{"id":5250,"date":"2014-04-14T06:00:49","date_gmt":"2014-04-14T13:00:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5250"},"modified":"2014-04-14T06:09:00","modified_gmt":"2014-04-14T13:09:00","slug":"stop-apts-wreaking-havoc-network","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/04\/stop-apts-wreaking-havoc-network\/","title":{"rendered":"Stop APT From Wreaking Havoc On Your Network"},"content":{"rendered":"<p>What you don't know about the traffic on your network <i>can<\/i> hurt you.\u00a0Check out the infographic below on Advanced Persistent Threats (APT) and learn more about how to protect your network from APTs with Palo Alto Networks.<\/p>\n<p><!--more--><\/p>\n<p><center><a href=\"http:\/\/go.paloaltonetworks.com\/threatprevention\"><div style=\"max-width:100%\" data-width=\"300\"><span class=\"ar-custom\" style=\"padding-bottom:335.33%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-5256 lozad\" alt=\"PAN_APT_IG\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PAN_APT_IG.jpeg\" width=\"300\" height=\"1006\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PAN_APT_IG.jpeg 300w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/04\/PAN_APT_IG-230x771.jpeg 230w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/div><\/a><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What you don't know about the traffic on your network can hurt you.\u00a0Check out the infographic below on Advanced Persistent Threats (APT) and learn more about how to protect your network from &hellip;<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[164,316],"coauthors":[],"class_list":["post-5250","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-apt","tag-infographic"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5250"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5250\/revisions"}],"predecessor-version":[{"id":5464,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5250\/revisions\/5464"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5250"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}