{"id":3319,"date":"2024-11-08T22:48:33","date_gmt":"2024-11-08T22:48:33","guid":{"rendered":"https:\/\/nl1g1e2381-staging.onrocket.site\/?p=3319"},"modified":"2025-04-07T16:33:20","modified_gmt":"2025-04-07T23:33:20","slug":"technical-debt-an-enterprises-self-inflicted-cyber-risk","status":"publish","type":"post","link":"https:\/\/www.forwardnetworks.com\/blog\/2024\/11\/08\/technical-debt-an-enterprises-self-inflicted-cyber-risk\/","title":{"rendered":"Technical Debt: An enterprise\u2019s self-inflicted cyber risk\u00a0"},"content":{"rendered":"\n<p>COMMENTARY: Technical debt has become the foremost self-imposed cyber threat within enterprises. But what are we talking about? Why does it happen? And, how can enterprises ensure that obsolete hardware and unattended software aren\u2019t inadvertently leaving the network open to risk?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/breaking-technical-debts-vicious-cycle-to-modernize-your-business\">McKinsey<\/a> defines technical debt as the \u201ctax\u201d a company pays on any development to redress existing technology issues. And it\u2019s not cheap. The consulting firm\u2019s research found that technical debt accounts for about 40% of IT balance sheets \u2013 and that companies pay an additional 10% to 20% on top of a project\u2019s cost to address it.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.scworld.com\/perspective\/technical-debt-an-enterprises-self-inflicted-cyber-risk\" target=\"_blank\" rel=\"noopener\" title=\"\">Read the full article.<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technical debt has become the foremost self-imposed cyber threat within enterprises.<\/p>\n","protected":false},"author":21,"featured_media":3320,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[33],"tags":[],"ppma_author":[637],"class_list":["post-3319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"acf":[],"aioseo_notices":[],"authors":[{"term_id":637,"user_id":21,"is_guest":0,"slug":"renata","display_name":"Renata Budko","avatar_url":{"url":"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2024\/08\/image.png","url2x":"https:\/\/www.forwardnetworks.com\/wp-content\/uploads\/2024\/08\/image.png"},"author_category":"","user_url":"","last_name":"Budko","first_name":"Renata","job_title":"","description":"Director of Product Management, Security"}],"_links":{"self":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts\/3319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/comments?post=3319"}],"version-history":[{"count":5,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts\/3319\/revisions"}],"predecessor-version":[{"id":3901,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/posts\/3319\/revisions\/3901"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/media\/3320"}],"wp:attachment":[{"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/media?parent=3319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/categories?post=3319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/tags?post=3319"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forwardnetworks.com\/wp-json\/wp\/v2\/ppma_author?post=3319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}