{"id":9373,"date":"2024-07-30T08:52:02","date_gmt":"2024-07-30T06:52:02","guid":{"rendered":"https:\/\/aboveit.fi\/a-summer-of-disruptions\/"},"modified":"2025-11-27T14:04:04","modified_gmt":"2025-11-27T12:04:04","slug":"a-summer-of-disruptions","status":"publish","type":"post","link":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/","title":{"rendered":"A Summer of Disruptions"},"content":{"rendered":"\n<p><em>A summer of disruptions from a cybersecurity perspective. July, the most important holiday month for Finns, is nearing its end as this blog is being written. I couldn&#8217;t help but follow world events and also how we IT professionals have once again been called back from our holidays. In my opinion, it has been a real summer of disruptions \u2013 in terms of cybersecurity, what do you think?   <\/em><\/p>\n\n<div class=\"section-wrapper\" data-id=\"7t137z\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-7t137z layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-8T5m1S\"><div class=\"guten-column-wrapper\" data-id=\"8T5m1S\">\n<h6 class=\"wp-block-heading\">The &#8216;Mass Strike&#8217; of Critical Servers \u2013 More Familiarly Known as &#8216;Crowdstrike&#8217;<\/h6>\n\n\n\n<p>A true summer of disruptions from a cybersecurity perspective. In July, Crowdstrike, a well-known cybersecurity company, released a security update that caused <a href=\"https:\/\/www.tivi.fi\/uutiset\/nain-paljon-crowdstrike-kaaos-maksoi-suuryrityksille\/c12aacd0-0ef5-49db-946f-53657988ee72\">unexpected problems<\/a> for many users. The update was intended to improve system protection against new threats, but it also brought challenges. After the update, a large number of significant global companies reported technical challenges, with critical servers crashing into a bluescreen state, and even air traffic at some airports worldwide being brought to its knees.   <\/p>\n\n\n\n<p>The incident highlighted how dependent we are on information technology today. Microsoft also initially received blame for this. In Finland, we perhaps got off with a scare to some extent; globally, it might not have been as good. Nevertheless, I heard that even in Finland, some machine users had their business operations halted for an entire workday while waiting for a fix, and one professional was called from their holiday by phone to help, as the entire server environment was more or less down.   <\/p>\n\n\n\n<p>But what did I, as a Microsoft technologies professional, pay attention to? I started to ponder how cybersecurity software is mostly almost always an additional third-party implemented software, for which compatibility is not always guaranteed. I also pondered the segmentation of update releases into waves; is this even possible for all cybersecurity software? Microsoft&#8217;s own security is already a built-in feature in Windows operating systems, and its updates and virus definition updates can be rolled out in waves, especially for server environments, using update management solutions. However, in the planning of continuity and fault tolerance, there are several other areas to consider for critical services. So, where should one look for the cause?     <\/p>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n<div class=\"section-wrapper\" data-id=\"xeR4EF\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-xeR4EF layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-sXgtMJ\"><div class=\"guten-column-wrapper\" data-id=\"sXgtMJ\">\n<h6 class=\"wp-block-heading\">Hybrid Influence and Critical Infrastructure?<\/h6>\n\n\n\n<p>As the war in Ukraine progresses, hybrid influence has also increased here in Finland. Newspapers have reported attempted breaches targeting water supply, and <a href=\"https:\/\/yle.fi\/a\/74-20101849\">a mobile phone mast in Janakkala recently fell<\/a> due to an external and as yet unknown party. Our society&#8217;s information systems are also continuously subjected to cyber threats and attempts to disrupt services. The message in the media has been: &#8220;It&#8217;s advisable to get used to the situation next to our unstable eastern neighbor.&#8221; The global situation seems bleak, so what can we do ourselves?    <\/p>\n\n\n\n<p>In my opinion, all companies should now take cybersecurity seriously. It is important to prepare for the fact that the situation will certainly not ease in the coming years; instead, attempts at influence are likely to only increase. Cybersecurity should be considered an increasingly important part of companies&#8217; core strategic work. As individuals, we must strive to increase our knowledge of cybersecurity and endeavor to follow guidelines. At the same time, it is important to remember that we are only human, and mistakes sometimes happen. However, when mistakes occur, one should not hide, but rather raise a hand immediately as a sign of the error \u2013 so that corrective actions can begin. All of us humans are the biggest threat to cybersecurity due to our skill gaps. So let&#8217;s try to be vigilant and do our best.       <\/p>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n<div class=\"section-wrapper\" data-id=\"kp9a6j\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-kp9a6j layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-BcsWLx\"><div class=\"guten-column-wrapper\" data-id=\"BcsWLx\">\n<h6 class=\"wp-block-heading\">AI Assistance for Cybersecurity?<\/h6>\n\n\n\n<p>Artificial intelligence is currently developing at a tremendous pace. The most enthusiastic companies and individuals have already harnessed AI solutions to support their work, leading the way. Many are already predicting AI to be the next bubble in the IT sector. However, we are on the verge of something entirely new. AI is revolutionizing how things are done, and at the same time, criminals are also utilizing it very effectively, falsifying images and audio, and creating increasingly realistic attacks.    <\/p>\n\n\n\n<p>The eternal race is real, as <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/ai-machine-learning\/microsoft-copilot-security\">AI is also being harnessed for cybersecurity<\/a> from another direction. Cybersecurity professionals are now also identifying threats and attacks more effectively. AI assistance can now help cybersecurity professionals and quickly interpret from a large mass of data in minutes what previously took hours to analyze manually. However, IT management professionals are still needed; personally, I believe AI will only increase the need for expertise \u2013 work will certainly change, but it always has. The future looks interesting!    <\/p>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n<div class=\"section-wrapper\" data-id=\"E733Th\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-E733Th layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-6FvYsI\"><div class=\"guten-column-wrapper\" data-id=\"6FvYsI\">\n<h6 class=\"wp-block-heading\">EU Guidance on Corporate Cybersecurity<\/h6>\n\n\n\n<p>As autumn approaches, we await information and guidelines from the Finnish government on how the new <a href=\"https:\/\/digital-strategy.ec.europa.eu\/fi\/policies\/nis2-directive\">NIS2 EU Directive<\/a>, which governs cybersecurity, will be implemented within the framework of Finnish law. No major national changes to the original EU regulation are likely, as the transition period ends in October. In this world, I see this as a purely positive development, as it is good that large companies, in particular, are finally being pressured to genuinely take control of their cybersecurity, beyond just installing basic antivirus software. And somehow, I can already see what&#8217;s coming: I predict that these same regulations and requirements will gradually start to trickle down to all smaller organizations as well, if they haven&#8217;t already become subject to the regulations as part of a supply chain.   <\/p>\n\n\n\n<p>We at Above IT have also had to align ourselves and our operations with the requirements of this fresh cybersecurity framework during the summer. As an IT company, we are, after all, obliged to comply with these demands. At the same time, we have already taken the first steps towards ISO27001 requirements, which will be our next major undertaking.  <\/p>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n<div class=\"section-wrapper\" data-id=\"RzvI2L\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-RzvI2L layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-tFgC6f\"><div class=\"guten-column-wrapper\" data-id=\"tFgC6f\">\n<h6 class=\"wp-block-heading\">What Does the Future of Cybersecurity Look Like?<\/h6>\n\n\n\n<p>This is certainly a question that concerns all of you, our customers \u2013 IT management decision-makers. And why not, as we are living through exciting times with all their disruptions. Would you be interested in hearing what will happen in the market?  <\/p>\n\n\n\n<p>On October 3rd, starting at 3 PM, we are organizing an <a href=\"https:\/\/aboveit.fi\/above-it-afterwork-tapahtuma-it-paattajille-3-10-2024\/\">Afterwork event<\/a>, to which all IT management decision-makers are welcome to network. Industry influencers will be speaking at the event, and you can also hear case examples related to cybersecurity development, as well as AI and its data protection requirements. And I promise you won&#8217;t have to go home on an empty stomach. Spaces are limited, so register now to attend!    <\/p>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n<div class=\"section-wrapper\" data-id=\"esvy7k\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-esvy7k layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-xEg4kC\"><div class=\"guten-column-wrapper\" data-id=\"xEg4kC\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>Above IT is a partner and resource for IT administrations. As our client, you gain genuine expertise in information security and data protection development, along with support and security amidst global challenges! If you wish to elevate your IT with us, please contact us by clicking the link below!  <\/em><\/p>\n<\/blockquote>\n<\/div><\/div>\n<\/div><\/section><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A summer of disruptions from a cybersecurity perspective. July, the most important holiday month for Finns, is nearing its end as this blog is being written. I couldn&#8217;t help but follow world events and also how we IT professionals have once again been called back from our holidays. In my opinion, it has been a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9374,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[218,253],"tags":[413,219,412],"class_list":["post-9373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","tag-afterwork","tag-cybersecurity","tag-data-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Summer of Disruptions - Above IT Oy<\/title>\n<meta name=\"description\" content=\"Above IT&#039;s blog discusses the summer of disruptions from a cybersecurity perspective, taking a stand on the future of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Summer of Disruptions - Above IT Oy\" \/>\n<meta property=\"og:description\" content=\"Above IT&#039;s blog discusses the summer of disruptions from a cybersecurity perspective, taking a stand on the future of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/\" \/>\n<meta property=\"og:site_name\" content=\"Above IT Oy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aboveitfi\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-30T06:52:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-27T12:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/07\/1547-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juha Kari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juha Kari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/\"},\"author\":{\"name\":\"Juha Kari\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/8b6b16ca2927e8021cd0a2fc2a09ce5d\"},\"headline\":\"A Summer of Disruptions\",\"datePublished\":\"2024-07-30T06:52:02+00:00\",\"dateModified\":\"2025-11-27T12:04:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/\"},\"wordCount\":1120,\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/1547-scaled-1.jpg\",\"keywords\":[\"Afterwork\",\"cybersecurity\",\"data protection\"],\"articleSection\":[\"Cybersecurity\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/\",\"name\":\"A Summer of Disruptions - Above IT Oy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/1547-scaled-1.jpg\",\"datePublished\":\"2024-07-30T06:52:02+00:00\",\"dateModified\":\"2025-11-27T12:04:04+00:00\",\"description\":\"Above IT's blog discusses the summer of disruptions from a cybersecurity perspective, taking a stand on the future of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/1547-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/1547-scaled-1.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"The Summer of Disruptions from a Cybersecurity Perspective Under Discussion\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/a-summer-of-disruptions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Summer of Disruptions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"name\":\"We Are Above IT\",\"description\":\"Tietohallinnon voimavarakumppani\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\",\"name\":\"Above IT Oy\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"width\":1613,\"height\":383,\"caption\":\"Above IT Oy\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/aboveitfi\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/aboveitfi\",\"https:\\\/\\\/instagram.com\\\/aboveitfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/8b6b16ca2927e8021cd0a2fc2a09ce5d\",\"name\":\"Juha Kari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g\",\"caption\":\"Juha Kari\"},\"sameAs\":[\"https:\\\/\\\/aboveit.fi\"],\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/author\\\/juha-kariaboveit-fi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Summer of Disruptions - Above IT Oy","description":"Above IT's blog discusses the summer of disruptions from a cybersecurity perspective, taking a stand on the future of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/","og_locale":"en_US","og_type":"article","og_title":"A Summer of Disruptions - Above IT Oy","og_description":"Above IT's blog discusses the summer of disruptions from a cybersecurity perspective, taking a stand on the future of cybersecurity.","og_url":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/","og_site_name":"Above IT Oy","article_publisher":"https:\/\/www.facebook.com\/aboveitfi","article_published_time":"2024-07-30T06:52:02+00:00","article_modified_time":"2025-11-27T12:04:04+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/07\/1547-scaled-1.jpg","type":"image\/jpeg"}],"author":"Juha Kari","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Juha Kari","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#article","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/"},"author":{"name":"Juha Kari","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/8b6b16ca2927e8021cd0a2fc2a09ce5d"},"headline":"A Summer of Disruptions","datePublished":"2024-07-30T06:52:02+00:00","dateModified":"2025-11-27T12:04:04+00:00","mainEntityOfPage":{"@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/"},"wordCount":1120,"publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"image":{"@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/07\/1547-scaled-1.jpg","keywords":["Afterwork","cybersecurity","data protection"],"articleSection":["Cybersecurity","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/","url":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/","name":"A Summer of Disruptions - Above IT Oy","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#primaryimage"},"image":{"@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/07\/1547-scaled-1.jpg","datePublished":"2024-07-30T06:52:02+00:00","dateModified":"2025-11-27T12:04:04+00:00","description":"Above IT's blog discusses the summer of disruptions from a cybersecurity perspective, taking a stand on the future of cybersecurity.","breadcrumb":{"@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#primaryimage","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/07\/1547-scaled-1.jpg","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/07\/1547-scaled-1.jpg","width":1920,"height":1280,"caption":"The Summer of Disruptions from a Cybersecurity Perspective Under Discussion"},{"@type":"BreadcrumbList","@id":"https:\/\/aboveit.fi\/en\/a-summer-of-disruptions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/aboveit.fi\/en\/"},{"@type":"ListItem","position":2,"name":"A Summer of Disruptions"}]},{"@type":"WebSite","@id":"https:\/\/aboveit.fi\/en\/#website","url":"https:\/\/aboveit.fi\/en\/","name":"We Are Above IT","description":"Tietohallinnon voimavarakumppani","publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboveit.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aboveit.fi\/en\/#organization","name":"Above IT Oy","url":"https:\/\/aboveit.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","width":1613,"height":383,"caption":"Above IT Oy"},"image":{"@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/aboveitfi","https:\/\/www.linkedin.com\/company\/aboveitfi","https:\/\/instagram.com\/aboveitfi"]},{"@type":"Person","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/8b6b16ca2927e8021cd0a2fc2a09ce5d","name":"Juha Kari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3673353ef8de813771f6c6e6251f2a017a8167d2b4f9e43ac0692cc89ce69aeb?s=96&d=mm&r=g","caption":"Juha Kari"},"sameAs":["https:\/\/aboveit.fi"],"url":"https:\/\/aboveit.fi\/en\/author\/juha-kariaboveit-fi\/"}]}},"_links":{"self":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/comments?post=9373"}],"version-history":[{"count":1,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9373\/revisions"}],"predecessor-version":[{"id":9376,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9373\/revisions\/9376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media\/9374"}],"wp:attachment":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media?parent=9373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/categories?post=9373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/tags?post=9373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}