially for smaller companies looking to grow.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>It shouldn\u2019t be a barrier to access: <\/strong>Services and prices can be tailored to the customer,Shaltout said. \u201cWe can have contracts as low as USD 5k, all the way to multi-mn USD agreements, depending on the customer\u2019s requirements and size. We are trying to democratize <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\">access to cybersecurity by offering a lot to customers and leveraging technology and cloud services to make it accessible.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Firms have the responsibility of protecting their customers: <\/strong>Firms that fail to implementpolicies to secure their networks and customers' data will face considerable damage to their reputations in the event that an attack does take place. \u201cWe now have more startups, more e-wallets, more online banking and shopping, meaning that the life of our customers is online. It also means that network providers, like Vodafone, have a liability towards their customers,\u201d Vodafone Egypt\u2019s Head of Cybersecurity Samah Khamis told BEBA. <\/p>\n<p class=\"tag-border-left\">ON THE REGULATORY FRONT-<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Cybersecurity regulation, legislation is nascent: <\/strong>In the past decade, Egypt has begun todevelop its cybersecurity strategy, establishing the Supreme Cybersecurity Council, passing personal data protection and anti-cybercrime laws, and creating the Egyptian Computer Emergency Readiness Team, which has cooperation agreements with the US, South Korea, and Malaysia and is a member of the Organisation of Islamic Cooperation Computer Emergency Response Team. Yet, while there is relative regulatory maturity in Egyptian banks, financial institutions and telecommunication firms have a lot further to go, thinks Shaltout.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Basic regulation will help push more firms on the cyber-bandwagon:<\/strong> \u201cWhat Egypt lacks issome form of a national security baseline, an essential eight or ten controls that every company needs to have as a minimum. It doesn\u2019t need to be super complex or advanced,\u201d Shaltout told us. In the future, Egypt could consider the addition of cybersecurity accreditation, with hierarchical levels granting companies the right to do business with certain sectors. \u201cIt could create a pathway for companies to enter particular markets and grow their operations,\u201d Shaltout said. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Slowly, slowly: <\/strong>Creating a set of localized cybersecurity standards that consider the level of technical competencies in Egypt and the specific risks facing the country will ensure that smaller firms have a guide to implement effective strategies. Regulators must be mindful that cybersecurity is a costly journey with many firms in Egypt starting from scratch under a tough economic situation where the threat of fines will lead non-compliant companies, Shaltout said. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>It\u2019s a different story for data-heavy organizations: <\/strong>Heftier regulations are needed forcompanies or organizations with access to certain sets of customer data \u2014 such as healthcare entities \u2014 or at a certain level in terms of revenue and market capitalization, added Shaltout.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The world needs more cyber professionals: <\/strong>The global shortage of cybersecurity experts hashit Egypt, where the current economic circumstances have created brain drain as young graduates look for work in the Gulf, Europe, or US. The National Telecom Regulatory Authority (NTRA) has plans to build two cybersecurity facilities at the Arab Academy for Science, Technology and Maritime Transport in Alamein, NTRA\u2019s vice president for cybersecurity affairs Ahmed Abdel Hafez said at the BEBA conference.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Could Egypt be a cybersecurity export hub? <\/strong>Given its large, young pool of talent equippedwith strong technical skills, Egypt has the potential to become a cybersecurity hub and export its services globally, <a target=\"_blank\" href=\"https:\/\/www.mazars.com.eg\/\" style=\"\" rel=\"noopener\">Mazars<\/a> partner Omar Shawki said at the BEBA breakfast. <\/p>\n<hr style=\"height:2px;border-width:0;color:gray;background-color:gray\">\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Your top infrastructure stories for the week:<\/strong><\/p>\n<ul>\n<li><strong>New Cairo will soon be home to a new EGP 60 bn development:<\/strong> UDC Real Estate Development will build an <a target=\"_blank\" href=\"https:\/\/enterprise.news\/egypt\/en\/news\/story\/ccbf8a05-3c13-409b-a48c-5289edccee55\" style=\"\" rel=\"noopener\">EGP 60 bn mixed-use development<\/a> in New Cairo\u2019s Al Andalus, spanning 665k sqm with residential, administrative, entertainment, commercial, and hospitality units. <\/li>\n<li><strong>A USD 300 mn medical-educational complex is being built in Shorouk:<\/strong> The New Urban Communities Authority has awarded NHMC Egypt a plot of land in Shorouk City to set up a <a target=\"_blank\" href=\"https:\/\/enterprise.news\/egypt\/en\/news\/story\/ccbf8a05-3c13-409b-a48c-5289edccee55\" style=\"\" rel=\"noopener\">USD 300 mn medical and educational complex<\/a> alongside a residential and commercial project.<\/li>\n<li><strong>Telecom Egypt and Chinese tech giant Huawei have announced a strategic partnership <\/strong>for the <a target=\"_blank\" href=\"https:\/\/enterprise.news\/egypt\/en\/news\/story\/a5746aea-05d4-4906-892b-34839fb3d90a\" style=\"\" rel=\"noopener\">deployment of 5G networks<\/a> in Egypt. <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Global data breaches increased 20% y-o-y in 2023<\/p>\n","protected":false},"featured_media":616075,"menu_order":0,"template":"","categories":[7235],"tags":[377,269,72,519,7116],"class_list":["post-616074","hardhat","type-hardhat","status-publish","has-post-thumbnail","hentry","category-hardhat","tag-cybersecurity","tag-enterprise-hardhat","tag-enterpriseam","tag-fawry","tag-hardhat","wpautop","entry"],"acf":{"mongo_id":"7f941cc9-1de6-42b8-8426-98e960f6e953","is_powered_by":false,"story_type":"2","photo_url":"https:\/\/ent.news\/2024\/2\/2699.jpg","photo_position":"above","homepage_title":"","full_issue_title":"In the wake of several large-scale cyber attacks, what's stopping Egypt\u2019s business sector from adopting cybersecurity policies?","related_issue":[616052],"teaser":"Global data breaches increased 20% y-o-y in 2023","voice_url":"https:\/\/s3.us-east-1.amazonaws.com\/ent.news\/audio\/2024\/3\/.da06347f-0404-47f6-bce0-a3948aaa5901.mp3"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>In the wake of several large-scale cyber attacks, what&#039;s stopping Egypt\u2019s business sector from adopting cybersecurity policies? - EnterpriseAM Egypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In the wake of several large-scale cyber attacks, what&#039;s stopping Egypt\u2019s business sector from adopting cybersecurity policies?\" \/>\n<meta property=\"og:description\" content=\"Global data breaches increased 20% y-o-y in 2023\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"EnterpriseAM Egypt\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/\",\"name\":\"In the wake of several large-scale cyber attacks, what's stopping Egypt\u2019s business sector from adopting cybersecurity policies? - EnterpriseAM Egypt\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1\",\"datePublished\":\"2024-02-28T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enterpriseam.com\/egypt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardhat\",\"item\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"In the wake of several large-scale cyber attacks, what&#8217;s stopping Egypt\u2019s business sector from adopting cybersecurity policies?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"name\":\"EnterpriseAM\",\"description\":\"The State of the Nation\",\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\",\"name\":\"EnterpriseAM\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ent.news\/internal\/240894.svg\",\"contentUrl\":\"https:\/\/ent.news\/internal\/240894.svg\",\"caption\":\"EnterpriseAM\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"In the wake of several large-scale cyber attacks, what's stopping Egypt\u2019s business sector from adopting cybersecurity policies? - EnterpriseAM Egypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/","og_locale":"en_US","og_type":"article","og_title":"In the wake of several large-scale cyber attacks, what's stopping Egypt\u2019s business sector from adopting cybersecurity policies?","og_description":"Global data breaches increased 20% y-o-y in 2023","og_url":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/","og_site_name":"EnterpriseAM Egypt","og_image":[{"url":"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/","url":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/","name":"In the wake of several large-scale cyber attacks, what's stopping Egypt\u2019s business sector from adopting cybersecurity policies? - EnterpriseAM Egypt","isPartOf":{"@id":"https:\/\/enterpriseam.com\/egypt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#primaryimage"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1","datePublished":"2024-02-28T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#primaryimage","url":"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ent.news\/2024\/2\/2699.jpg?fit=%2C&ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/in-the-wake-of-several-large-scale-cyber-attacks-whats-stopping-egypts-business-sector-from-adopting-cybersecurity-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enterpriseam.com\/egypt\/"},{"@type":"ListItem","position":2,"name":"Hardhat","item":"https:\/\/enterpriseam.com\/egypt\/hardhats\/"},{"@type":"ListItem","position":3,"name":"In the wake of several large-scale cyber attacks, what&#8217;s stopping Egypt\u2019s business sector from adopting cybersecurity policies?"}]},{"@type":"WebSite","@id":"https:\/\/enterpriseam.com\/egypt\/#website","url":"https:\/\/enterpriseam.com\/egypt\/","name":"EnterpriseAM","description":"The State of the Nation","publisher":{"@id":"https:\/\/enterpriseam.com\/egypt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enterpriseam.com\/egypt\/#organization","name":"EnterpriseAM","url":"https:\/\/enterpriseam.com\/egypt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/","url":"https:\/\/ent.news\/internal\/240894.svg","contentUrl":"https:\/\/ent.news\/internal\/240894.svg","caption":"EnterpriseAM"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat\/616074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat"}],"about":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/types\/hardhat"}],"version-history":[{"count":0,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat\/616074\/revisions"}],"acf:post":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/issue\/616052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media\/616075"}],"wp:attachment":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media?parent=616074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/categories?post=616074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/tags?post=616074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}