{"id":16848,"date":"2024-05-02T15:38:45","date_gmt":"2024-05-02T20:38:45","guid":{"rendered":"https:\/\/imegcorp.com.184-106-30-16.ncpr.com\/?post_type=library&p=16848"},"modified":"2024-05-06T15:20:18","modified_gmt":"2024-05-06T20:20:18","slug":"holistic-security-guide","status":"publish","type":"library","link":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/","title":{"rendered":"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe"},"content":{"rendered":"

Safety and security of people and assets are among the highest priorities for many organizations today. This executive guide by IMEG\u2019s Ryan Searles provides holistic security design strategies to help building owners ensure their organizations are resilient when a potential threat becomes reality.<\/p>\n","protected":false},"excerpt":{"rendered":"

Safety and security of people and assets are among the highest priorities for many organizations today. This executive guide by IMEG\u2019s Ryan Searles provides holistic security design strategies to help building owners ensure their organizations are resilient when a potential threat becomes reality.<\/p>\n","protected":false},"featured_media":16849,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"library_category":[5],"class_list":["post-16848","library","type-library","status-publish","has-post-thumbnail","hentry","library_category-guides"],"acf":[],"yoast_head":"\nHolistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe - IMEG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe - IMEG\" \/>\n<meta property=\"og:description\" content=\"Safety and security of people and assets are among the highest priorities for many organizations today. This executive guide by IMEG\u2019s Ryan Searles provides holistic security design strategies to help building owners ensure their organizations are resilient when a potential threat becomes reality.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"IMEG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IMEGcorp\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-06T20:20:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"872\" \/>\n\t<meta property=\"og:image:height\" content=\"1196\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@IMEGcor\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/\",\"url\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/\",\"name\":\"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe - IMEG\",\"isPartOf\":{\"@id\":\"https:\/\/imegcorp.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png\",\"datePublished\":\"2024-05-02T20:38:45+00:00\",\"dateModified\":\"2024-05-06T20:20:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#primaryimage\",\"url\":\"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png\",\"contentUrl\":\"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png\",\"width\":872,\"height\":1196},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/imegcorp.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide\",\"item\":\"https:\/\/imegcorp.com\/insights\/blog\/library_category\/guides\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/imegcorp.com\/#website\",\"url\":\"https:\/\/imegcorp.com\/\",\"name\":\"IMEG\",\"description\":\"Design Consulting Firm\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/imegcorp.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n","yoast_head_json":{"title":"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe - IMEG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/","og_locale":"en_US","og_type":"article","og_title":"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe - IMEG","og_description":"Safety and security of people and assets are among the highest priorities for many organizations today. This executive guide by IMEG\u2019s Ryan Searles provides holistic security design strategies to help building owners ensure their organizations are resilient when a potential threat becomes reality.","og_url":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/","og_site_name":"IMEG","article_publisher":"https:\/\/www.facebook.com\/IMEGcorp\/","article_modified_time":"2024-05-06T20:20:18+00:00","og_image":[{"width":872,"height":1196,"url":"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@IMEGcor","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/","url":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/","name":"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe - IMEG","isPartOf":{"@id":"https:\/\/imegcorp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#primaryimage"},"image":{"@id":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png","datePublished":"2024-05-02T20:38:45+00:00","dateModified":"2024-05-06T20:20:18+00:00","breadcrumb":{"@id":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/imegcorp.com\/library\/holistic-security-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#primaryimage","url":"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png","contentUrl":"https:\/\/imegcorp.com\/wp-content\/uploads\/2024\/05\/Screenshot-2024-04-30-at-9.12.15\u202fAM.png","width":872,"height":1196},{"@type":"BreadcrumbList","@id":"https:\/\/imegcorp.com\/library\/holistic-security-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/imegcorp.com\/"},{"@type":"ListItem","position":2,"name":"Guide","item":"https:\/\/imegcorp.com\/insights\/blog\/library_category\/guides\/"},{"@type":"ListItem","position":3,"name":"Holistic Security Design: Mitigate vulnerability, reduce risk, and keep people safe"}]},{"@type":"WebSite","@id":"https:\/\/imegcorp.com\/#website","url":"https:\/\/imegcorp.com\/","name":"IMEG","description":"Design Consulting Firm","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/imegcorp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/imegcorp.com\/wp-json\/wp\/v2\/library\/16848"}],"collection":[{"href":"https:\/\/imegcorp.com\/wp-json\/wp\/v2\/library"}],"about":[{"href":"https:\/\/imegcorp.com\/wp-json\/wp\/v2\/types\/library"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/imegcorp.com\/wp-json\/wp\/v2\/media\/16849"}],"wp:attachment":[{"href":"https:\/\/imegcorp.com\/wp-json\/wp\/v2\/media?parent=16848"}],"wp:term":[{"taxonomy":"library_category","embeddable":true,"href":"https:\/\/imegcorp.com\/wp-json\/wp\/v2\/library_category?post=16848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}