{"id":38791,"date":"2017-05-16T00:00:00","date_gmt":"2017-05-16T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/is-cybersecurity-stifling-your-business-innovation\/"},"modified":"2025-07-01T06:19:58","modified_gmt":"2025-07-01T13:19:58","slug":"is-cybersecurity-stifling-your-business-innovation","status":"publish","type":"post","link":"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/","title":{"rendered":"Is cybersecurity stifling your business innovation?"},"content":{"rendered":"<p>If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines about security breaches\u2014and you probably have an idea of the equally scary financial risks. The latest research shows the average cost to companies rose last year from $154 to $158 for each lost or stolen record containing sensitive and confidential information. In most cases, the costs of legal fees and mitigation rises into the millions. And that doesn\u2019t include the price tag for losing competitive data or damage to the brand from mandatory disclosures.<\/p>\n<p>But do you know how much your defenses against cyberattacks are costing your organization in terms of lost business innovation? In a recent Economist Intelligence Unit (EIU) survey sponsored by VMWare, almost half of C-suite respondents believes that cyber-security measures are hindering critical functions. About the same percentage said these defenses were delaying efforts to bring new products to market and putting the brakes on innovation.<\/p>\n<p>Notably, the majority of executives polled in the same survey also viewed cybersecurity as a huge drain on their management time and attention\u2014not to mention a drain on scarce corporate budgets. On the other hand, less than half of the securities executives expressed the same view.<\/p>\n<p><strong>Anachronistic architecture<\/strong><\/p>\n<p>It\u2019s no wonder management perceives managing cybersecurity as expensive and complicated: because it is. Hackers are constantly innovating and filling their bags with new tricks. IT security leaders have responded to each new threat by bolting on the latest innovations from countless security vendors. The list is endless: web application firewalls, end-point protection, penetration testing, data-loss protection, anomaly detection, and so on. In many organizations, the result is a patchwork of point solutions that don\u2019t work well together.<\/p>\n<p>As IT battles for budget to fight each new threat, and this patchwork of point solutions becomes more and more ungainly, it is no surprise that management sees cybersecurity as stifling innovation. Employees have to deal with sometimes draconian security policies, and IT spends valuable time managing security rather than supporting business innovation.<\/p>\n<p>But IT must also battle management\u2019s underestimation of the threat. For example, in the EIU study, only 12% of respondents felt it was likely that the company would experience a serious cyberattack within the next 90 days, while more than 30% of security professionals expected a\u00a0major and successful attack on the firm in the same period. This major disconnect is somewhat analogous to motorcyclists who are annoyed by laws that mandate their wearing helmets vs. the perspective of ER room staff who see the real consequences of failing to protect against a mishap.<\/p>\n<p><strong>Cybersecurity today<\/strong><strong>\u2014like an Atari game in an Xbox world<\/strong><\/p>\n<p>Former president Obama made news in a 2016 article in <em>The Wall Street Journal<\/em> when he acknowledged the problem of a reactive cyber defense: \u201cGovernment IT is like an Atari game in an Xbox world.\u201d The same applies to enterprise IT and the problem of playing catch-up by bolting on reactive point solutions to counter each new threat. It is simply not an effective solution because the hackers never slow down.<\/p>\n<p>According to the most recent Verizon Data Breach Report, in \u201cthe majority of confirmed data breaches, the modus operandi of nation-states as well as financially motivated attackers is to establish control via malware and, when successful, it is lightning fast. As this figure is for\u00a0confirmed breaches only, it makes sense that the time to compromise is almost\u00a0always days or less (if not minutes or less).\u201d So in essence, a patch or newly deployed point solution may be obsolete by the time it is implemented.<\/p>\n<p>Plus, with workers carrying multiple devices and increasingly connecting to the cloud, the task of risk mitigation continues to grow. <a href=\"https:\/\/www.ringcentral.com\/technology\/security.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">Enterprise security<\/a> professionals must protect a huge attack surface with thousands of potential entry points, which now includes smart phones, internet of things (IoT) devices, and other nontraditional endpoints. Hackers probing for vulnerabilities in this attack surface only have to be right once\u2014and they can succeed in milliseconds. Thus, it becomes almost impossible to protect against things like zero-days and other newly engineered attacks.<\/p>\n<p><strong>Plan and prioritize vs. patch and pray<\/strong><\/p>\n<p>The solution lies in IT professionals educating the C-Suite on the costs\u2014both in terms of stifling innovation and adding management overhead\u2014of a reactive approach to security. Only by executives gaining a more realistic understanding of the risks will they be willing to allocate budget to plan ahead. This will give IT the freedom to prioritize the greatest threats and plan for the purchase and deployment of <a href=\"https:\/\/www.ringcentral.com\/whyringcentral\/company\/pressreleases\/pressreleases-2017\/ringcentral-unveils-next-generation-ringcentral-office-.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">next-generation platforms<\/a> with capabilities such as protecting against the hackers\u2019 next big things.<\/p>\n<p>Compared with old-school approaches\u2014which were built on the assumption that the firewall would comprise the last line of defense\u2014next-generation approaches can offer capabilities to protect against the new risks associated with data moving beyond the network perimeter. Effective planning and prioritization also gives IT a fighting chance of deploying flexible, adaptive solutions vs. asking management to allocate budget for cybersecurity that will be outmoded by the time it is deployed. This will also help to eliminate the significant operational overhead required to manage today\u2019s Rube Goldberg cybersecurity monsters of bolt-on point solutions. Management and IT can, instead, focus precious time and resources on innovation that helps the business achieve a competitive advantage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines about security breaches\u2014and you probably have an idea of the equally scary financial risks. The latest research shows the average cost to companies rose last year from &#8230;<\/p>\n","protected":false},"author":29,"featured_media":38792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[14655,14656,14657,14658,1783,888,14607,14659,658,14571,4786,14660,14661,14662,6185,14663,13544,14664,14665,14666,14667,14668,14669,14670,2392,14672,14673,4368,14674,970,14676,6462,14072,7036,14677,8415,245,14679,4660,1441,14680,14681,14682,1226,14683,14684,14685,14686,14687,14688,14689,14690,1640,14691,6489,14692,14693,14694,14695,14696,4807,14697,2374,14698,14699,14700],"class_list":["post-38791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-anachronistic-architecture","tag-anomaly-detection","tag-atari","tag-atari-game","tag-business-communications","tag-business-innovation","tag-c-suite","tag-c-suite-respondents","tag-cloud","tag-cloud-based-phone-platform","tag-competitive-advantage","tag-competitive-data","tag-confidential-information","tag-corporate-budgets","tag-cyber-security","tag-cyberattacks","tag-cybersecurity","tag-data-loss-protection","tag-economist-intelligence-unit","tag-eiu","tag-eiu-study","tag-end-point-protection","tag-endpoint-devices","tag-endpoint-servers","tag-enterprise","tag-er-room","tag-er-room-staff","tag-executives","tag-financial-risks","tag-government","tag-hacker","tag-hackers","tag-hacking","tag-internet-of-things","tag-internet-of-things-iot-devices","tag-iot","tag-it","tag-legal-fees","tag-malware","tag-management","tag-managing-cybersecurity","tag-motorcyclists","tag-next-generation-platforms","tag-obama","tag-penetration-testing","tag-point-solutions","tag-president-barack-obama","tag-president-obama","tag-reactive-cyber-defense","tag-reactive-point-solutions","tag-rube-goldberg","tag-securities-executives","tag-security","tag-security-breaches","tag-security-policies","tag-security-professionals","tag-security-vendors","tag-sensitive-information","tag-smart-phones","tag-the-wall-street-journal","tag-verizon","tag-verizon-data-breach-report","tag-vmware","tag-web-application-firewalls","tag-xbox","tag-xbox-world"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Is cybersecurity stifling your business innovation? | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is cybersecurity stifling your business innovation?\" \/>\n<meta property=\"og:description\" content=\"If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-16T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-01T13:19:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"Is cybersecurity stifling your business innovation?\",\"datePublished\":\"2017-05-16T00:00:00+00:00\",\"dateModified\":\"2025-07-01T13:19:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg\",\"keywords\":[\"Anachronistic architecture\",\"anomaly detection\",\"Atari\",\"Atari game\",\"business communications\",\"Business innovation\",\"C-suite\",\"C-suite respondents\",\"cloud\",\"cloud-based phone platform\",\"competitive advantage\",\"competitive data\",\"confidential information\",\"corporate budgets\",\"cyber security\",\"cyberattacks\",\"cybersecurity\",\"data-loss protection\",\"Economist Intelligence Unit\",\"EIU\",\"EIU study\",\"end-point protection\",\"endpoint devices\",\"endpoint servers\",\"Enterprise\",\"ER room\",\"ER room staff\",\"executives\",\"financial risks\",\"government\",\"hacker\",\"hackers\",\"hacking\",\"internet of things\",\"internet of things (IoT) devices\",\"iot\",\"IT\",\"legal fees\",\"malware\",\"management\",\"managing cybersecurity\",\"motorcyclists\",\"next-generation platforms\",\"Obama\",\"penetration testing\",\"point solutions\",\"President Barack Obama\",\"president Obama\",\"reactive cyber defense\",\"reactive point solutions\",\"Rube Goldberg\",\"securities executives\",\"security\",\"security breaches\",\"security policies\",\"security professionals\",\"security vendors\",\"sensitive information\",\"smart phones\",\"The Wall Street Journal\",\"verizon\",\"Verizon Data Breach Report\",\"VMware\",\"web application firewalls\",\"Xbox\",\"Xbox world\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\",\"name\":\"Is cybersecurity stifling your business innovation? | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg\",\"datePublished\":\"2017-05-16T00:00:00+00:00\",\"dateModified\":\"2025-07-01T13:19:58+00:00\",\"description\":\"If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg\",\"width\":700,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is cybersecurity stifling your business innovation?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is cybersecurity stifling your business innovation? | RingCentral Blog","description":"If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/","og_locale":"en_US","og_type":"article","og_title":"Is cybersecurity stifling your business innovation?","og_description":"If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2017-05-16T00:00:00+00:00","article_modified_time":"2025-07-01T13:19:58+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg","type":"image\/jpeg"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#article","isPartOf":{"@id":"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"Is cybersecurity stifling your business innovation?","datePublished":"2017-05-16T00:00:00+00:00","dateModified":"2025-07-01T13:19:58+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/"},"wordCount":902,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg","keywords":["Anachronistic architecture","anomaly detection","Atari","Atari game","business communications","Business innovation","C-suite","C-suite respondents","cloud","cloud-based phone platform","competitive advantage","competitive data","confidential information","corporate budgets","cyber security","cyberattacks","cybersecurity","data-loss protection","Economist Intelligence Unit","EIU","EIU study","end-point protection","endpoint devices","endpoint servers","Enterprise","ER room","ER room staff","executives","financial risks","government","hacker","hackers","hacking","internet of things","internet of things (IoT) devices","iot","IT","legal fees","malware","management","managing cybersecurity","motorcyclists","next-generation platforms","Obama","penetration testing","point solutions","President Barack Obama","president Obama","reactive cyber defense","reactive point solutions","Rube Goldberg","securities executives","security","security breaches","security policies","security professionals","security vendors","sensitive information","smart phones","The Wall Street Journal","verizon","Verizon Data Breach Report","VMware","web application firewalls","Xbox","Xbox world"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/","name":"Is cybersecurity stifling your business innovation? | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg","datePublished":"2017-05-16T00:00:00+00:00","dateModified":"2025-07-01T13:19:58+00:00","description":"If a hacker got into one of your endpoint devices or servers, how many records would you lose? No doubt you have seen your share of frightening headlines","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg","width":700,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Is cybersecurity stifling your business innovation?"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/KID-8351-Blog-Post-_-Cybersecurity-blog-post_r1.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/is-cybersecurity-stifling-your-business-innovation\/amp","excerpt_title":"Is cybersecurity stifling your business innovation?","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/38791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=38791"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/38791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/38792"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=38791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=38791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=38791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}