{"id":279,"date":"2015-10-13T04:00:26","date_gmt":"2015-10-13T09:00:26","guid":{"rendered":"http:\/\/localhost\/?page_id=279"},"modified":"2022-12-29T10:24:11","modified_gmt":"2022-12-29T15:24:11","slug":"case-studies","status":"publish","type":"page","link":"https:\/\/www.argustech.com\/?page_id=279","title":{"rendered":"Case Studies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"279\" class=\"elementor elementor-279\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a9372ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a9372ec\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26b438d0\" data-id=\"26b438d0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3221cb2e elementor-widget elementor-widget-text-editor\" data-id=\"3221cb2e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>\u00a0<\/h2><h2>\u00a0<\/h2><h2><span style=\"color: #333333;\"><a style=\"color: #333333;\" title=\"Preventing Financial Fraud \u2013 Securing Email\" href=\"https:\/\/www.argustech.com\/?page_id=286\"><span style=\"text-decoration: underline;\"><span style=\"color: #0000ff; text-decoration: underline;\">Preventing Financial Fraud &#8211;\u00a0Securing Email<\/span><\/span><\/a><\/span><\/h2><p><span style=\"color: #333333;\">A discussion on how email spoofing is threatening organizations and making them fall prey to simple social engineering tactics, and what is required to have proper defense against such attacks. <img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-177\" src=\"http:\/\/localhost\/wp-content\/uploads\/2014\/11\/Map1.jpg\" alt=\"\" width=\"380\" height=\"218\" srcset=\"https:\/\/www.argustech.com\/wp-content\/uploads\/2014\/11\/Map1.jpg 380w, https:\/\/www.argustech.com\/wp-content\/uploads\/2014\/11\/Map1-300x172.jpg 300w\" sizes=\"(max-width: 380px) 100vw, 380px\" \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0 Preventing Financial Fraud &#8211;\u00a0Securing Email A discussion on how email spoofing is threatening organizations and making them fall prey to simple social engineering tactics, and what is required to have proper defense against such attacks.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-279","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.argustech.com\/index.php?rest_route=\/wp\/v2\/pages\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argustech.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.argustech.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.argustech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argustech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=279"}],"version-history":[{"count":15,"href":"https:\/\/www.argustech.com\/index.php?rest_route=\/wp\/v2\/pages\/279\/revisions"}],"predecessor-version":[{"id":1467,"href":"https:\/\/www.argustech.com\/index.php?rest_route=\/wp\/v2\/pages\/279\/revisions\/1467"}],"wp:attachment":[{"href":"https:\/\/www.argustech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}