{"id":170280,"date":"2022-11-18T19:20:51","date_gmt":"2022-11-18T19:20:51","guid":{"rendered":"https:\/\/ccbtechnology.com\/?post_type=asset_type&#038;p=170280"},"modified":"2025-09-12T05:15:07","modified_gmt":"2025-09-12T11:15:07","slug":"how-and-why-hackers-hack","status":"publish","type":"asset_type","link":"https:\/\/ccbtechnology.com\/asset\/how-and-why-hackers-hack\/","title":{"rendered":"How and Why Hackers Hack and How to Defend Against Them"},"content":{"rendered":"<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id170280_c4d4aa-c0{margin-bottom:-50px;}.kb-row-layout-id170280_c4d4aa-c0 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id170280_c4d4aa-c0 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id170280_c4d4aa-c0 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:1130px;padding-top:40px;padding-bottom:25px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id170280_c4d4aa-c0 > .kt-row-layout-overlay{opacity:0.16;}@media all and (max-width: 1024px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id170280_c4d4aa-c0{margin-bottom:-15px;}}@media all and (max-width: 1024px){.kb-row-layout-id170280_c4d4aa-c0 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id170280_c4d4aa-c0{margin-bottom:-70px;}.kb-row-layout-id170280_c4d4aa-c0 > .kt-row-column-wrap{padding-right:0px;padding-left:0px;grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id170280_c4d4aa-c0 alignfull wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column170280_719ba9-17 > .kt-inside-inner-col,.kadence-column170280_719ba9-17 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_719ba9-17 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_719ba9-17 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_719ba9-17 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_719ba9-17 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_719ba9-17{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_719ba9-17 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_719ba9-17 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_719ba9-17 inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2, .wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2[data-kb-block=\"kb-adv-heading170280_e85f20-b2\"]{margin-bottom:-50px;text-align:center;font-size:55px;font-style:normal;color:#333333;}.wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2[data-kb-block=\"kb-adv-heading170280_e85f20-b2\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}@media all and (max-width: 1024px){.wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2, .wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2[data-kb-block=\"kb-adv-heading170280_e85f20-b2\"]{font-size:50px;}}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2, .wp-block-kadence-advancedheading.kt-adv-heading170280_e85f20-b2[data-kb-block=\"kb-adv-heading170280_e85f20-b2\"]{margin-bottom:-15px;font-size:35px;}}<\/style>\n<h1 class=\"kt-adv-heading170280_e85f20-b2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading170280_e85f20-b2\"><span style=\"color:#2c92fa\">Video:<\/span> How and Why Hackers Hack and How to Defend Against Them <\/h1>\n\n\n<style>.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, calc(10% - ((var(--global-kb-gap-md, 2rem) * 2 )\/3)))minmax(0, calc(80% - ((var(--global-kb-gap-md, 2rem) * 2 )\/3)))minmax(0, calc(10% - ((var(--global-kb-gap-md, 2rem) * 2 )\/3)));}.kb-row-layout-id170280_42680f-f4 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 1024px){.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr) minmax(0, 2fr) minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id170280_42680f-f4 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id170280_42680f-f4 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-3-columns kt-row-layout-center-half kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column170280_3ed68a-00 > .kt-inside-inner-col,.kadence-column170280_3ed68a-00 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_3ed68a-00 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_3ed68a-00 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_3ed68a-00 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_3ed68a-00 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_3ed68a-00{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_3ed68a-00 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_3ed68a-00 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_3ed68a-00 inner-column-1\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n\n<style>.kadence-column170280_691246-f7 > .kt-inside-inner-col,.kadence-column170280_691246-f7 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_691246-f7 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_691246-f7 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_691246-f7 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_691246-f7 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_691246-f7{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_691246-f7 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_691246-f7 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_691246-f7 inner-column-2\"><div class=\"kt-inside-inner-col\">\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How and Why Hackers Hack and How to Defend Against Them\" src=\"https:\/\/player.vimeo.com\/video\/763774411?dnt=1&amp;app_id=122963\" width=\"1130\" height=\"706\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe>\n<\/div><\/figure>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id170280_832039-fb{margin-top:-90px;}.kb-row-layout-id170280_832039-fb > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id170280_832039-fb > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id170280_832039-fb > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:0px;padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-md, 2rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id170280_832039-fb > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id170280_832039-fb > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id170280_832039-fb > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id170280_832039-fb alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column170280_67b101-23 > .kt-inside-inner-col,.kadence-column170280_67b101-23 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_67b101-23 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_67b101-23 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_67b101-23 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_67b101-23 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_67b101-23{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_67b101-23 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_67b101-23 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_67b101-23\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading170280_1f3516-bb, .wp-block-kadence-advancedheading.kt-adv-heading170280_1f3516-bb[data-kb-block=\"kb-adv-heading170280_1f3516-bb\"]{margin-top:60px;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading170280_1f3516-bb mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading170280_1f3516-bb[data-kb-block=\"kb-adv-heading170280_1f3516-bb\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h5 class=\"kt-adv-heading170280_1f3516-bb wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading170280_1f3516-bb\">Understanding why cyberattacks happen is an important first step in protecting your business. At CCB Technology, we look at the real reasons behind these threats and the techniques attackers rely on, from malware to attempts at bypassing multi-factor authentication (MFA). With insights from cybersecurity expert Roger Grimes, we explain how these methods work in practice and why awareness matters. When you understand how criminals operate, you can take smarter actions to reduce risk and strengthen your overall security posture.<br><br>The big takeaway is that most attacks start with simple tricks like phishing emails or fake texts. Slowing down before clicking a link, keeping software updated, and using tools like MFA and strong passwords can make all the difference. It\u2019s also not just up to IT\u2014leaders across the business need to be part of the conversation so security decisions actually work in real-world situations.<br><br>At CCB Technology, we make IT security and support easy to manage. Our team helps you identify gaps, recommend solutions, and keep your systems resilient against evolving threats. We also provide resources to keep you up to date with the latest trends and tools. Whether you want to improve day-to-day collaboration or safeguard your business long-term, we\u2019re here to provide straightforward guidance that protects and empowers your organization.<br><br><strong>You&#8217;ll learn:<\/strong><\/h5>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items170280_960f10-21:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items170280_960f10-21 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-lg, 3rem);margin-left:var(--global-kb-spacing-md, 2rem);}.wp-block-kadence-iconlist.kt-svg-icon-list-items170280_960f10-21 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items170280_960f10-21 .kb-svg-icon-wrap{color:#f3d600;}.wp-block-kadence-iconlist.kt-svg-icon-list-items170280_960f10-21 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items170280_960f10-21 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items170280_960f10-21 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-170280_5835fd-07 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-170280_5835fd-07\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_check kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Key security practices to implement in your business<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-170280_e3c0b4-e6 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-170280_e3c0b4-e6\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_check kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">How to lower your risk of becoming a cyber victim<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-170280_aeb094-f7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-170280_aeb094-f7\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_check kt-svg-icon-list-single\"><svg viewBox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">How hackers are finding ways to get around MFA<\/span><\/li>\n<\/ul><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col,.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_0d1bf3-34{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_0d1bf3-34 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_0d1bf3-34 inner-column-3\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id170280_93c871-da{margin-top:-65px;}.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr) minmax(0, 2fr) minmax(0, 1fr);}.kb-row-layout-id170280_93c871-da{background-image:url('https:\/\/ccbtechnology.com\/wp-content\/uploads\/2022\/11\/How-and-why-hackers-hack.jpg');background-size:cover;background-position:30% 0%;background-attachment:scroll;background-repeat:no-repeat;}.kb-row-layout-id170280_93c871-da > .kt-row-layout-overlay{opacity:0.84;background:linear-gradient(180deg, #263146 0%, #244480 100%);}.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep{height:100px;}.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep svg{width:100%;}.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep svg{fill:#ffffff!important;}.kb-row-layout-id170280_93c871-da .kt-row-layout-top-sep{height:65px;}.kb-row-layout-id170280_93c871-da .kt-row-layout-top-sep svg{width:100%;}.kb-row-layout-id170280_93c871-da .kt-row-layout-top-sep svg{fill:#ffffff!important;}@media all and (max-width: 1024px){.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 1024px){.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap{grid-template-columns:repeat(3, minmax(0, 1fr));}}@media all and (max-width: 1024px){.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep{height:px;}}@media all and (max-width: 1024px){.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep svg{width:%;}}@media all and (max-width: 767px){.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id170280_93c871-da > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep{height:px;}.kb-row-layout-id170280_93c871-da .kt-row-layout-bottom-sep svg{width:%;}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id170280_93c871-da alignfull kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-gradient\"><\/div><div class=\"kt-row-layout-top-sep kt-row-sep-type-wavei\"><svg viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\"><path d=\"M0,40c0,0 120.077,-38.076 250,-38c129.923,0.076 345.105,78 500,78c154.895,0 250,-30 250,-30l0,50l-1000,0l0,-60Z\" \/><\/svg><\/div><div class=\"kt-row-column-wrap kt-has-3-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column170280_d14f19-a4 > .kt-inside-inner-col,.kadence-column170280_d14f19-a4 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_d14f19-a4 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_d14f19-a4 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_d14f19-a4 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_d14f19-a4 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_d14f19-a4{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_d14f19-a4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_d14f19-a4 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_d14f19-a4 inner-column-1\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n\n<style>.kadence-column170280_f1f261-44 > .kt-inside-inner-col{padding-top:50px;}.kadence-column170280_f1f261-44 > .kt-inside-inner-col,.kadence-column170280_f1f261-44 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_f1f261-44 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_f1f261-44 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_f1f261-44 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_f1f261-44 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_f1f261-44{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_f1f261-44 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_f1f261-44 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_f1f261-44 inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading170280_cf8d54-57, .wp-block-kadence-advancedheading.kt-adv-heading170280_cf8d54-57[data-kb-block=\"kb-adv-heading170280_cf8d54-57\"]{padding-top:25px;font-style:normal;color:#ffffff;}.wp-block-kadence-advancedheading.kt-adv-heading170280_cf8d54-57 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading170280_cf8d54-57[data-kb-block=\"kb-adv-heading170280_cf8d54-57\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h2 class=\"kt-adv-heading170280_cf8d54-57 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading170280_cf8d54-57\">How can we help you?<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading170280_c7e791-7e, .wp-block-kadence-advancedheading.kt-adv-heading170280_c7e791-7e[data-kb-block=\"kb-adv-heading170280_c7e791-7e\"]{padding-bottom:10px;margin-top:-10px;font-style:normal;color:#ffffff;}.wp-block-kadence-advancedheading.kt-adv-heading170280_c7e791-7e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading170280_c7e791-7e[data-kb-block=\"kb-adv-heading170280_c7e791-7e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<h5 class=\"kt-adv-heading170280_c7e791-7e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading170280_c7e791-7e\">(Please select all that apply)<\/h5>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"4110190\",\n    formId: \"c22045ab-6d97-4f9f-afbd-bce9c204ac32\"\n  });\n<\/script>\n<\/div><\/div>\n\n\n<style>.kadence-column170280_4fb673-70 > .kt-inside-inner-col,.kadence-column170280_4fb673-70 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column170280_4fb673-70 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column170280_4fb673-70 > .kt-inside-inner-col{flex-direction:column;}.kadence-column170280_4fb673-70 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column170280_4fb673-70 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column170280_4fb673-70{position:relative;}@media all and (max-width: 1024px){.kadence-column170280_4fb673-70 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column170280_4fb673-70 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column170280_4fb673-70 inner-column-3\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Video: How and Why Hackers Hack and How to Defend Against Them Understanding why cyberattacks happen is an important first step in protecting your business. [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":170290,"menu_order":0,"template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"asset_categories":[26],"asset_categories_2":[28],"class_list":["post-170280","asset_type","type-asset_type","status-publish","has-post-thumbnail","hentry","asset_categories-courses-videos","asset_categories_2-security"],"acf":{"loop_featured_image":"","button_label":"Watch video"},"_links":{"self":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/asset_type\/170280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/asset_type"}],"about":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/types\/asset_type"}],"author":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/users\/15"}],"version-history":[{"count":0,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/asset_type\/170280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/media\/170290"}],"wp:attachment":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/media?parent=170280"}],"wp:term":[{"taxonomy":"asset_categories","embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/asset_categories?post=170280"},{"taxonomy":"asset_categories_2","embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/asset_categories_2?post=170280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}