{"id":2595,"date":"2015-03-24T06:06:10","date_gmt":"2015-03-24T10:06:10","guid":{"rendered":"http:\/\/chrisgrundemann.com\/?p=2595"},"modified":"2021-07-08T11:17:31","modified_gmt":"2021-07-08T15:17:31","slug":"ipv6-security-myth-10-deploying-ipv6-is-too-risky","status":"publish","type":"post","link":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/","title":{"rendered":"IPv6 Security Myth #10: Deploying IPv6 is Too Risky"},"content":{"rendered":"<p>After a quick break to catch our breath (and read all those IPv6 Security Resources), it\u2019s now time to look at our tenth and final IPv6 Security Myth. In many ways this myth is the most important myth to bust. Let\u2019s take a look at why:<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: Deploying IPv6 Makes My Network Less Secure<\/strong><br \/>\n<strong> Reality: Deploying IPv6 Now is the Best Way to Ensure Ongoing Network Security<\/strong><\/p>\n<p>I can hear you asking \u201cBut what about all those security challenges we identified in the other myths?\u201d To really dig into this, let\u2019s walk through the first 9 IPv6 Security Myths and see what turns up:<\/p>\n<p>In <a title=\"IPv6 Security Myth #1: I\u2019m Not Running IPv6 so I Don\u2019t Have to Worry\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-1-im-running-ipv6-dont-worry\/\">Myth #1<\/a> we learned that IPv6 traffic often shows up on networks long before that network has deployed IPv6. Once you know that \u201cYour Devices are Using IPv6\u201d and \u201cYour Users are Using IPv6\u201d it\u2019s easy to see that the best way to mitigate risk on your network is by turning on and protecting IPv6 now. You can\u2019t protect against what you can\u2019t see.<\/p>\n<p><a title=\"IPv6 Security Myth #2: IPv6 Has Security Designed In\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-2-ipv6-security-designed\/\">Myth #2<\/a> may have scared many of you, and it should have! Network security is all about mitigating risks. Knowing where the risks are hiding is the first step. Any good security expert must be a little paranoid, always seeking out potential sources of harm. We must also take a step back from these risks and look at the big picture though. When we do this, it is clear that Myth #2 provides a set of risks that must be considered. However a careful examination will show that none of them are serious enough to prevent the deployment of IPv6. The bottom line remains that securing an IPv6 host or IPv6 network does not happen automagically. It takes the same forethought and diligence required to secure any valuable asset. Hopefully the challenges outlined in Myth #2 give you a head start in that process.<\/p>\n<p><a title=\"IPv6 Security Myth #3: No IPv6 NAT Means Less Security\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-3-ipv6-nat-means-security\/\">Myth #3<\/a> showed us that deploying IPv6 allows the removal of NAT devices, which is a good thing as long as they are replaced by stateful firewalls. NAT is not a security feature and removing NAT from your network will NOT make it less secure. In fact, it may actually increase your overall security.<\/p>\n<p>In <a title=\"IPv6 Security Myth #4: IPv6 Networks are Too Big to Scan\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-4-ipv6-networks-too-big-scan\/\">Myth #4<\/a> we discovered that IPv6 networks are not, in fact, too big to scan. Of course, we also learned several ways to keep them much harder to scan than comparable IPv4 networks. In the end, the larger address space remains an advantage for IPv6.<\/p>\n<p><a title=\"IPv6 Security Myth #5: Privacy Addresses Fix Everything!\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-5-privacy-addresses-fix-everything\/\">Myth #5<\/a> showed us that while \u201cprivacy addresses\u201d are not perfect, there are several options for maintaining user privacy in IPv6 networks. This is another area where attention should be paid but full-on paranoia is likely unwarranted.<\/p>\n<p><a title=\"IPv6 Security Myth #6: IPv6 is Too New to be Attacked\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-6-ipv6-too-new-attacked\/\">Myth #6<\/a> introduced us to some existing IPv6 security tool-kits and repositories of IPv6 bugs and vulnerabilities. The great news here is that they are all publicly available. This means that you can use them to probe, test, and harden your own network before the bad guys get their chance!<\/p>\n<p>In <a title=\"IPv6 Security Myth #7: 96 More Bits, No Magic\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-7-96-more-bits-no-magic\/\">Myth #7<\/a> we examined many of the fundamental differences between IPv4 and IPv6 from a security perspective. As I\u2019m sure you\u2019ll agree, there is a need for training and awareness of these differences in order to maintain network security when deploying IPv6. What I think is just as clear is that none of these changes make IPv6 any less secure than legacy IPv4 networks.<\/p>\n<p><a title=\"IPv6 Security Myth #8: It Supports IPv6\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-8-it-supports-ipv6\/\">Myth #8<\/a> is all about ensuring that you get what you pay for. The need to document, verify, and test network security gear is not new. You must treat IPv6 like you would any other new technology being deployed on your network. Ensure that all new equipment meets your specific needs, and remember to trust but verify when it comes to IPv6 support.<\/p>\n<p>Finally, in <a title=\"IPv6 Security Myth #9: There Aren\u2019t Any IPv6 Security Resources\" href=\"http:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-9-there-arent-any-ipv6-security-resources\/\">Myth #9<\/a> we learned that we\u2019re not alone! There are IPv6 security resources out there for us to reference and learn from. When it comes to network security, knowing the risks ahead of time may make it scarier, but it also makes it safer to deploy.<\/p>\n<p>In summary, these nine IPv6 security myths have given us the tools and information we need to securely deploy IPv6. So what about today\u2019s myth?<\/p>\n<p style=\"padding-left: 30px;\"><strong>Myth: Deploying IPv6 is Too Risky<\/strong><br \/>\n<strong> Reality: Deploying IPv6 Now Lowers Your Risk<\/strong><\/p>\n<p>The bottom line here is that the sooner you deploy IPv6, the more secure your network will be in the long run. From giving you visibility into the IPv6 that may already be on your network, to giving you time to find and mitigate IPv6 risks, to providing staff more time for training and experience; all indicators suggest that your best bet is to <a title=\"Where do I start?\" href=\"http:\/\/www.internetsociety.org\/deploy360\/start\/\">deploy IPv6 today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After a quick break to catch our breath (and read <a href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\"> &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,11,12,24,27],"tags":[56,323,331,358,359,360,773,368,772,750,770,370,771,769,673],"class_list":["post-2595","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-ipv6","category-ipv6-security-myths","category-security","category-technology","tag-addresses","tag-information","tag-internet","tag-ipv4","tag-ipv4-and-ipv6","tag-ipv6","tag-ipv6-networks","tag-ipv6-security","tag-ipv6-security-myth","tag-ipv6-security-myths","tag-ipv6-security-resources","tag-ipv6-support","tag-network-security","tag-security-resources","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IPv6 Security Myth #10: Deploying IPv6 is Too Risky ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPv6 Security Myth #10: Deploying IPv6 is Too Risky ~ Chris Grundemann\" \/>\n<meta property=\"og:description\" content=\"After a quick break to catch our breath (and read ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/chris.grundemann\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-24T10:06:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T15:17:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"654\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"~Chris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/ChrisGrundemann\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"~Chris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\"},\"author\":{\"name\":\"~Chris\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f\"},\"headline\":\"IPv6 Security Myth #10: Deploying IPv6 is Too Risky\",\"datePublished\":\"2015-03-24T10:06:10+00:00\",\"dateModified\":\"2021-07-08T15:17:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\"},\"wordCount\":787,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"keywords\":[\"Addresses\",\"information\",\"Internet\",\"IPv4\",\"IPv4 and IPv6\",\"IPv6\",\"IPv6 networks\",\"IPv6 security\",\"IPv6 Security Myth\",\"IPv6 Security Myths\",\"IPv6 Security Resources\",\"IPv6 support\",\"Network security\",\"security resources\",\"Technology\"],\"articleSection\":[\"Internet\",\"IPv6\",\"IPv6 Security Myths\",\"Security\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\",\"url\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\",\"name\":\"IPv6 Security Myth #10: Deploying IPv6 is Too Risky ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"datePublished\":\"2015-03-24T10:06:10+00:00\",\"dateModified\":\"2021-07-08T15:17:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg\",\"width\":654,\"height\":255,\"caption\":\"Security in an IPv6 World\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/chrisgrundemann.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IPv6 Security Myths\",\"item\":\"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IPv6 Security Myth #10: Deploying IPv6 is Too Risky\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/chrisgrundemann.com\/#website\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/chrisgrundemann.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/chrisgrundemann.com\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\/\/chrisgrundemann.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ChrisGrundemann\",\"https:\/\/www.linkedin.com\/company\/grundemann\",\"https:\/\/www.linkedin.com\/in\/cgrundemann\/\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f\",\"name\":\"~Chris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg\",\"caption\":\"~Chris\"},\"description\":\"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...\",\"sameAs\":[\"https:\/\/chrisgrundemann.com\",\"https:\/\/www.facebook.com\/chris.grundemann\",\"http:\/\/instagram.com\/chrisgrundemann\",\"www.linkedin.com\/in\/cgrundemann\",\"https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann\",\"https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IPv6 Security Myth #10: Deploying IPv6 is Too Risky ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/","og_locale":"en_US","og_type":"article","og_title":"IPv6 Security Myth #10: Deploying IPv6 is Too Risky ~ Chris Grundemann","og_description":"After a quick break to catch our breath (and read ...","og_url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/","og_site_name":"Chris Grundemann","article_author":"https:\/\/www.facebook.com\/chris.grundemann","article_published_time":"2015-03-24T10:06:10+00:00","article_modified_time":"2021-07-08T15:17:31+00:00","og_image":[{"width":654,"height":255,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","type":"image\/jpeg"}],"author":"~Chris","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/ChrisGrundemann","twitter_site":"@ChrisGrundemann","twitter_misc":{"Written by":"~Chris","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#article","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/"},"author":{"name":"~Chris","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f"},"headline":"IPv6 Security Myth #10: Deploying IPv6 is Too Risky","datePublished":"2015-03-24T10:06:10+00:00","dateModified":"2021-07-08T15:17:31+00:00","mainEntityOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/"},"wordCount":787,"commentCount":0,"publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","keywords":["Addresses","information","Internet","IPv4","IPv4 and IPv6","IPv6","IPv6 networks","IPv6 security","IPv6 Security Myth","IPv6 Security Myths","IPv6 Security Resources","IPv6 support","Network security","security resources","Technology"],"articleSection":["Internet","IPv6","IPv6 Security Myths","Security","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/","url":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/","name":"IPv6 Security Myth #10: Deploying IPv6 is Too Risky ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","datePublished":"2015-03-24T10:06:10+00:00","dateModified":"2021-07-08T15:17:31+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","width":654,"height":255,"caption":"Security in an IPv6 World"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/2015\/ipv6-security-myth-10-deploying-ipv6-is-too-risky\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"IPv6","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/"},{"@type":"ListItem","position":3,"name":"IPv6 Security Myths","item":"https:\/\/chrisgrundemann.com\/index.php\/category\/ipv6\/ipv6-security-myths\/"},{"@type":"ListItem","position":4,"name":"IPv6 Security Myth #10: Deploying IPv6 is Too Risky"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]},{"@type":"Person","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/person\/16a6af2797267c7d91f29876d5a0870f","name":"~Chris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbff57968626714c5bdb525f740f898c0d1e506a63c350b6a3341e57337e7fc7?s=96&d=mm&r=pg","caption":"~Chris"},"description":"Creative|Technologist. Curious. Boisterous. Autotelic Autodidact. Heretic. Hacker. Rider of Boards. Writer of Words. ...Traveler of Time...","sameAs":["https:\/\/chrisgrundemann.com","https:\/\/www.facebook.com\/chris.grundemann","http:\/\/instagram.com\/chrisgrundemann","www.linkedin.com\/in\/cgrundemann","https:\/\/x.com\/https:\/\/twitter.com\/ChrisGrundemann","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_featured_media_url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2015\/01\/IPv6SecurityMyths.jpg","jetpack_shortlink":"https:\/\/wp.me\/ps8ie-FR","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=2595"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/posts\/2595\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/2390"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=2595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/categories?post=2595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/tags?post=2595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}