{"id":27266,"date":"2024-06-26T08:45:01","date_gmt":"2024-06-26T13:45:01","guid":{"rendered":"https:\/\/www.aae.org\/specialty\/?p=27266"},"modified":"2024-06-21T14:11:00","modified_gmt":"2024-06-21T19:11:00","slug":"implementing-your-cyber-protection-game-plan","status":"publish","type":"post","link":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/","title":{"rendered":"Implementing your Cyber Protection Game Plan"},"content":{"rendered":"<p><em><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-23272 size-medium\" src=\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650-300x115.jpg\" alt=\"\" width=\"300\" height=\"115\" srcset=\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650-300x115.jpg 300w, https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650-150x58.jpg 150w, https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg 650w, https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650-300x115@2x.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>By Joseph Hood<\/em><\/p>\n<p>In a <a href=\"https:\/\/www.aae.org\/specialty\/what-is-your-cyber-protection-game-plan\/\" target=\"_blank\" rel=\"noopener\">recent article<\/a>, we discussed strategies that would help you to create a Cyber Protection Game Plan that would put you in the position to win the fight against cyber criminals.\u00a0 We explored how a successful cyber game plan must be like a championship NFL team having both a strong offense as well as a strong defense.\u00a0 Now, let\u2019s explore some strategies to<em> successfully<\/em> <em>implement<\/em> a cyber game plan!<\/p>\n<h3>Build a Strong Team.<\/h3>\n<p>The number one responsibility of any coach or business leader is to recruit great talent, while at the same time, coaching existing members to help them realize their full potential.\u00a0 Without this focus, you may never fully execute your game plan.\u00a0 This applies to the supporting members of your organization and not only to the players who take to the field.\u00a0 In terms of cybersecurity, ALL members of your organization are competing against cyber criminals.\u00a0 Do not limit cybersecurity awareness training to only those team members who are on a computer all day.\u00a0 An employee who only goes online once a week to place a supply order could fall victim to a phishing email that leads to a ransomware attack.\u00a0 <strong><u>All<\/u> members must be trained effectively and on a regular frequency.<\/strong><\/p>\n<p>You would likely find that Championship NFL teams rely on outside organizations to the highest level of expertise in their field, such as equipment manufacturers, security providers, etc..\u00a0 For example, the NFL partners with local law enforcement and federal agencies to implement security plans for facility security, event day safety and traffic management.\u00a0 They choose the right partner for each security need.\u00a0 The same must be true for your endodontic practice.\u00a0 The right IT resources will provide the network support required for great performance while the right cybersecurity firm will provide a higher level of expertise to provide cybersecurity protection and readiness to respond to a potential cyber incident.\u00a0\u00a0 <strong><em>Choose the right IT resources <u>and<\/u> a dedicated cybersecurity firm to support and protect your network.<\/em><\/strong><\/p>\n<h3>Understand Your Strengths and Weaknesses.<\/h3>\n<p>Where one team may have a world class defense, another team\u2019s quarterback may be the greatest of all time.\u00a0 Championship teams understand both their strengths and weaknesses and implement game plans that with them in mind.\u00a0 Your endodontic practice should do the same.\u00a0 From a personnel perspective, one strength many practices have is a particularly cyber-savvy team member.\u00a0 You may want to empower that person to share what they learn with other team members.\u00a0 Regarding weaknesses, every practice has software and hardware-based security vulnerabilities that go undetected because vulnerability scanning is typically only conducted by dedicated cybersecurity firms.\u00a0 Implementing real time security vulnerability management software and remediation is very cost effective and critical for removing exploitable vulnerabilities.\u00a0 You should have a simple way to understand the level of critical and overall vulnerabilities that exist on your network.\u00a0 These are the \u201cunlocked doors and windows\u201d a hacker uses to gain access to your data.\u00a0 <strong><em>Choose a cybersecurity partner that can provide a cyber dashboard that does NOT require you to become a cybersecurity expert.<\/em><\/strong><\/p>\n<h3>Understand the Playing Field and Conditions.<\/h3>\n<p>Championship level coaches and players have a deep understanding of the playing field and conditions and how they relate to various game situations.\u00a0 What is the down and distance?\u00a0 Are we kicking into the wind or against the wind?\u00a0\u00a0 The playing field in the cybersecurity world is referred to as the attack surface.\u00a0 The attack surface includes any possible entry point for a hacker to gain unauthorized access to your network in order to encrypt and\/or steal data.\u00a0 The attack surface can be physical, digital or even social.\u00a0 For example, allowing a marketing firm to integrate with your practice management software grants them access to patient data which will probably be exported and saved outside of your own network.\u00a0 With proper security measures in place, this is an acceptable risk for many endodontic practices.\u00a0 Many endodontic practice owners are not even aware this is happening.\u00a0 <strong><em>A dedicated cybersecurity firm can help you to fully understand your attack surface, which is step one in implementing your cyber game plan.<\/em><\/strong><\/p>\n<h3>Practice your Game Plan.<\/h3>\n<p>In the days leading up to game day, championship teams practice and drill based on the game plan.\u00a0 They watch game film, they study playbooks, etc.\u00a0 Game day scenarios are simulated over and over so that on game day, they have already been in every scenario that can be imagined.\u00a0 While cybersecurity awareness training provides the understanding of how to protect your data, implementing tabletop exercises puts a team through the \u201cgame day\u201d scenarios to practice responding to real world emergencies.\u00a0 Formal tabletop exercises are generally interactive meetings conducted by C Suite members of larger organizations.\u00a0 You can implement smaller focused versions of a tabletop exercise at your endodontic practice that can be just as effective.\u00a0 <strong><em>During morning huddles, you can coach your team through real world scenarios to see how they would respond to ensure they will perform effectively when an emergency does occur.<\/em><\/strong><\/p>\n<h3>Taking the Field on Game Day.<\/h3>\n<p>NFL teams take the field on Sundays.\u00a0 Each season, teams get a \u2018bye week\u2019 when they do not compete.\u00a0 The season ends and each team has the off season to regroup and prepare for the next season.\u00a0 Your endodontic practice does not get to enjoy that type of down time like an NFL team gets to enjoy.\u00a0 For you and your team, <strong>every day is game day<\/strong>.\u00a0 A winning mindset is key to implementing your cyber game plan.\u00a0 Coach Bill Belichick coined the phrase, \u201cDO YOUR JOB\u201d during his tenure coaching a dynasty at the New England Patriots (I could not resist referencing my home team).\u00a0 The spirit of this phrase is that if each person takes care of their responsibility, the team will move forward and implement the game plan successfully.\u00a0 The least technical person on your team still needs to log off of the clinical computer if they leave the treatment room with a patient in the chair.\u00a0 Your business manager needs to monitor the cybersecurity awareness training status of each employee to ensure all are properly trained.\u00a0 Your IT resources need to be held accountable to ensure that all software and operating system updates are installed in a timely manner.\u00a0 As the leader of your endodontic practice, you must set the tone to ensure that each member of your team understands and is accountable to have personal responsibility around cybersecurity. \u00a0\u00a0<strong><em>Empowering and inspiring each team member to DO THEIR JOB to the highest level will create a winning mindset that is infectious.<\/em><\/strong><\/p>\n<h3>Adapt and Adjust Your Game Plan as Needed.<\/h3>\n<p>If you pay attention, you will almost always hear NFL analysts comment on adjustments that teams make during games to accommodate their opponent\u2019s strategy.\u00a0 If the defensive scheme is not preventing the opponent from marching down the field, a new scheme must be developed. If a starting quarterback gets injured in the opening minutes of a game, a more running based offensive plan may need to be implemented.\u00a0 Nothing is static and feedback must be considered.\u00a0 The same is true with cybersecurity at your practice.<\/p>\n<p>Cyberattack methodologies change, fully trained team members leave.\u00a0 You may just now be realizing you have no cyber game plan.\u00a0 Change is the only constant and that is okay.\u00a0 You need to make sure that you go forward with success in mind and have a determined mindset to implement a well-crafted cyber game plan that is able to defend against modern day cyber threats.\u00a0 What worked yesterday likely will not work today.<\/p>\n<p>To keep your endodontic practice protected against a cyberattack, you must be able to VERIFY your cyber risk level and how well your cyber game plan is working.\u00a0 A well-crafted cyber game plan should allow you to do this without having to wait for feedback from others.\u00a0 And, what is important to remember, this does not require you to become a cybersecurity expert.<\/p>\n<p>As you go forward and adjust your cyber game plan, ensure you have an IT resource that will provide excellent network support and choose a dedicated cybersecurity partner that provides you with the means to VERIFY the following on your own without even having to contact them:<\/p>\n<ul>\n<li>Cybersecurity awareness training status and performance of all employees<\/li>\n<li>Simulated phishing performance of all employees<\/li>\n<li>Level of security vulnerabilities on your network and the trend of these vulnerabilities (are they increasing or decreasing)?<\/li>\n<li>Vulnerability remediation performance (are your IT resources fixing these issues)?<\/li>\n<li>Effectiveness of your firewall to withstand a cyberattack<\/li>\n<\/ul>\n<p>Starting with a successful mindset and aligning your endodontic practice with team members and a dedicated cybersecurity partner can help you to implement a championship cyber protection game plan.\u00a0 Take steps NOW to avoid being the next victim of a cyberattack at your practice.<\/p>\n<p><em>Joseph Hood is Senior Cybersecurity Specialist with Black Talon Security.\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Joseph Hood In a recent article, we discussed strategies that would help you to create a Cyber Protection Game Plan that would put you in the position to win&hellip;<\/p>\n","protected":false},"author":12,"featured_media":23272,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[158],"tags":[],"feature":[236],"class_list":["post-27266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-practice-management","feature-paperpoint"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implementing your Cyber Protection Game Plan - American Association of Endodontists<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing your Cyber Protection Game Plan - American Association of Endodontists\" \/>\n<meta property=\"og:description\" content=\"By Joseph Hood In a recent article, we discussed strategies that would help you to create a Cyber Protection Game Plan that would put you in the position to win&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"American Association of Endodontists\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/endodontists\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-26T13:45:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Elisabeth Lisican\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@savingyourteeth\" \/>\n<meta name=\"twitter:site\" content=\"@savingyourteeth\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elisabeth Lisican\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\"},\"author\":{\"name\":\"Elisabeth Lisican\",\"@id\":\"https:\/\/www.aae.org\/specialty\/#\/schema\/person\/db2d09ae5a4e55e3f493d0bdb744a5fa\"},\"headline\":\"Implementing your Cyber Protection Game Plan\",\"datePublished\":\"2024-06-26T13:45:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\"},\"wordCount\":1486,\"publisher\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg\",\"articleSection\":[\"Practice Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\",\"url\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\",\"name\":\"Implementing your Cyber Protection Game Plan - American Association of Endodontists\",\"isPartOf\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg\",\"datePublished\":\"2024-06-26T13:45:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage\",\"url\":\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg\",\"contentUrl\":\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg\",\"width\":650,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aae.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Specialty\",\"item\":\"https:\/\/www.aae.org\/specialty\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Implementing your Cyber Protection Game Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aae.org\/specialty\/#website\",\"url\":\"https:\/\/www.aae.org\/specialty\/\",\"name\":\"American Association of Endodontists\",\"description\":\"Shaping the Future of Endodontic\",\"publisher\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aae.org\/specialty\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aae.org\/specialty\/#organization\",\"name\":\"American Association of Endodontists\",\"url\":\"https:\/\/www.aae.org\/specialty\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aae.org\/specialty\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2017\/04\/aae_share_specialty.jpg\",\"contentUrl\":\"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2017\/04\/aae_share_specialty.jpg\",\"width\":1200,\"height\":628,\"caption\":\"American Association of Endodontists\"},\"image\":{\"@id\":\"https:\/\/www.aae.org\/specialty\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/endodontists\",\"https:\/\/x.com\/savingyourteeth\",\"https:\/\/www.linkedin.com\/company\/american-association-of-endodontists\",\"http:\/\/www.youtube.com\/rootcanalspecialists\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aae.org\/specialty\/#\/schema\/person\/db2d09ae5a4e55e3f493d0bdb744a5fa\",\"name\":\"Elisabeth Lisican\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aae.org\/specialty\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cdc994f7f54ddf5ed09a1ff3c00eae24d430edb72075ecf3f460d82ce40f4f3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cdc994f7f54ddf5ed09a1ff3c00eae24d430edb72075ecf3f460d82ce40f4f3f?s=96&d=mm&r=g\",\"caption\":\"Elisabeth Lisican\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementing your Cyber Protection Game Plan - American Association of Endodontists","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/","og_locale":"en_US","og_type":"article","og_title":"Implementing your Cyber Protection Game Plan - American Association of Endodontists","og_description":"By Joseph Hood In a recent article, we discussed strategies that would help you to create a Cyber Protection Game Plan that would put you in the position to win&hellip;","og_url":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/","og_site_name":"American Association of Endodontists","article_publisher":"https:\/\/www.facebook.com\/endodontists","article_published_time":"2024-06-26T13:45:01+00:00","og_image":[{"width":650,"height":250,"url":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg","type":"image\/jpeg"}],"author":"Elisabeth Lisican","twitter_card":"summary_large_image","twitter_creator":"@savingyourteeth","twitter_site":"@savingyourteeth","twitter_misc":{"Written by":"Elisabeth Lisican","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#article","isPartOf":{"@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/"},"author":{"name":"Elisabeth Lisican","@id":"https:\/\/www.aae.org\/specialty\/#\/schema\/person\/db2d09ae5a4e55e3f493d0bdb744a5fa"},"headline":"Implementing your Cyber Protection Game Plan","datePublished":"2024-06-26T13:45:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/"},"wordCount":1486,"publisher":{"@id":"https:\/\/www.aae.org\/specialty\/#organization"},"image":{"@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg","articleSection":["Practice Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/","url":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/","name":"Implementing your Cyber Protection Game Plan - American Association of Endodontists","isPartOf":{"@id":"https:\/\/www.aae.org\/specialty\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage"},"image":{"@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg","datePublished":"2024-06-26T13:45:01+00:00","breadcrumb":{"@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#primaryimage","url":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg","contentUrl":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2023\/02\/FebFeatureStoryIllustration-650.jpg","width":650,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.aae.org\/specialty\/implementing-your-cyber-protection-game-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aae.org\/"},{"@type":"ListItem","position":2,"name":"Specialty","item":"https:\/\/www.aae.org\/specialty\/"},{"@type":"ListItem","position":3,"name":"Implementing your Cyber Protection Game Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.aae.org\/specialty\/#website","url":"https:\/\/www.aae.org\/specialty\/","name":"American Association of Endodontists","description":"Shaping the Future of Endodontic","publisher":{"@id":"https:\/\/www.aae.org\/specialty\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aae.org\/specialty\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aae.org\/specialty\/#organization","name":"American Association of Endodontists","url":"https:\/\/www.aae.org\/specialty\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aae.org\/specialty\/#\/schema\/logo\/image\/","url":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2017\/04\/aae_share_specialty.jpg","contentUrl":"https:\/\/www.aae.org\/specialty\/wp-content\/uploads\/sites\/2\/2017\/04\/aae_share_specialty.jpg","width":1200,"height":628,"caption":"American Association of Endodontists"},"image":{"@id":"https:\/\/www.aae.org\/specialty\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/endodontists","https:\/\/x.com\/savingyourteeth","https:\/\/www.linkedin.com\/company\/american-association-of-endodontists","http:\/\/www.youtube.com\/rootcanalspecialists"]},{"@type":"Person","@id":"https:\/\/www.aae.org\/specialty\/#\/schema\/person\/db2d09ae5a4e55e3f493d0bdb744a5fa","name":"Elisabeth Lisican","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aae.org\/specialty\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cdc994f7f54ddf5ed09a1ff3c00eae24d430edb72075ecf3f460d82ce40f4f3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cdc994f7f54ddf5ed09a1ff3c00eae24d430edb72075ecf3f460d82ce40f4f3f?s=96&d=mm&r=g","caption":"Elisabeth Lisican"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/posts\/27266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/comments?post=27266"}],"version-history":[{"count":0,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/posts\/27266\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/media\/23272"}],"wp:attachment":[{"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/media?parent=27266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/categories?post=27266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/tags?post=27266"},{"taxonomy":"feature","embeddable":true,"href":"https:\/\/www.aae.org\/specialty\/wp-json\/wp\/v2\/feature?post=27266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}