{"id":6908,"date":"2023-04-19T12:46:16","date_gmt":"2023-04-19T12:46:16","guid":{"rendered":"https:\/\/adarma.wpengine.com\/how-to-prevent-business-email-compromise-copy\/"},"modified":"2023-04-19T12:55:16","modified_gmt":"2023-04-19T12:55:16","slug":"what-happens-after-a-breach","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/what-happens-after-a-breach\/","title":{"rendered":"What Happens After a Breach? The Attacker\u2019s Next Steps & How to Trip Them Up"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":6909,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[255,261,217],"acf":[],"yoast_head":"\n