{"version":"https://jsonfeed.org/version/1","title":"Surient","home_page_url":"https://surient.com","description":"Surient","author":{"name":"Surient"},"items":[{"id":"why-hire-a-hacker","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/e8K1lBo\"/><p>For many business leaders, the word hacker still carries a negative connotation. It brings to mind criminal activity, breaches, and damage control. At Surient, we use the term to denote a positive approach to information...</p>","url":"https://surient.com/viewpoints/f/why-hire-a-hacker","title":"Why Hire a Hacker?","date_modified":"2025-12-21T22:10:47Z"},{"id":"what-to-expect-from-a-vulnerability-assessment","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/6210\"/><p>A Practical Guide to Scope, Steps, and Timeline</p>","url":"https://surient.com/viewpoints/f/what-to-expect-from-a-vulnerability-assessment","title":"What to Expect From a Vulnerability Assessment","date_modified":"2025-12-17T16:12:07Z"},{"id":"surient-security-briefing-2025","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/0cab9e87-a8c0-45a0-ab3b-bfae064ed6f0/Infographic%20for%20blog%20121025.png\"/><p>The Global Cyber Threat Landscape for Small and Mid-Sized Businesses (SMBs)</p>","url":"https://surient.com/viewpoints/f/surient-security-briefing-2025","title":"Surient Security Briefing 2025","date_modified":"2025-12-10T19:59:03Z"},{"id":"wondering-about-your-cyber-insurance-premiums","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/0cab9e87-a8c0-45a0-ab3b-bfae064ed6f0/Reducing%20Cyber%20Insurance%20Costs%20with%20Surient.png\"/><p>Cyber-insurance premiums have climbed sharply in recent years as carriers face higher claim volumes, more sophisticated attacks, and mounting regulatory exposure. For many small and mid-sized businesses, cyber insurance ...</p>","url":"https://surient.com/viewpoints/f/wondering-about-your-cyber-insurance-premiums","title":"Wondering about your Cyber Insurance Premiums?","date_modified":"2025-12-08T15:45:32Z"},{"id":"a-cybersecurity-wake-up-call-for-smbs","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/5104\"/><p>For years, small and mid-sized businesses (SMBs) assumed that sophisticated cyberattacks were a “big company problem.” That belief ended in 2024, when global threat groups shifted their attention to the organizations lea...</p>","url":"https://surient.com/viewpoints/f/a-cybersecurity-wake-up-call-for-smbs","title":"A Cybersecurity Wake-Up Call for SMBs","date_modified":"2025-12-07T17:05:18Z"},{"id":"cybersecurity-in-2025-essential-steps-for-smbs-to-stay-secure","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/0cab9e87-a8c0-45a0-ab3b-bfae064ed6f0/logo/Studio-Project%20Surient%20Logo.png\"/><p>Cybersecurity in 2025: Essential Steps for SMBs to Stay Secure</p>","url":"https://surient.com/viewpoints/f/cybersecurity-in-2025-essential-steps-for-smbs-to-stay-secure","title":"Cybersecurity in 2025: Essential Steps for SMBs to Stay Secure","date_modified":"2025-06-06T13:23:12Z"},{"id":"what-is-multi-factor-authentication","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/101015\"/><p>Multi-factor authentication (MFA) is a security process that requires users to provide two or more verification factors to access a system, account, or device. It adds layers of protection beyond a single password, makin...</p>","url":"https://surient.com/viewpoints/f/what-is-multi-factor-authentication","title":" Surient Security Recommends Multi-factor Authentication","date_modified":"2025-06-05T12:07:53Z"},{"id":"5-security-gaps-small-or-medium-sized-business-smbs-have","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/9V0pxwr\"/><p>5 Security Gaps Every SMB Has</p>","url":"https://surient.com/viewpoints/f/5-security-gaps-small-or-medium-sized-business-smbs-have","title":"5 Security Gaps Small or Medium Sized Business (SMBs) Have","date_modified":"2025-06-05T00:34:48Z"}]}