{"id":1236,"date":"2020-05-25T14:44:05","date_gmt":"2020-05-25T14:44:05","guid":{"rendered":"https:\/\/efaxstg.wpengine.com\/uk\/?p=1236"},"modified":"2024-09-11T15:45:54","modified_gmt":"2024-09-11T15:45:54","slug":"cyber-security-for-small-business","status":"publish","type":"post","link":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business","title":{"rendered":"Cyber Security for Small Business: 5 Powerful Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1236\" class=\"elementor elementor-1236\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba98a36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba98a36\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e02811c\" data-id=\"e02811c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a350ba elementor-widget elementor-widget-text-editor\" data-id=\"5a350ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security \u2014 otherwise known as online security \u2014 has become increasingly important to businesses. The question of whether or not it deserves attention is no longer relevant; the question instead is, how much? Cyber criminals, often referred to as hackers, are becoming ever-more advanced in their techniques. Attacks are highly sophisticated and can have a seriously powerful impact on anyone who falls victim to them.<\/p><p>Unfortunately, small businesses are seeing rising risk.<\/p><p>Small business cyber security has never been so necessary.\u00a0<a href=\"https:\/\/www.fsb.org.uk\/resources-page\/small-firms-suffer-close-to-10-000-cyber-attacks-daily.html\" target=\"_blank\" rel=\"noopener\">20% of small businesses<\/a>\u00a0in the UK are subject to attempts by hackers to infiltrate their systems in some way every single year. This infiltration might be through phishing attacks, malware threats, ransomware attack, or other kinds of cyber crime. The cost of a breach is staggering; billions are lost every year to cyber attacks, with SMEs paying out an average amount of \u00a31300 to repair damage to infrastructure caused by incidents like viruses or damage to hardware\/equipment.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dcd2cd0\" data-id=\"dcd2cd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a205a8 elementor-widget elementor-widget-image\" data-id=\"6a205a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"333\" src=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg\" class=\"attachment-large size-large wp-image-1256\" alt=\"Data protection and cyber security concept on the virtual screen\" srcset=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg 500w, https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business-300x200.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41f69d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41f69d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-84f2fb3\" data-id=\"84f2fb3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac50d25 elementor-widget elementor-widget-text-editor\" data-id=\"ac50d25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Over their lifetime, the majority of small businesses will see losses at the hands of cyber attacks. And it isn&#8217;t just the threat of cyber attacks that now has people worried.\u00a0<a href=\"https:\/\/gdpr-info.eu\/\">GDPR rules<\/a>\u00a0mean attacks like phishing emails could cost you thousands in reversing system damage \u2014 and a significant portion of your turnover as punishment for not assessing and managing risks to your computers and devices well enough.<\/p><p>However, business owners are not helpless. There are things your company can do to ward off cyber crime and stop criminals from accessing your networks and data. But what actions and measures can you take to protect digital assets? This article discusses our top five cyber security business tips that all small business owners should make sure they are following:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8ac6b elementor-widget elementor-widget-heading\" data-id=\"6e8ac6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Use UPDATED Anti-Virus Tools<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c79b2 elementor-widget elementor-widget-text-editor\" data-id=\"c1c79b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security for business can be taken care of by other businesses. Companies stake their living and reputation on building software like firewall security and anti-malware that aims to halt even the most advanced attacks in their tracks. The best products are often not cheap, and you must always make sure you have the latest version to ensure new threats are covered, but the costs are worth it. Be sure your small business pays for cyber security software that regularly updates and rolls out patches for the latest threats. It doesn&#8217;t mean it can catch everything, but using old cyber security software is asking for trouble.<\/p><p>Organisations that don&#8217;t follow this simple guidance become easy targets for cyber crime. If your small business doesn\u2019t have the latest anti-virus tools, hackers are more likely to invest their own time in taking down such an easy and vulnerable target. The deployment of advanced anti-virus tools results in diminished risk. It also supports your case in the event of a breach, as it demonstrates you were using the highest standards of security systems but were simply unable to prevent an attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e73304 elementor-widget elementor-widget-heading\" data-id=\"6e73304\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Use UPDATED Encryption Protocol\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97f7b7d elementor-widget elementor-widget-text-editor\" data-id=\"97f7b7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What happens if a hacker does gain access to your files, documents, or databases? If you lack security protocols, they may simply be able to look at your organisation&#8217;s important information without any barriers. You needn\u2019t let it be so easy, however. There are tools to help guard this information.<\/p><p>Data encryption allows your business to scramble information within a file, so it matches with symbols and corresponding letters and numbers. In effect, it turns something readable into something unreadable.<\/p><p>The only way to access the information now is to unscramble it using an encryption key. If cyber criminals do not have access to the key, they cannot view the data and it is protected. Investment in updated encryption protocol, such as advanced\u00a0<a href=\"https:\/\/ww2.efax.com\/uk\/blog\/difference-between-tls-ssl-encryption\/\">TLS encryption used by eFax<\/a>, secures data from hackers and improves cyber security. Make sure you are using updated platforms that routinely upgrade their software, though, as older updates can soon become obsolete as hackers learn how to bypass the encryption keys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5a477a elementor-widget elementor-widget-heading\" data-id=\"d5a477a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Backup Data to the Cloud<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3ff63d elementor-widget elementor-widget-text-editor\" data-id=\"b3ff63d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAn increasingly common cyber security threat faced by small business is ransomware. These attacks aim to take hostage of your data and files. If small business owners want them back, management must pay funds to the hacker. Failure to pay money in exchange for the release of the ransomed information means your small business data will be destroyed and lost.\n\nTo curb this nightmare situation, the best idea is obviously backups.\n\nThe problem then becomes what happens if a hacker also ransoms your backup, or you put it on a physical platform like an external drive and lose it? It sounds ridiculous, but\u00a0<a href=\"https:\/\/www.pcworld.com\/article\/481721\/companies_lose_2_5_million_from_missing_memory_sticks_study_says.html\">one study<\/a>\u00a0found millions of dollars are lost by businesses simply because USB drives are misplaced and never recovered. It&#8217;s a practice that has its own risk factors.\n\nThe answer to this form of cyber security threat is simple: Cloud data storage. Companies can now store their backups on external servers, managed by companies with expertise in cyber security for small businesses. This kind of server offers protection by being separate from your security network, which means even if a cyber security attack compromises your small business, the cloud facility remains safe and separate. eFax are strong supporters of cloud technology when it comes to improving cyber security for small business customers.\u00a0<a href=\"\/uk\/features\/cloud-storage\">All our services are managed on the cloud<\/a>, which means a document on your system subjected to ransomware attacks is protected \u2014 if you\u2019ve secured it on our server.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-855e3b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"855e3b8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0b57eef\" data-id=\"0b57eef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87cea41 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"87cea41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">No obligation. No set-up fees. No risk. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2a64ab elementor-align-center elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"d2a64ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/uk\/signup\/pricing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial <i class=\"fa fa-angle-double-right fa-lg\"><\/i><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24a5b6e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24a5b6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aca210b\" data-id=\"aca210b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24d9dec elementor-widget elementor-widget-heading\" data-id=\"24d9dec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Eliminate Risk-Factor Technology<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4092ccb elementor-widget elementor-widget-text-editor\" data-id=\"4092ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Certain technology can actually increase the risk of cyber security threats to your small business. The major culprits are surprising ones, like your employee\u2019s phones and laptops. When staff connect their devices to your system, they have the potential to compromise network security if their computer has been infiltrated by hackers already. They may also enter login information and passwords to work accounts through unprotected personal devices. Programs like keyloggers can record inputs and use them to access your networks. Even if your cyber security practices are excellent, problems with personal devices can lead to vulnerabilities from external sources.<\/p><p>Other threats to business information come from apps like message sharing services. These apps are known to have notoriously weak processes for protecting data, which means if an employee shares work-related information through the app, they are opening up your business to new methods of infiltration and data theft. Then you have systems like fax machines that introduce risk factors because they cannot defend against cyber security problems like more modern technology. To solve these problems, your business needs to do a few things: It needs to update weak technology to more suitable options. With fax, you can ditch the fax machine and move to\u00a0<a href=\"https:\/\/ww2.efax.com\/uk\/\">online fax with eFax<\/a>, which upgrades your security while enabling fax. You can also stop your employees using personal messaging apps to share data and instead find more secure business-focused resources.<\/p><p>Finally, ensure only approved devices access your network \u2014 those that have passed tests to ensure they have good anti-virus systems and protection methods are in place. If the device is not approved, it cannot access the business network and risk exposing it to threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8345a67 elementor-widget elementor-widget-heading\" data-id=\"8345a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. Enact Strict Password Policies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ce8863 elementor-widget elementor-widget-text-editor\" data-id=\"6ce8863\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It&#8217;s another process that might seem obvious, but so many business handbooks and training content programs fail to include a password policy as one of their most critical elements. The advice of any cybersecurity business will be that one of the most important ways to plan for better cyber security protection is to update your passwords regularly and consistently. Events of cyber security breaches due to weak or compromised passwords are exceptionally common.<\/p><p>As many as\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/how-much-passwords-cost\/\">81% of breaches<\/a>\u00a0are the result of password infiltration.<\/p><p>Password infiltration may be a major threat to everything from your website to social media profiles \u2014 as well as access to email accounts and any attachments they hold. But the fact is, it&#8217;s straightforward to perform reviews of password policies. You can achieve success immediately without the need for a budget. Simply introduce mandatory schemes that ensure passwords include a random term or random characters, and number combinations; you can even enforce types of symbols too. Then, make sure passwords are changed on set dates throughout the year. The addition of these simple but effective rules can help protect your site and network from many forms of cyber attack.<\/p><p>The route to better cyber security isn&#8217;t as difficult as you might have thought. You can make a range of changes right now. Apply the actions outlined on this list, taking all necessary steps to secure your business&#8217;s cyber world, and you&#8217;ll better protect your clients, your assets, and your future.<\/p><p>Be part of the cyber security revolution with eFax and improve the state of your cyber protection systems immediately. Get peace of mind when sending fax and improve document security with our encrypted service. Discover all the benefits of eFax today and\u00a0<a href=\"https:\/\/secure.efax.com\/uk\/signup\">sign up for your trial offer now!<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber security \u2014 otherwise known as online security \u2014 has become increasingly important to businesses. The question of whether or not it deserves attention is no longer relevant; the question instead is, how much? Cyber criminals, often referred to as hackers, are becoming ever-more advanced in their techniques. Attacks are highly sophisticated and can have a seriously powerful impact on anyone who falls victim to them.<\/p>\n","protected":false},"author":1,"featured_media":1256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security for Small Business - 5 Powerful Solutions | eFax<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security for Small Business - 5 Powerful Solutions | eFax\" \/>\n<meta property=\"og:description\" content=\"Cyber security \u2014 otherwise known as online security \u2014 has become increasingly important to businesses. The question of whether or not it deserves attention is no longer relevant; the question instead is, how much? Cyber criminals, often referred to as hackers, are becoming ever-more advanced in their techniques. Attacks are highly sophisticated and can have a seriously powerful impact on anyone who falls victim to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business\" \/>\n<meta property=\"og:site_name\" content=\"eFax UK\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T14:44:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-11T15:45:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Schweigert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Schweigert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business\"},\"author\":{\"name\":\"Scott Schweigert\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/person\\\/cb3188fe7d58cc629d3a2f5ce3b4f3ec\"},\"headline\":\"Cyber Security for Small Business: 5 Powerful Solutions\",\"datePublished\":\"2020-05-25T14:44:05+00:00\",\"dateModified\":\"2024-09-11T15:45:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business\"},\"wordCount\":1504,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/cyber-security-for-small-business.jpeg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business\",\"name\":\"Cyber Security for Small Business - 5 Powerful Solutions | eFax\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/cyber-security-for-small-business.jpeg\",\"datePublished\":\"2020-05-25T14:44:05+00:00\",\"dateModified\":\"2024-09-11T15:45:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#primaryimage\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/cyber-security-for-small-business.jpeg\",\"contentUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/cyber-security-for-small-business.jpeg\",\"width\":500,\"height\":333,\"caption\":\"Data protection and cyber security concept on the virtual screen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-for-small-business#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security for Small Business: 5 Powerful Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#website\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\",\"name\":\"eFax UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\",\"name\":\"eFax UK\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/01\\\/logo-efax.png\",\"contentUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/01\\\/logo-efax.png\",\"width\":2370,\"height\":749,\"caption\":\"eFax UK\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/person\\\/cb3188fe7d58cc629d3a2f5ce3b4f3ec\",\"name\":\"Scott Schweigert\",\"sameAs\":[\"https:\\\/\\\/ww2.efax.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security for Small Business - 5 Powerful Solutions | eFax","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business","og_locale":"en_US","og_type":"article","og_title":"Cyber Security for Small Business - 5 Powerful Solutions | eFax","og_description":"Cyber security \u2014 otherwise known as online security \u2014 has become increasingly important to businesses. The question of whether or not it deserves attention is no longer relevant; the question instead is, how much? Cyber criminals, often referred to as hackers, are becoming ever-more advanced in their techniques. Attacks are highly sophisticated and can have a seriously powerful impact on anyone who falls victim to them.","og_url":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business","og_site_name":"eFax UK","article_published_time":"2020-05-25T14:44:05+00:00","article_modified_time":"2024-09-11T15:45:54+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg","type":"image\/jpeg"}],"author":"Scott Schweigert","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Schweigert","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#article","isPartOf":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business"},"author":{"name":"Scott Schweigert","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/person\/cb3188fe7d58cc629d3a2f5ce3b4f3ec"},"headline":"Cyber Security for Small Business: 5 Powerful Solutions","datePublished":"2020-05-25T14:44:05+00:00","dateModified":"2024-09-11T15:45:54+00:00","mainEntityOfPage":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business"},"wordCount":1504,"commentCount":0,"publisher":{"@id":"https:\/\/ww2.efax.com\/uk\/#organization"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#primaryimage"},"thumbnailUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business","url":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business","name":"Cyber Security for Small Business - 5 Powerful Solutions | eFax","isPartOf":{"@id":"https:\/\/ww2.efax.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#primaryimage"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#primaryimage"},"thumbnailUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg","datePublished":"2020-05-25T14:44:05+00:00","dateModified":"2024-09-11T15:45:54+00:00","breadcrumb":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#primaryimage","url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg","contentUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/cyber-security-for-small-business.jpeg","width":500,"height":333,"caption":"Data protection and cyber security concept on the virtual screen."},{"@type":"BreadcrumbList","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-for-small-business#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ww2.efax.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Cyber Security for Small Business: 5 Powerful Solutions"}]},{"@type":"WebSite","@id":"https:\/\/ww2.efax.com\/uk\/#website","url":"https:\/\/ww2.efax.com\/uk\/","name":"eFax UK","description":"","publisher":{"@id":"https:\/\/ww2.efax.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ww2.efax.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ww2.efax.com\/uk\/#organization","name":"eFax UK","url":"https:\/\/ww2.efax.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/01\/logo-efax.png","contentUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/01\/logo-efax.png","width":2370,"height":749,"caption":"eFax UK"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/person\/cb3188fe7d58cc629d3a2f5ce3b4f3ec","name":"Scott Schweigert","sameAs":["https:\/\/ww2.efax.com"]}]}},"_links":{"self":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts\/1236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/comments?post=1236"}],"version-history":[{"count":0,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts\/1236\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/media\/1256"}],"wp:attachment":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/media?parent=1236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/categories?post=1236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/tags?post=1236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}