{"id":53558,"date":"2022-05-03T10:36:12","date_gmt":"2022-05-03T14:36:12","guid":{"rendered":"https:\/\/www.sogolytics.com\/blog\/?p=53558"},"modified":"2026-03-24T02:54:11","modified_gmt":"2026-03-24T06:54:11","slug":"customer-experience-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/","title":{"rendered":"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026"},"content":{"rendered":"<p>Over the last few years, businesses have faced dramatic technological challenges, thus impacting their marketing and strategic decisions. The pandemic put digital transformation at the forefront, making it a mad scramble for <a href=\"https:\/\/www.statista.com\/statistics\/1200465\/covid-digital-transformation-global\/\" target=\"_blank\" rel=\"noopener\">68% of global businesses<\/a> to keep up with consumers. The latter shifted shopping habits to online transacting in a massive way.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>The two most significant drivers in the emerging change were convenience on the one hand and cybersecurity risk on the other. As a result, brand image and customer retention walked a tightrope unless businesses could adjust and align themselves with these new opposing dynamics. One of the first things management had to deal with was multiple technology integrations and an almost overwhelming multiplication of remote working employees logging in from here, there, and everywhere.<\/p>\n<div class=\"div-spacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53561\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970-1024x682.jpg\" alt=\"cybersecurity remote work cx\" width=\"1024\" height=\"682\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970-1024x682.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970-300x200.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970-768x512.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970-600x400.jpg 600w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970-50x33.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-thirdman-7236970.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<p>While in 2019 in-store shopping and browsing malls were an American tradition, 2021 ushered in the mobile device as the most popular consumer tool. <a href=\"https:\/\/www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/#:~:text=Number%20of%20apps%20available%20in%20leading%20app%20stores%202021&amp;text=As%20of%20the%20first%20quarter,million%20available%20apps%20for%20iOS.\" target=\"_blank\" rel=\"noopener\">With over 5.7 million apps on the App Store (Apple) and Google Play (Android) Play<\/a> and <a href=\"https:\/\/www.statista.com\/statistics\/271644\/worldwide-free-and-paid-mobile-app-store-downloads\/\" target=\"_blank\" rel=\"noopener\">230 billion app downloads<\/a> in 2021, the pace of commercial internet activity is spreading like wildfire. Unfortunately, it brings an ill wind &#8211; global <a href=\"https:\/\/www.pbs.org\/newshour\/nation\/why-ransomware-attacks-are-on-the-rise-and-what-can-be-done-to-stop-them\" target=\"_blank\" rel=\"noopener\">ransomware attacks escalated by 62%<\/a> in one year from 2019 to 2020.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>How bad are ransomware attacks?<\/h2>\n<p>Most of us are under the impression that ransomware encrypts all one\u2019s data, effectively cutting off its access. While true, t It goes much further because cyber-criminals double-dip. They cripple the information banks and simultaneously sell the data to the highest bidder. The symptoms of these nefarious activities are identity theft, account disruptions, severe costs to rectify matters, and legal complications for customers and the company. When it happens, it exposes brands to all kinds of volatility that ultimately threaten a company\u2019s:<\/p>\n<ul>\n<li>Customer base<\/li>\n<li>Revenue<\/li>\n<li>Reputation<\/li>\n<li>Continuity<\/li>\n<\/ul>\n<p>For example, in a ClearSale survey (2021), most online shoppers (84%) underlined that they\u2019d be unlikely to re-engage with any website reputed to include fraudsters in their user lineup.<\/p>\n<h2>Given a scenario of endemic cyberattacks, there\u2019s an opportunity<\/h2>\n<p>The primary focus of professional marketers is to address customer pain points. In customer experience terminology, cyber insecurity is a prominent one &#8211; the cost of deriving online advantages. Companies, it seems, on balance, believe it\u2019s worth taking the risk of hackers penetrating touchpoints, thus turning the <a href=\"https:\/\/www.sogolytics.com\/blog\/how-to-improve-customer-experience\/\" target=\"_blank\" rel=\"noopener\">customer journey<\/a> into a nightmare. So, the opportunity exists to enhance brand image and stature by improving cybersecurity, currently a significant threat to CX.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Businesses that prioritize upgrading protections around their systems will discount the odds of CX glitches. The primary steps in a cybersecurity process with a CX-centric flavor are as follows:<\/p>\n<h2>Refine your data-collection strategies and practices<\/h2>\n<p>Data is arguably a company\u2019s most valuable asset. Hackers know it, and that\u2019s why their single-minded mission is to steal it for sale on the dark web. So, everything starts with the data, and the first big focus is its collection. Therefore, review the customer data you collect to protect your customers from identity exposures and protect your business from liability:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>Ask for the minimum information required for customer authentication.<\/li>\n<li>Ask yourself what else you need to know to create an excellent customer experience.\n<ul>\n<li>What data fields can you dispense with without compromising (a) or (b) above?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Going through the steps above should result in a tightly defined data guideline. Then, ensure you have:<\/p>\n<ul>\n<li>The permission of all relevant parties.<\/li>\n<li>Use and storage policies.<\/li>\n<li>Met protection regulations to the letter.<\/li>\n<li>Water-tight compliance from every angle.<\/li>\n<\/ul>\n<p>The measures above result in a double benefit:<\/p>\n<ul>\n<li>Avoidance of fines and penalties.<\/li>\n<li>Underwriting significant peace of mind for your customers.<\/li>\n<\/ul>\n<div class=\"div-spacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53562\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1-1024x683.jpg\" alt=\"cybersecurity cx\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1-1024x683.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1-300x200.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1-768x512.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1-600x400.jpg 600w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1-50x33.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/jefferson-santos-9SoCnyQmkzI-unsplash-1.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Reevaluate your encryption practices<\/h2>\n<p>Encrypt customer data the instant it enters the cloud, apps, or your system. Pay particular attention to data traveling to spots like payment gateways or partnership sites &#8211; the favorites inside the system\u2019s footprint that hackers digitally stalk, looking for weaknesses.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Also, cloud storage security is not all it should be. No matter what cloud providers promise, any breakdown in cloud protections is your baby. It\u2019s true; Amazon and others are spending billions to fortify their cloud infrastructures and fend off attacks. Still, it isn\u2019t their responsibility to resolve or compensate for criminal incursions if they occur.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>So, encrypt all cloud-based data and mandate that it:<\/p>\n<ul>\n<li>Is never stored in plaintext.<\/li>\n<li>Avoids misconfigured servers.<\/li>\n<li>Stifles exfiltration by monitoring traffic in and out of the servers.<\/li>\n<li>Remains under constant security team vigilance.<\/li>\n<\/ul>\n<p>The above may seem obvious, but severe data breaches at Wells Fargo, Facebook, Accenture, Verizon, and many others indicate otherwise. Unexpected data movement should raise flashing alerts with a policy of measures for every circumstance.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Keep your company software patched and updated<\/h2>\n<p>A patch is an improvement that strengthens software resilience to cyber attacks. Did you know that in 2019 unpatched software was the root cause of 60% of security breaches? Nothing stays the same, especially in a world where cunning bad actors innovate new ways to penetrate your system. It emphasizes that upgrades are essential in maintaining and sustaining software and app functionality.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Every IT department should have patching high on the priority list. But, unfortunately, it\u2019s not the case:<\/p>\n<ul>\n<li>It was sub-par before the pandemic, and it\u2019s not much improved today.<\/li>\n<li>Perhaps the reason is that patching is pretty time-consuming (i.e., an average of 16 days per patch, according to a Ponemon Institute survey).<\/li>\n<\/ul>\n<p>So, it boils down to developing a tightly controlled cybersecurity environment by allocating the IT hours to get the job done. Indeed, automatic patches on a pre-scheduled timetable are realistically achievable with machine learning apps readily available. Alternatively, smaller businesses that can\u2019t afford these elaborate measures can deal with software vendors that deliver periodic updates as part of their service.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Strengthen your malware protection<\/h2>\n<p>This is one of the essential precautions you can&#8217;t afford to neglect. There\u2019s a well-proven process to follow under this heading:<\/p>\n<ul>\n<li>Ensure your firewalls are up and working.<\/li>\n<li>Don\u2019t hesitate to rely on continuous site scanning to weed out the malicious viruses that may have penetrated the system (despite your best efforts).<\/li>\n<li>Data skimming attacks are prevalent in 2022 as it enters the checkout forms. Watch that aspect extra carefully.<\/li>\n<li>Email protection is a specialty overview all in itself.\n<ul>\n<li>Employees, untrained in the protocols of opening emails, inadvertently assist devious hackers to implant malware in the system.<\/li>\n<li>The criminals deploy cleverly disguised online messages to lure in the unsuspecting.<\/li>\n<li>Intensive training to create awareness is the best weapon in this arena.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53564\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603-1024x682.jpg\" alt=\"cybersecurity CX\" width=\"1024\" height=\"682\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603-1024x682.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603-300x200.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603-768x512.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603-600x400.jpg 600w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603-50x33.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/05\/pexels-erik-mclean-4582603.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Review your data breach response plan<\/h2>\n<p>Breaches and responses to them go hand in hand. Your brand and reputation depend on the sincerity you express and your reaction speed. The moment a crack in the protections emerges, the following considerations come into play:<\/p>\n<ul>\n<li>Damage to customer relations.<\/li>\n<li>Your brand visualization and image.<\/li>\n<li>Possible financial liability.<\/li>\n<\/ul>\n<p>All three rely on your competence to get things remedied with as little hassle as possible. A policy should outline in detail with full staff transparency:<\/p>\n<ul>\n<li>High liability items with protocols to:\n<ul>\n<li>Prevent them from occurring<\/li>\n<li>Stem the damage if they do.<\/li>\n<\/ul>\n<\/li>\n<li>Updates to stay current with the latest laws and regulations.<\/li>\n<li>Reporting procedures and timelines vital to every possible breach.<\/li>\n<li>Employee participation in training programs online to maintain internal peace of mind.<\/li>\n<\/ul>\n<p>In the event of a breach, customer communication is crucial to present the problem, your resolution, and if necessary, company assistance or subsidy to make up for the real or potential loss. This will pay dividends because customers readily admit they\u2019ll \u201c<a href=\"https:\/\/www.salesforce.com\/resources\/research-reports\/state-of-the-connected-customer\/\" target=\"_blank\" rel=\"noopener\">forgive a business for errors, as long as CX is exemplary<\/a>&#8220;.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>All the things that go wrong on the cybersecurity front represent CX opportunities. Why? Because everything is relative. The less your competitors do, the better you look if you take the challenge seriously. The cybersecurity issues are here for the long haul, which implies that most are doing the minimum or not everything top-class protection calls for. So, for a company to enter the marketing arena with piqued cybersecurity consciousness is a meaningful attitude to gain one-upmanship fast. It requires a team effort to integrate new norms into the corporate culture. Sogolytics is at the cutting edge of these initiatives. <a href=\"https:\/\/www.sogolytics.com\/request-a-demo\/\" target=\"_blank\" rel=\"noopener\">Contact them<\/a> if you need assistance with any part of your EX or customer experience planning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last few years, businesses have faced dramatic technological challenges, thus impacting their marketing and strategic decisions. The pandemic put digital transformation at the forefront, making it a mad scramble for 68% of global businesses to keep up with consumers. The latter shifted shopping habits to online transacting in a massive way. The two most significant drivers in the emerging change were convenience on the one hand and cybersecurity risk on the other. As a result, brand image and customer retention walked a tightrope unless businesses could adjust and align themselves with these new opposing dynamics. One of the first things management had to deal with was multiple technology integrations and an almost overwhelming multiplication of remote working employees logging in from here, there, and everywhere. While in 2019 in-store shopping and browsing malls were an American tradition, 2021 ushered in the mobile device as the most popular consumer tool. With over 5.7 million apps on the App Store (Apple) and Google Play (Android) Play and 230 billion app downloads in 2021, the pace of commercial internet activity is spreading like wildfire. Unfortunately, it brings an ill wind &#8211; global ransomware attacks escalated by 62% in one year from 2019 to 2020. How bad are ransomware attacks? Most of us are under the impression that ransomware encrypts all one\u2019s data, effectively cutting off its access. While true, t It goes much further because cyber-criminals double-dip. They cripple the information banks and simultaneously sell the data to the highest bidder. [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":5050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,204],"tags":[198,351,702,703,545],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026 - Sogolytics Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity is more important than ever before as continued digital transformation sweeps businesses in a post-COVID world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026 - Sogolytics Blog\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is more important than ever before as continued digital transformation sweeps businesses in a post-COVID world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Sogolytics Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-03T14:36:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T06:54:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/window.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"487\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gordon Polovin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/\",\"name\":\"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026 - Sogolytics Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\"},\"datePublished\":\"2022-05-03T14:36:12+00:00\",\"dateModified\":\"2026-03-24T06:54:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285\"},\"description\":\"Cybersecurity is more important than ever before as continued digital transformation sweeps businesses in a post-COVID world.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/\",\"name\":\"Sogolytics Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285\",\"name\":\"Gordon Polovin\",\"description\":\"With an MBA from the University of the Witwatersrand in South Africa and work with clients and industries in the UK, Europe, Canada, and the US, Gordon's range of experiences make him well suited for the diverse topics and compelling conversations that Sogolytics clients value. Learn more about Gordon on his website.\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/author\/gpolovin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026 - Sogolytics Blog","description":"Cybersecurity is more important than ever before as continued digital transformation sweeps businesses in a post-COVID world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026 - Sogolytics Blog","og_description":"Cybersecurity is more important than ever before as continued digital transformation sweeps businesses in a post-COVID world.","og_url":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/","og_site_name":"Sogolytics Blog","article_published_time":"2022-05-03T14:36:12+00:00","article_modified_time":"2026-03-24T06:54:11+00:00","og_image":[{"width":487,"height":714,"url":"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/window.jpg","type":"image\/jpeg"}],"author":"Gordon Polovin","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/","url":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/","name":"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026 - Sogolytics Blog","isPartOf":{"@id":"https:\/\/www.sogolytics.com\/blog\/#website"},"datePublished":"2022-05-03T14:36:12+00:00","dateModified":"2026-03-24T06:54:11+00:00","author":{"@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285"},"description":"Cybersecurity is more important than ever before as continued digital transformation sweeps businesses in a post-COVID world.","breadcrumb":{"@id":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sogolytics.com\/blog\/customer-experience-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Aligning CX and Cybersecurity Improvements for Groundbreaking Strides in 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.sogolytics.com\/blog\/#website","url":"https:\/\/www.sogolytics.com\/blog\/","name":"Sogolytics Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285","name":"Gordon Polovin","description":"With an MBA from the University of the Witwatersrand in South Africa and work with clients and industries in the UK, Europe, Canada, and the US, Gordon's range of experiences make him well suited for the diverse topics and compelling conversations that Sogolytics clients value. Learn more about Gordon on his website.","url":"https:\/\/www.sogolytics.com\/blog\/author\/gpolovin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53558"}],"collection":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/comments?post=53558"}],"version-history":[{"count":12,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53558\/revisions"}],"predecessor-version":[{"id":66389,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53558\/revisions\/66389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media\/5050"}],"wp:attachment":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media?parent=53558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/categories?post=53558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/tags?post=53558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}