{"id":64596,"date":"2023-03-20T11:44:17","date_gmt":"2023-03-20T03:44:17","guid":{"rendered":"https:\/\/version-2.com\/?p=64596"},"modified":"2024-09-13T16:31:24","modified_gmt":"2024-09-13T08:31:24","slug":"small-business-cybersecurity-the-importance-of-proactive-safety-measures","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/03\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\/","title":{"rendered":"Small business cybersecurity: the importance of proactive safety measures"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"64596\" class=\"elementor elementor-64596\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Small businesses are on the front line of cybersecurity. <\/strong>At any moment, cyberattacks could extract confidential data, damage network infrastructure, or even cause total business failure.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The risks are real.<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/articles\/small-business-cyber-security-and-data-breaches\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> According to Verizon<\/a>, 60% of small businesses that suffer cyber attacks go out of business within 6 months. Healthcare company<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.hipaajournal.com\/wood-ranch-medical-announces-permanent-closure-due-to-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> Wood Ranch Medical<\/a> is a great example. The small operator was bankrupted by a 2019 ransomware attack that prevented access to sensitive patient records.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Despite cases like Wood Ranch Medical, <strong>most small businesses fail to allocate enough time and resources to counter cyber-threats<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Don\u2019t fall into that trap. Instead,<strong> follow this guide to implement robust cybersecurity measures<\/strong>. With our help, you can counter the most dangerous cyber threats faced by SMBs. Let&#8217;s find out more.<\/p>\n\n<h2 id=\"understanding-the-threat-landscape-for-smbs\" class=\"Heading Heading-h2 text-dark-blue\">Understanding the threat landscape for SMBs<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">The first thing to understand is that<strong> small businesses face a diverse range of cyber threats. <\/strong>Any one of them could ruin your reputation and lead to regulatory fines.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Attackers can lurk for months and monitor traffic. They can steal sensitive client data or lock it away until victims pay a ransom. Or they could cause technical damage, ruining network infrastructure.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">SMBs can&#8217;t afford these consequences. But how do you handle critical cybersecurity threats?<\/p>\n\n<div class=\"MuiBox-root jss209 jss199\"><\/div>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Prevention starts from awareness<\/strong> of the most common threats and how they fit into cybersecurity for small businesses.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">Types of cyber attacks<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Here&#8217;s a list of the most common types of online threats.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/j9vVYHfsDge61kyScxWnL\/0abec1faef0db816ea4c7cd4742b1439\/Types_of_Cyber_Attacks_1400x826.png?w=1400&amp;h=826&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"826\" \/>\n\n<picture>All of them threaten small businesses.<\/picture>\n\n<\/div>\n<h4 class=\"Heading Heading-h4 text-dark-blue\">1. Phishing<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Phishers use social engineering techniques to fool small business employees. With a few pieces of information, attackers can easily convince time-poor workers to make dangerous decisions. This might involve emails pretending to come from colleagues or trusted third parties. The links in these emails lead to malicious sites or initiate malware downloads.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">2. Ransomware<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Ransomware locks down high-value data and demands a ransom from targets. If attackers control these targets, they can demand a high price to restore access. And small businesses are not always able to pay.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">3. Spyware<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Spyware tracks data flowing through network assets and sends this information to controllers outside the targeted organization. Some spyware is legitimate. For instance, advertisers sometimes use it to deliver targeted ads. But the majority of spyware is malicious and linked to data extraction.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">4. Viruses<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Viruses spread between devices and their effects range from relatively light disruption to complete system failure. Some viruses remain dormant for long periods. Others set to work immediately. In all cases, small businesses need updated and effective antivirus software to defend their perimeter.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">5. Malware<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Malware extends beyond ransomware and spyware. For example, businesses might encounter trojans or worms that stay below the radar until activated. Bots are also common. These agents latch onto devices and create \u201cswarms\u201d to launch wide-scale attacks.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">6. Man-in-the-middle attacks<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Man-in-the-middle attacks target insecure wifi connections. Attackers can intervene between remote access workers and the corporate network. If the connection is unencrypted, hackers can harvest information from corporate network traffic and steal confidential data.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">7. SQL injection<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">SQL injection uses SQL code to request access to valuable databases. This generally occurs via web forms connected to SQL databases. For small businesses, this could include employee gateways or payment forms. Securing web assets is absolutely essential.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">8. DDoS attacks<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Distributed denial-of-service attacks involve botnets featuring hundreds or thousands of agents. Botnets direct massive amounts of traffic at their target with the aim of overwhelming networks. Larger organizations may have the resources to absorb DDoS floods. But with<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/qratorlabs.medium.com\/q3-2022-ddos-attacks-and-bgp-incidents-8e0f5dc96776\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> attacks averaging 5.17 Gbps<\/a>, small business websites can easily fold under the pressure.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">9. Zero-day exploits<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Zero-day exploits target recently documented software vulnerabilities. In these situations, vendors probably haven\u2019t developed patches, exposing users to opportunist attackers. Small businesses rely on anti-virus, communications, and data management tools in everyday work. But any of these tools can become vulnerable overnight.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">10. DNS tunneling<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">DNS tunneling injects malicious code into networks via DNS queries. This allows hackers to seize control of local DNS servers. When that happens, a small business can lose control of its website and network assets. DNS tunneling exploits insecure firewalls, but SMBs often retain legacy firewall products. That\u2019s a bad idea when successful attacks can ruin reputations in seconds.<\/p>\n\n<h4 class=\"Heading Heading-h4 text-dark-blue\">11. XSS attacks<\/h4>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">XSS (or Cross Site Scripting) injects malicious code via web applications and browser-side scripts. XSS attacks allow attackers to change website designs, adding undesirable content. They can launch malicious software, infecting business networks and customer devices. It allows hackers to spoof legitimate identities by hijacking cookies. All of that is bad news for SMBs.<\/p>\n\n<h2 id=\"cybersecurity-best-practices-for-small-businesses\" class=\"Heading Heading-h2 text-dark-blue\">Cybersecurity best practices for small businesses<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Small businesses need cybersecurity strategies that deal with critical threats. But how can you implement an effective strategy with a small business budget?<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">SMBs lack the resources of corporations. But <strong>cybersecurity for small businesses must still protect sensitive data and network resources<\/strong>. Here are some best practices to follow that balance cost and efficiency.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">1. Implement a strong password policy<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Employees should only use strong passwords <\/strong>to log into your company network. Weak passwords are easy to guess or brute force. This makes mounting attacks much simpler.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Require employees to use 10-15 character passwords. Demand a mixture of upper and lower case letters, numbers, and symbols. Enterprise-wide <strong>password management tools <\/strong>can help. They make storing and changing passwords easier, eliminating much of the risk of human error.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Combining password hygiene with anti-virus software and firewall protection is also good practice. That way, you can filter potential threats and authenticate users effectively.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">2. Schedule regular backups<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Cyber-attacks can lead to the deletion of data or system failures that compromise important workflows. This makes it vital to <strong>back up high-priority data regularly. <\/strong>Use secure cloud services or external locations away from your core network.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">3. Train employees in cybersecurity basics<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Digital cybersecurity controls rely upon human knowledge and behavior. The way employees act when encountering cyber threats is a crucial part of a small business security setup. That\u2019s why it\u2019s vital to focus on what is known as<strong> the human firewall.<\/strong><\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Strengthen the human firewall by <strong>training employees to spot phishing emails and malicious links.<\/strong> They must know the company password and access management policies. Remote workers should also understand how to connect securely, as well as the risks of using an insecure public wi-fi network.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">4. Use threat prevention measures to reduce cyber attack risks<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Minimize cyber security risks by adding <strong>antivirus software and malware scanning tools<\/strong> to your network traffic. Use VPNs to encrypt data and anonymize user IP addresses. Create allowlists to screen user identities, admitting only authorized addresses.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Take action to secure your local network as well. You may need to <strong>upgrade your wifi<\/strong> network from WEP to WPA2. Check that your router SSID is anonymized and consider <strong>upgrading your firewall <\/strong>to add features like Deep Packet Inspection.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">5. Implement protection for sensitive information<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Encrypt high-value data<\/strong> like personnel records and customer financial information. If you rely on SaaS or PaaS tools, use any cloud data protection tools provided by your Cloud Service Provider.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Use privileges management to limit freedom within network boundaries.<\/strong> Confidential data should only be available to users who need it in their working tasks. That way, when a data breach occurs, attackers will struggle to access and extract data.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Minimize the number of users with administrative privileges<\/strong>. Avoid giving single users the power to make fundamental network changes.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Consider using <strong>Data Loss Prevention<\/strong> tools as well. These tools track the location and state of important data. They block data transfers to unauthorized devices and log potentially dangerous access requests. If you handle high-risk, high-value data, DLP could be a sound investment.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">6. Create an Incident Response Plan<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Small businesses must prepare for cybersecurity incidents. Aim to restore normal working conditions as soon as possible while protecting data and neutralizing active threats.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Carry out a risk assessment <\/strong>for the threats detailed above. Include an assessment of where critical data resides. Assign an individual with the responsibility to protect important data. And connect every resource with risk-reduction strategies.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Create a recovery plan for all critical assets<\/strong>. This should include security scans to identify any malware or virus infections. Document access requests during the security alerts and determine whether data loss has occurred.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>SMBs need to be ready to act as soon as possible when cybersecurity issues arise<\/strong>. Be proactive and make sure everyone is aware of incident response procedures.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">7. Focus on secure remote access<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Many small businesses allow employees to work from home. Sales representatives may also travel widely but require access to central resources. In both cases, <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/features\/smart-remote-access\/\">remote access<\/a> creates cybersecurity risks.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Require strong passwords and MFA for remote connections. Consider requiring employees to use an approved VPN service when working from home. Staff may store confidential information on smartphones, creating additional risk. <strong>Enforce strict data protection policies for mobile devices<\/strong>.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Make sure your cyber security tools cover both on-premises and cloud resources.<\/strong> Remote workers can bypass central network routers if they connect to <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/saas-security\/\">SaaS<\/a> apps. This can create security gaps and compromise visibility.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">8. Manage third parties securely<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Small businesses rely on third-party vendors, but partners can act as vectors for cyber attackers. For example, CRM providers may not encrypt data securely, putting client data at risk. Virus checkers or low-quality VPNs may transmit spyware.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Check all third parties and ensure they have rock-solid security policies<\/strong>. Trust nobody, and always ask for security assurances if you aren\u2019t sure.<\/p>\n\n<h3 class=\"Heading Heading-h3 text-dark-blue\">9. Enable 2FA or MFA<\/h3>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Small companies need to secure the network edge with robust authentication procedures. <\/strong>2-factor authentication or multi-factor authentication are the best options here. These tools request multiple identification factors whenever users connect to network assets. This makes it far harder to obtain access illegitimately.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">If MFA is too burdensome for employees, consider using it only for administrator accounts. Or try user-friendly 2FA procedures such as fingerprint scanning. Balance user experience and security. But always go beyond simple password protection.<\/p>\n\n<h2 id=\"ensure-your-companys-sensitive-information-is-protected\" class=\"Heading Heading-h2 text-dark-blue\">Ensure your company\u2019s sensitive information is protected<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Data protection is the most important cybersecurity goal for small businesses<\/strong>. Data losses lead to huge reputational damage and regulatory penalties. It\u2019s critically important to secure data and show evidence that confidential information is protected. Basic data protection measures include:<\/p>\n\n<ul class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Encrypting<\/strong> important databases<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Filtering access <\/strong>with privileges management<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Strengthening malware and firewall protection<\/strong>.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Using Data Loss Prevention tools<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Educating employees about data security policies.<\/p>\n<\/li>\n<\/ul>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Beyond those actions, it\u2019s also a good idea to <strong>check your data security posture<\/strong>. The Cybersecurity &amp; Infrastructure Security Agency (CISA) provides a <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/cyber-hygiene-services\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">free \u201ccyber hygiene\u201d check<\/a>. This is a good starting point. It should help you find vulnerabilities and identify areas of improvement.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Penetration testing<\/strong> also mimics the activities of hackers, providing a good measure of your data security setup. Robust testing will dramatically reduce the risk of data breaches in the future.<\/p>\n\n<h2 id=\"cybersecurity-checklist-for-small-businesses\" class=\"Heading Heading-h2 text-dark-blue\">Cybersecurity checklist for small businesses<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Small businesses should have a comprehensive cybersecurity plan that guides their efforts.<\/p>\n\n<div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\">\n\n<img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5uzv8ndtjgW6Z4NI4PH0EG\/fac2b357ffb7079b4bc36933b85a1245\/Cybersecurity_checklist_for_small_businesses_990.png?w=1400&amp;h=990&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"990\" \/>\n\n<picture>Follow this checklist to make sure you include the right security measures:<\/picture>\n\n<\/div>\n<ol class=\"list\">\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Data protection<\/strong> \u2013 Apply encryption, DLP, and privileges management. Prioritize high-value data.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Threat reduction<\/strong> \u2013 Put in place virus and malware scanning, and firewall protection.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Incident response<\/strong> \u2013 Ensure rapid restoration of critical assets with full security checks.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Backups<\/strong> \u2013 Regularly back up important data. Use secure cloud or external storage solutions.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>2FA or Multi-Factor Authentication<\/strong> \u2013 Apply robust authentication to ensure legitimate access.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Education<\/strong> \u2013 Provide full security training for all employees with a focus on phishing risks.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Remote access<\/strong> \u2013 Ensure safe, user-friendly remote access. Enforce strong mobile device security.<\/p>\n<\/li>\n \t<li class=\"ml-4 pl-4\">\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Strong passwords<\/strong> \u2013 Use strong, regularly changed passwords. Install password management tools to automate procedures.<\/p>\n<\/li>\n<\/ol>\n<h2 id=\"how-can-nordlayer-help\" class=\"Heading Heading-h2 text-dark-blue\">How can NordLayer help?<\/h2>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Nordlayer is the ideal partner to help small businesses secure their data. We offer a variety of solutions to strengthen network defenses and manage employee identities.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Device Posture Checks<\/strong> make working from home safer. Nordlayer\u2019s systems assess every device connection. If devices fail to meet security rules, posture checks deny access. Users will instantly know about access requests from unknown or compromised devices.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">IP allowlisting lets you exclude unauthorized addresses at the network edge. <strong>IAM solutions<\/strong> use multifactor authentication and Single Sign On to admit verified identities. <strong>Virtual Private Gateways<\/strong> anonymize and encrypt data, adding more remote access protection. And our <strong>Cloud VPN<\/strong> services lock down hard-to-secure cloud assets that small businesses rely on.<\/p>\n<p class=\"my-4 blog-paragraph text-still-dark-blue\">Nordlayer makes achieving compliance goals easier and provides a safer customer experience. To find out more, get in touch with <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/en\/contact-sales\/\">our sales team<\/a> today.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Small businesses are on the front line of cybersecurity [&hellip;]<\/p>","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[974,1076,1132],"class_list":["post-64596","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Small business cybersecurity: the importance of proactive safety measures - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Small business cybersecurity: the importance of proactive safety measures - Version 2\" \/>\n<meta property=\"og:description\" content=\"Small businesses are on the front line of cybersecurity [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-20T03:44:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Small business cybersecurity: the importance of proactive safety measures\",\"datePublished\":\"2023-03-20T03:44:17+00:00\",\"dateModified\":\"2024-09-13T08:31:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\\\/\"},\"wordCount\":2070,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6aJv3oMT7pHZOGCGAw2yxQ\\\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\\\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/\",\"name\":\"Small business cybersecurity: the importance of proactive safety measures - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6aJv3oMT7pHZOGCGAw2yxQ\\\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\\\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-03-20T03:44:17+00:00\",\"dateModified\":\"2024-09-13T08:31:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6aJv3oMT7pHZOGCGAw2yxQ\\\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\\\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6aJv3oMT7pHZOGCGAw2yxQ\\\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\\\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/small-business-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Small business cybersecurity: the importance of proactive safety measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Small business cybersecurity: the importance of proactive safety measures - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Small business cybersecurity: the importance of proactive safety measures - Version 2","og_description":"Small businesses are on the front line of cybersecurity [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/","og_site_name":"Version 2","article_published_time":"2023-03-20T03:44:17+00:00","article_modified_time":"2024-09-13T08:31:24+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"versionpan","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/03\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Small business cybersecurity: the importance of proactive safety measures","datePublished":"2023-03-20T03:44:17+00:00","dateModified":"2024-09-13T08:31:24+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/03\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\/"},"wordCount":2070,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/03\/small-business-cybersecurity-the-importance-of-proactive-safety-measures\/","url":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/","name":"Small business cybersecurity: the importance of proactive safety measures - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-03-20T03:44:17+00:00","dateModified":"2024-09-13T08:31:24+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/6aJv3oMT7pHZOGCGAw2yxQ\/ad5002b40f3d0e85fc7bcdec7ff8d7a9\/Small_Business_Cybersecurity_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/small-business-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Small business cybersecurity: the importance of proactive safety measures"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/en\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gNS","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/64596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=64596"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/64596\/revisions"}],"predecessor-version":[{"id":64600,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/64596\/revisions\/64600"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=64596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=64596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=64596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}