{"id":6823,"date":"2020-08-31T15:51:53","date_gmt":"2020-08-31T10:21:53","guid":{"rendered":"https:\/\/www.fusioninformatics.com\/blog\/?p=6823"},"modified":"2022-06-29T13:01:10","modified_gmt":"2022-06-29T07:31:10","slug":"cyber-security-challenges-faced-by-small-mid-sized-businesses","status":"publish","type":"post","link":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/","title":{"rendered":"Cyber Security Challenges Faced by Small &#038; Mid Sized Businesses"},"content":{"rendered":"\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"6826\" src=\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-1024x576.png\" alt=\"\" class=\"wp-image-6826\" srcset=\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-1024x576.png 1024w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-300x169.png 300w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-768x432.png 768w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-1536x864.png 1536w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-2048x1152.png 2048w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-380x214.png 380w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-800x450.png 800w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-1160x653.png 1160w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-760x428.png 760w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-1600x900.png 1600w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs-600x338.png 600w, https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png 2240w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p>The ongoing digital transformation of companies around the world has attracted one thing in common \u2013 <em>CYBER SECURITY<\/em>. It is imperative on the part of Small &amp; Medium Businesses (SMBs) to devise strategies to combat the so-called deadly Cyber Threats that have the capacity to throw many stakeholders out of business. <\/p>\n\n\n\n<p>Undoubtedly, malicious Malware, Ransomware, Phishing attacks, etc. are a few terminologies that should be taken cognizance of . Cyber Security measures duly adopted, in a timely manner, are the need of the hour to stay safe and sound from the business perspective.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cyber Attack &amp; SMBs<\/strong><\/h3>\n\n\n\n<p>As an owner of a small start-up or as a founding partner of some medium enterprises, the one significant thing that can put you in a vulnerable state is the CYBER<em> SECURITY.<\/em> In fact, <strong><a href=\"https:\/\/www.fusioninformatics.com\/blog\/top-challenges-of-app-development-head-in-smbs\/\" data-type=\"URL\" data-id=\"https:\/\/www.fusioninformatics.com\/blog\/top-challenges-of-app-development-head-in-smbs\/\" target=\"_blank\" rel=\"noreferrer noopener\">SMBs<\/a><\/strong> are the ones to have been a favorite target of cyber fraud because of the lack of sophisticated protections in place. <\/p>\n\n\n\n<p><em>If you have not incorporated a multi-layered approach to data security, you are at a higher risk. According to the Verizon Data Breach Investigations Report &#8211; 2019, <\/em>half of the cyber victims have been Small Businesses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Remote Work and the Related Risks<\/strong><\/h3>\n\n\n\n<p>As you see, the work scenario has drastically shifted from a usual <em>physical office <\/em>to a work-from-home model. Your workforce has completely undergone remote! Virtual meetings, virtual collaborations, and virtual conferences have now become the primary modes of communication. <\/p>\n\n\n\n<p>So, have you really done the groundwork? Have you identified the gaps in your remote infrastructure? If \u2018<em>Yes<\/em>\u2019, then well, if \u2018<em>No<\/em>\u2019, then you are at risk. You got to fix the gaps right away else the repercussion might harm your business more than you could imagine.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Read More:<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><a href=\"https:\/\/www.fusioninformatics.com\/blog\/60-cybersecurity-predictions-for-2022\/\" data-type=\"URL\" data-id=\"https:\/\/www.fusioninformatics.com\/blog\/60-cybersecurity-predictions-for-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">60 Cybersecurity Predictions For 2022<\/a><\/p><cite>Like death and taxes, there are only two safe predictions about cybersecurity in 2022:<\/cite><\/blockquote><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Challenges Before You<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><em>Phishing &amp; Spear Phishing<\/em><\/strong> <strong><em>Threats<\/em><\/strong><\/li><\/ul>\n\n\n\n<p>These are a\nmajor form of Cyber <em>attack<\/em>. Both are\ndesigned to embroil you into performing specific actions like clicking malicious\nlinks, email, or attachment. Doing this, you may end up <em>downloading malware<\/em> on to your device, or you are redirected to a fraudulent<em> website<\/em> where you are asked to give\nyour personal data such as name, address, phone number, social security number\nthat could be misused by hackers.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><em>Phishing emails<\/em><\/strong> are those\nemails sent to a large, random number of recipients. It means, not only you are\nthe recipient of this email but many people like you. Whatever, if any of you\nclick it, <em>malware<\/em> enters your system <em>and you know the consequences!<\/em><\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <strong><em>Spear Phishing<\/em><\/strong> is an individual target, just like you! Only you are the recipient here. You may get an email from someone familiar to you, your colleague, your friend, family members, but it is a fake address. You trust, open it and <em>LO<\/em>, you have allowed a dangerous\u00a0 <em>Ransomware<\/em>\u00a0 to\u00a0 spread across your company\u2019s network\u00a0 eventually stealing and locking your data. Unless you pay a ransom, you cannot unlock or restore access.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Its\u2019 The Humans, Not The Machines<\/strong><\/li><\/ul>\n\n\n\n<p>Without any malicious intent, your employees may mistakenly end up with some kind of data breach, as they have privileged access to your company\u2019s data. This leads to cyber attacks. Yes, it\u2019s the <em>humans<\/em> and not the <em>machines,<\/em> who pose the biggest cyber security threat o your business. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>IoT &amp; BYOD system<\/strong><\/li><\/ul>\n\n\n\n<p>You provide a Wi-Fi enabled coffee machines, people wearing smart watches and this makes you vulnerable in terms of laxity wherein cyber criminals can enter your main network<strong>. <\/strong>You have a common network for all! <strong><em>Bring-Your-Own-Device (BYOD)<\/em><\/strong> system can lead to data theft. <\/p>\n\n\n\n<p>Sharing company\u2019s data using unsecure mobile devices or laptop is risky because they may contain malicious applications which can bypass security and access your company\u2019s network.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>SQL Injection<\/strong><\/li><\/ul>\n\n\n\n<p>Does your web application use an <strong><a href=\"https:\/\/www.tutorialspoint.com\/sql\/index.htm\" data-type=\"URL\" data-id=\"https:\/\/www.tutorialspoint.com\/sql\/index.htm\" target=\"_blank\" rel=\"noreferrer noopener\">SQL<\/a><\/strong> database like Oracle, MySQL, SQL servers, or any other? If you are vulnerable, attackers can use <em>SQL injection<\/em> to attack your webpage\/application and retrieve the content of your SQL database and execute their own malicious SQL statements there by adding, modifying, deleting records. <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Malware threat<\/strong><\/li><\/ul>\n\n\n\n<p>Malware is just\nany malicious software that has the ability to destroy your business by posing\nthreat to data security. Ransomware, Adware, Spyware, are a few names you\nshould be aware of.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Adopting\nCloud -Based Infrastructures <\/strong><\/li><\/ul>\n\n\n\n<p>You have a choice between <em>on-premises &amp; <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.fusioninformatics.com\/services\/application\/cloud-app-development.html\" data-type=\"URL\" data-id=\"https:\/\/www.fusioninformatics.com\/services\/application\/cloud-app-development.html\" target=\"_blank\">Cloud-based solutions<\/a><\/strong><\/em> viz., software, storage, server, security, <strong><a href=\"https:\/\/www.fusioninformatics.com\/blog\/how-to-create-unbeatable-enterprise-mobility-strategy\/\" data-type=\"URL\" data-id=\"https:\/\/www.fusioninformatics.com\/blog\/how-to-create-unbeatable-enterprise-mobility-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\">ERPs<\/a><\/strong> and backups. Cloud may help you access high-end technologies and other resources without paying the premium prices. <\/p>\n\n\n\n<p>However, you rely on the servers which are thousands of miles away from your business set up. What would happen if internet crashes? Service disruptions are there and your data may not be available 24*7. <\/p>\n\n\n\n<p>Also, you are trusting an outsider with your private data. Unless you bank on high players in this industry who have strict security protocols, you may end up losing your crucial data to cyber criminals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to Tackle Cyber Threats<\/strong><\/h3>\n\n\n\n<p>If you think you can protect your business from cyber threat\nby just installing a single software, you are wrong. &nbsp;The three major security layers from macro\nperspective are the <em>Policy, Technology and\nTraining<\/em>.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Your policy layer may read as \u2018<em>Be careful to open phishing emails\u2019<\/em>. Allow only specific URLs in your Whitelist. <\/li><li>The policy layer is supported by technology layer like configuring Firewall entry, exit filtering rules. Also, sub-layer like reverse proxy, allowing specific ports, etc. should be properly undertaken. <\/li><li>Adopt the appropriate Anti-Virus tools and keep upgrading frequently. <\/li><li>Database access must be restricted <em>as per role basis<\/em>.<\/li><li>Application development must be cyber compliant.<\/li><li>Educate your employees by giving them training in the basic Cyber Securities knowhow- the <\/li><\/ul>\n\n\n\n<p>Cyber security should be taken as a shared responsibility. It is now a mandatory requirement to sustain your business. Cyber criminals are constantly trying to steal your data-sensitive details like the IP address, Usernames, passwords, credit card numbers, and telephone numbers, which are on hackers\u2019 <em>wish lists<\/em>. <em>Be alert, be safe!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"The ongoing digital transformation of companies around the world has attracted one thing in common \u2013 CYBER SECURITY.&hellip;\n","protected":false},"author":2,"featured_media":6826,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1096],"tags":[2203,2204],"class_list":{"0":"post-6823","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-cybersecurity","9":"tag-cybersecurity-in-business"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security issues Faced by Small &amp; Mid Sized Businesses<\/title>\n<meta name=\"description\" content=\"Small and medium businesses must develop plans to tackle the so-called lethal Cyber Threats, which have the potential to put many stakeholders out of business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security issues Faced by Small &amp; Mid Sized Businesses\" \/>\n<meta property=\"og:description\" content=\"Small and medium businesses must develop plans to tackle the so-called lethal Cyber Threats, which have the potential to put many stakeholders out of business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"AI and IoT application development company\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/fusioninformatics\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/fusioninformatics\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-31T10:21:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T07:31:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ashesh Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/fusionlnfo\" \/>\n<meta name=\"twitter:site\" content=\"@fusionlnfo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ashesh Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\"},\"author\":{\"name\":\"Ashesh Shah\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/a4578e849dde57729f32e775734e7bc5\"},\"headline\":\"Cyber Security Challenges Faced by Small &#038; Mid Sized Businesses\",\"datePublished\":\"2020-08-31T10:21:53+00:00\",\"dateModified\":\"2022-06-29T07:31:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\"},\"wordCount\":1023,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png\",\"keywords\":[\"cybersecurity\",\"Cybersecurity in Business\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\",\"name\":\"Cyber Security issues Faced by Small & Mid Sized Businesses\",\"isPartOf\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png\",\"datePublished\":\"2020-08-31T10:21:53+00:00\",\"dateModified\":\"2022-06-29T07:31:10+00:00\",\"description\":\"Small and medium businesses must develop plans to tackle the so-called lethal Cyber Threats, which have the potential to put many stakeholders out of business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png\",\"contentUrl\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png\",\"width\":2240,\"height\":1260,\"caption\":\"Cyber-Security-Challenges-Faced-by-SMB\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fusioninformatics.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Challenges Faced by Small &#038; Mid Sized Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#website\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/\",\"name\":\"AI, ML and IoT application development company | Fusion Informatics\",\"description\":\"Let&#039;s Transform Business for Tomorrow\",\"publisher\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fusioninformatics.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#organization\",\"name\":\"Fusion Informatics Limited\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg\",\"contentUrl\":\"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg\",\"width\":400,\"height\":198,\"caption\":\"Fusion Informatics Limited\"},\"image\":{\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/fusioninformatics\/\",\"https:\/\/x.com\/fusionlnfo\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/a4578e849dde57729f32e775734e7bc5\",\"name\":\"Ashesh Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7230673f5e6606ace36afea4f41d7fbda87366a0cb5a0820ea12441ff086187d?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7230673f5e6606ace36afea4f41d7fbda87366a0cb5a0820ea12441ff086187d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7230673f5e6606ace36afea4f41d7fbda87366a0cb5a0820ea12441ff086187d?s=96&d=mm&r=g\",\"caption\":\"Ashesh Shah\"},\"sameAs\":[\"https:\/\/www.fusioninformatics.com\/\",\"https:\/\/www.facebook.com\/fusioninformatics\/\",\"https:\/\/www.linkedin.com\/company\/fusion-informatics-pvt.-ltd.\",\"https:\/\/x.com\/https:\/\/twitter.com\/fusionlnfo\",\"https:\/\/www.youtube.com\/c\/asheshshah1976\"],\"url\":\"https:\/\/www.fusioninformatics.com\/blog\/author\/sreeni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security issues Faced by Small & Mid Sized Businesses","description":"Small and medium businesses must develop plans to tackle the so-called lethal Cyber Threats, which have the potential to put many stakeholders out of business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security issues Faced by Small & Mid Sized Businesses","og_description":"Small and medium businesses must develop plans to tackle the so-called lethal Cyber Threats, which have the potential to put many stakeholders out of business.","og_url":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/","og_site_name":"AI and IoT application development company","article_publisher":"http:\/\/facebook.com\/fusioninformatics\/","article_author":"https:\/\/www.facebook.com\/fusioninformatics\/","article_published_time":"2020-08-31T10:21:53+00:00","article_modified_time":"2022-06-29T07:31:10+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png","type":"image\/png"}],"author":"Ashesh Shah","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/fusionlnfo","twitter_site":"@fusionlnfo","twitter_misc":{"Written by":"Ashesh Shah","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#article","isPartOf":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/"},"author":{"name":"Ashesh Shah","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/a4578e849dde57729f32e775734e7bc5"},"headline":"Cyber Security Challenges Faced by Small &#038; Mid Sized Businesses","datePublished":"2020-08-31T10:21:53+00:00","dateModified":"2022-06-29T07:31:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/"},"wordCount":1023,"commentCount":0,"publisher":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png","keywords":["cybersecurity","Cybersecurity in Business"],"articleSection":["Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/","url":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/","name":"Cyber Security issues Faced by Small & Mid Sized Businesses","isPartOf":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png","datePublished":"2020-08-31T10:21:53+00:00","dateModified":"2022-06-29T07:31:10+00:00","description":"Small and medium businesses must develop plans to tackle the so-called lethal Cyber Threats, which have the potential to put many stakeholders out of business.","breadcrumb":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#primaryimage","url":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png","contentUrl":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2020\/08\/Cyber-Security-Challenges-Faced-by-SMBs.png","width":2240,"height":1260,"caption":"Cyber-Security-Challenges-Faced-by-SMB"},{"@type":"BreadcrumbList","@id":"https:\/\/www.fusioninformatics.com\/blog\/cyber-security-challenges-faced-by-small-mid-sized-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fusioninformatics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Challenges Faced by Small &#038; Mid Sized Businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.fusioninformatics.com\/blog\/#website","url":"https:\/\/www.fusioninformatics.com\/blog\/","name":"AI, ML and IoT application development company | Fusion Informatics","description":"Let&#039;s Transform Business for Tomorrow","publisher":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fusioninformatics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fusioninformatics.com\/blog\/#organization","name":"Fusion Informatics Limited","url":"https:\/\/www.fusioninformatics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg","contentUrl":"https:\/\/www.fusioninformatics.com\/blog\/wp-content\/uploads\/2019\/04\/fusion-informatics-logo-copy.jpg","width":400,"height":198,"caption":"Fusion Informatics Limited"},"image":{"@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/fusioninformatics\/","https:\/\/x.com\/fusionlnfo"]},{"@type":"Person","@id":"https:\/\/www.fusioninformatics.com\/blog\/#\/schema\/person\/a4578e849dde57729f32e775734e7bc5","name":"Ashesh Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7230673f5e6606ace36afea4f41d7fbda87366a0cb5a0820ea12441ff086187d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7230673f5e6606ace36afea4f41d7fbda87366a0cb5a0820ea12441ff086187d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7230673f5e6606ace36afea4f41d7fbda87366a0cb5a0820ea12441ff086187d?s=96&d=mm&r=g","caption":"Ashesh Shah"},"sameAs":["https:\/\/www.fusioninformatics.com\/","https:\/\/www.facebook.com\/fusioninformatics\/","https:\/\/www.linkedin.com\/company\/fusion-informatics-pvt.-ltd.","https:\/\/x.com\/https:\/\/twitter.com\/fusionlnfo","https:\/\/www.youtube.com\/c\/asheshshah1976"],"url":"https:\/\/www.fusioninformatics.com\/blog\/author\/sreeni\/"}]}},"_links":{"self":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts\/6823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/comments?post=6823"}],"version-history":[{"count":5,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts\/6823\/revisions"}],"predecessor-version":[{"id":8835,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/posts\/6823\/revisions\/8835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/media\/6826"}],"wp:attachment":[{"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/media?parent=6823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/categories?post=6823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fusioninformatics.com\/blog\/wp-json\/wp\/v2\/tags?post=6823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}