{"id":58921,"date":"2022-10-06T09:31:16","date_gmt":"2022-10-06T01:31:16","guid":{"rendered":"https:\/\/version-2.com\/?p=58921"},"modified":"2022-10-07T11:11:10","modified_gmt":"2022-10-07T03:11:10","slug":"6-common-cyberattacks-that-threaten-smes","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/10\/6-common-cyberattacks-that-threaten-smes\/","title":{"rendered":"6 Common Cyberattacks That Threaten SMEs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"58921\" class=\"elementor elementor-58921\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>October is Cybersecurity Awareness Month, and this year\u2019s theme is See Yourself in Cyber, which focuses on the individual\u2019s role in cybersecurity. This month, the JumpCloud blog will focus on helping you empower everyone in your organization to do their part regarding cybersecurity. Tune in throughout the month for more cybersecurity content written specifically for IT professionals and MSPs.<\/em><\/p><p>When we think of cyberattacks, we tend to envision the biggest and most disastrous ones \u2014 ones that involve well-known companies, expose tons of important data, and cause some serious fallout and public mistrust. While these attacks are real and dangerous, they\u2019re not the only ones out there.\u00a0<\/p><p>The reality is that cyber attacks affect businesses of all sizes and in all industries. Sometimes, our focus on the big ones can eclipse the less flashy ones that are just as dangerous to small and medium-sized enterprises (SMEs). In fact, a 2021 survey found that <a href=\"https:\/\/advisorsmith.com\/data\/small-business-cybersecurity-statistics\/#:~:text=Small%20Business%20Cybersecurity%20Statistics%3A%2042%25%20attacked%20in%20last%20year%20%E2%80%93%20AdvisorSmith\" target=\"_blank\" rel=\"noreferrer noopener\">over 42% of small business respondents<\/a> had experienced a cyber attack within the last year.<\/p><p>Mounting a viable defense starts with understanding what you\u2019re up against \u2014 and even understanding the basics of common threats and defense measures can go a long way. The following are six of the most common attack vectors that can hit SMEs.\u00a0<\/p><h2>1. Ransomware\u00a0<\/h2><p>Because the largest ransomware attacks tend to dominate news cycles, many people don\u2019t realize that ransomware attacks on SMEs are common as well. In fact, <a href=\"https:\/\/www.crowdstrike.com\/resources\/white-papers\/ransomware-realities-for-small-and-medium-sized-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>50-70% of ransomware attacks<\/strong><\/a><strong> are aimed at small businesses.<\/strong><\/p><h3>What Ransomware Looks Like for SMEs<\/h3><p>Ransomware generally follows the same basic principles in attacks of all sizes: adversaries seize and lock a company\u2019s data or assets and promise to return them upon payment of a ransom. For large enterprises, these ransoms can reach into the millions. For SMEs, they are often smaller \u2014 <a href=\"https:\/\/www.backblaze.com\/blog\/the-true-cost-of-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">ransoms as low as $10,000<\/a> are common. While this may sound like a silver lining for SMEs, there\u2019s a darker motive at play: adversaries know SMEs will pay them.\u00a0\u00a0<\/p><p>For established enterprises with decades of built-up resources, six-figure ransoms and the downtime associated with an attack are painful, but not often a death sentence. For SMEs with tighter resources, this isn\u2019t always the case \u2014 the downtime and loss of data access alone can be crippling for a tightly-run SME. To adversaries, this means SMEs will fight to get their data back \u2014 so they demand a \u201creasonable\u201d ransom and can expect with near-certainty that the SME will pay it. According to research, <a href=\"https:\/\/www.capterra.co.uk\/blog\/2648\/how-prepared-are-smes-for-ransomware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">more than half <\/a>of them do.\u00a0<\/p><h3>The Ramifications<\/h3><p>The ramifications of a data breach to your employees, customers, partners, and reputation are grave: <a href=\"https:\/\/www.centrify.com\/media\/4772757\/ponemon_data_breach_impact_study_uk.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">a Ponemon study<\/a> found that 65% of consumers whose data was breached lost trust in the company that experienced the breach.\u00a0<\/p><p>What\u2019s more, paying the ransom doesn\u2019t guarantee that your data hasn\u2019t been compromised or shared when under the adversary\u2019s control. Of the 59% of SMEs who said they had paid a ransom in a survey, <a href=\"https:\/\/www.capterra.co.uk\/blog\/2648\/how-prepared-are-smes-for-ransomware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">only 23%<\/a> got all their data back.<\/p><p>In fact, paying up can endanger your organization further: it tells hackers that you are willing and able to pay ransoms to reclaim your data. And now that they\u2019re familiar with your defenses and architecture, they\u2019ll have an easier time attacking you again. Unfortunately, repeat attacks are highly likely \u2014 either from the same criminal organization, or from another organization that the attackers sold your information to.\u00a0<\/p><h2>2. Supply-Chain Attacks\u00a0<\/h2><p>Most of us are familiar with supply chain attacks, where an infection starts with a large corporation and spreads as it comes into contact with other businesses through the supply chain. And while we\u2019re likely to hear about supply-chain attacks on large businesses, news sources don\u2019t always report on their trickle-down effects on smaller businesses in the supply chain.<\/p><h3>How Supply-Chain Attacks Affect SMEs<\/h3><p>In supply-chain attacks, SMEs aren\u2019t usually direct targets, but rather casualties resulting from a larger breach. Thus, large supply-chain attacks have ramifications on many of the target organization\u2019s partners, customers, or vendors. In <a href=\"https:\/\/www.csoonline.com\/article\/3626703\/the-kaseya-ransomware-attack-a-timeline.html\" target=\"_blank\" rel=\"noreferrer noopener\">REvil\u2019s attack on Kaseya\u2019s VSA software<\/a>, for example, many of those impacted were SMEs that used the product. In another example, the famous <a href=\"https:\/\/www.nytimes.com\/2021\/01\/02\/us\/politics\/russian-hacking-government.html\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds breach<\/a> was originally believed to have affected a few dozen organizations. It actually impacted over 250.<\/p><h2>3. Phishing and Its Variants<\/h2><p>Some of the most basic and low-effort tactics remain common \u2014 and effective \u2014 infiltration methods. <strong>Phishing remains <\/strong><a href=\"https:\/\/www.crowdstrike.com\/resources\/white-papers\/ransomware-realities-for-small-and-medium-sized-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>one of the top three threats<\/strong><\/a><strong> SMEs face<\/strong>, even despite increasing organizational awareness around it.\u00a0<\/p><p>The reason phishing is still so common is two-fold:\u00a0<\/p><ol><li><strong>It is effective for adversaries.<\/strong> From the cybercriminal\u2019s point of view, phishing is relatively easy to deploy, and it often yields lucrative results. It takes few resources and minimal skill to launch phishing attacks, and yet they continue to dupe employees into sharing credentials, network access, and other sensitive (and, for cybercriminals, profitable) information and assets.\u00a0<\/li><\/ol><ol start=\"2\"><li><strong>It preys on human error. <\/strong>Unlike many other attack vectors that leverage vulnerabilities in systems, phishing uses social engineering to take advantage of human nature (and human error) to gain initial entry. It only takes one mistake to allow an attack to take hold \u2014 and the average organization has a <a href=\"https:\/\/www.knowbe4.com\/press\/new-knowbe4-benchmarking-report-finds-37.9-of-untrained-end-users-will-fail-a-phishing-test\" target=\"_blank\" rel=\"noreferrer noopener\">37.9% phishing test fail rate<\/a>.<\/li><\/ol><h3>Targeted Phishing in SMEs<\/h3><p>Cybercriminals have refined tactics to mount more targeted and precise attacks with different <a href=\"https:\/\/jumpcloud.com\/blog\/phishing\">types of phishing<\/a>. Spear-phishing, for example, involves background research to convincingly target individuals rather than bulk-sending a list to a group of recipients. This personalization and specific targeting makes spear-phishing attempts harder to spot \u2014 like the <a href=\"https:\/\/www.bbb.org\/article\/scams\/26554-bbb-scam-alert-thats-not-your-boss-texting\" target=\"_blank\" rel=\"noreferrer noopener\">popular scam<\/a> that involves posing as the target\u2019s boss in a text or email. These messages often use conversational language and use the names of the target and the boss, which can make them quite convincing.\u00a0<\/p><p>Some adversaries take this type of attack a step further with whaling, which uses spear-phishing tactics to target company executives. Because executives have extensive access to systems and data, whaling is particularly popular \u2014 especially with SMEs, where scarce resources could hamper their ability to adequately train leaders on security and phishing awareness and best practices.\u00a0<\/p><h2>4. Software Vulnerability Exploits\u00a0<\/h2><p>Leveraging software vulnerabilities is a common way to gain access into an organization\u2019s systems. Often, exploited vulnerabilities are known and even have patches available. In fact, many of the top exploited vulnerabilities were found years ago \u2014 for example, a <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-209a\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Office vulnerability found in 2017<\/a> continues to plague businesses that haven\u2019t kept up with their patches. In a Ponemon survey, <a href=\"https:\/\/www.servicenow.com\/content\/dam\/servicenow-assets\/public\/en-us\/doc-type\/resource-center\/analyst-report\/ponemon-state-of-vulnerability-response.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">60% of respondents<\/a> who had experienced a breach said it could have occurred through a known vulnerability that had a patch available, but the organization hadn\u2019t applied it.\u00a0<\/p><h3>Why SMEs Are Vulnerable<\/h3><p>Routine patching is a critical basic cyber hygiene activity, and it is highly effective at blocking this type of attack. However, large-scale organizations are more likely to have formal <a href=\"https:\/\/jumpcloud.com\/blog\/jumpcloud-patch-management\">patch management<\/a> solutions in place than SMEs, which can make SMEs an easier target. In a <a href=\"https:\/\/jumpcloud.com\/\/wp-content\/uploads\/2022\/06\/202205-EB-SME_IT_Trends_Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2022 JumpCloud survey<\/a>, only about half of SME respondents said they were confident that their organization\u2019s patch management strategy was sufficient to protect against known vulnerabilities.\u00a0<\/p><h2>5. Account Takeover<\/h2><p>As businesses move to the cloud and dispersed infrastructure becomes the norm, identity has increasingly come to define the new perimeter. Because identity permeates every element of the infrastructure, it has become a common infiltration point. In fact, <strong>the number of password-stealing attacks on SMEs around the world <\/strong><a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2022_small-businesses-are-still-in-danger-facing-an-increasing-number-of-attacks-in-2022\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>increased by almost 25%<\/strong><\/a><strong> from 2021 to 2022<\/strong>, and <a href=\"https:\/\/www.crowdstrike.com\/global-threat-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">nearly 80% of attacks<\/a> leverage identity to compromise credentials.\u00a0<\/p><h3>How ATO Attacks Work<\/h3><p>In account takeover (ATO) attacks, adversaries gain access to the network by taking over a user\u2019s account. Account access can be gained through various means, including password-stealing ware, social engineering, and using (often, by purchasing) the credentials of already-breached accounts. Once the adversary has taken over the account, they can access resources and move around the network under the guise of a legitimate user. This makes account takeovers difficult to detect.\u00a0<\/p><h2>6. Advanced Persistent Threats<\/h2><p>SMEs that work with large enterprises may be more susceptible to advanced persistent threats (APTs), which are sophisticated attacks carried out stealthily over an extended period of time. APTs typically consist of infiltration, <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-lateral-movement\">lateral movement<\/a> toward targeted data or assets, and exfiltration. APTs can start from any ingress point, and can enter through methods as simple as a phishing attack or stolen password.<\/p><p>For example, an adversary could gain the credentials of an employee with base-level permissions through a phishing scam, then take over the account to analyze the network and gather permissions, access and store the target data, and finally exfiltrate it to sell for profit.<\/p><p>APTs are harder to detect in <a href=\"https:\/\/jumpcloud.com\/resources\/it-sprawl-problem\" target=\"_blank\" rel=\"noreferrer noopener\">sprawled IT environments<\/a>, which are common in SMEs that have grown quickly. IT sprawl limits the ability to fully carry telemetry data from one element to another, which makes infiltration and lateral movement hard to detect.\u00a0<\/p><h2>Shoring Up SME Security\u00a0<\/h2><p>Because cybersecurity attacks on SME attacks don\u2019t always make headlines, SMEs often underestimate their vulnerability and underinvest in security. However, adversaries have something to gain from just about any business; SMEs face many of the same threats that enterprises do.\u00a0<\/p><p>The attacks above are some of the most common, but SMEs face a multitude of threats via many different vectors. And while it\u2019s impossible for anyone to achieve 100% immunity from threats, it\u2019s possible for SMEs to develop a strong, reliable security program that deflects most attacks.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"57539\" class=\"elementor elementor-57539\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About JumpCloud<\/strong><br \/>At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>October is Cybersecurity Awareness Month, and this year [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1016,488,61],"tags":[489,1017],"class_list":["post-58921","post","type-post","status-publish","format-standard","hentry","category-jumpcloud","category-488","category-press-release","tag-489","tag-jumpcloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Common Cyberattacks That Threaten SMEs - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Common Cyberattacks That Threaten SMEs - Version 2\" \/>\n<meta property=\"og:description\" content=\"October is Cybersecurity Awareness Month, and this year [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-06T01:31:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-07T03:11:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/common-sme-cyberattacks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/6-common-cyberattacks-that-threaten-smes\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"6 Common Cyberattacks That Threaten SMEs\",\"datePublished\":\"2022-10-06T01:31:16+00:00\",\"dateModified\":\"2022-10-07T03:11:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/6-common-cyberattacks-that-threaten-smes\\\/\"},\"wordCount\":1572,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"2022\",\"JumpCloud\"],\"articleSection\":[\"JumpCloud\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/10\\\/6-common-cyberattacks-that-threaten-smes\\\/\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/common-sme-cyberattacks\",\"name\":\"6 Common Cyberattacks That Threaten SMEs - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2022-10-06T01:31:16+00:00\",\"dateModified\":\"2022-10-07T03:11:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/common-sme-cyberattacks#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/common-sme-cyberattacks\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/common-sme-cyberattacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Common Cyberattacks That Threaten SMEs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Common Cyberattacks That Threaten SMEs - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks","og_locale":"zh_HK","og_type":"article","og_title":"6 Common Cyberattacks That Threaten SMEs - Version 2","og_description":"October is Cybersecurity Awareness Month, and this year [&hellip;]","og_url":"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks","og_site_name":"Version 2","article_published_time":"2022-10-06T01:31:16+00:00","article_modified_time":"2022-10-07T03:11:10+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/10\/6-common-cyberattacks-that-threaten-smes\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"6 Common Cyberattacks That Threaten SMEs","datePublished":"2022-10-06T01:31:16+00:00","dateModified":"2022-10-07T03:11:10+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/10\/6-common-cyberattacks-that-threaten-smes\/"},"wordCount":1572,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["2022","JumpCloud"],"articleSection":["JumpCloud","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/10\/6-common-cyberattacks-that-threaten-smes\/","url":"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks","name":"6 Common Cyberattacks That Threaten SMEs - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2022-10-06T01:31:16+00:00","dateModified":"2022-10-07T03:11:10+00:00","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"6 Common Cyberattacks That Threaten SMEs"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fkl","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/58921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=58921"}],"version-history":[{"count":9,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/58921\/revisions"}],"predecessor-version":[{"id":59565,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/58921\/revisions\/59565"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=58921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=58921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=58921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}