{"id":3526,"date":"2024-11-11T12:00:00","date_gmt":"2024-11-11T12:00:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=3526"},"modified":"2024-11-01T15:06:15","modified_gmt":"2024-11-01T15:06:15","slug":"cyber-security-basics-every-smb-should-know","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/","title":{"rendered":"7 Cyber Security Basics Every SMB Should Know"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Stop flying blind. Nail the top SMB cyber security basics in less than five minutes, even if you&#8217;re an absolute beginner\u2026<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.connectwise.com\/resources\/smb-research-2024\">78% of SMBs<\/a> are concerned that a cyber attack could put them out of business. Do you feel the same but have no idea where to start to protect your data, customers, and often cloud-based systems from the bad guys?<\/p>\n\n\n\n<p>We\u2019ve compiled the most important cyber security basics you need to know, jargon-free. Ready to go from a cyber security rookie to a cyber-aware business owner? Let&#8217;s go.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Security for SMBs \u2014 Is It Necessary?<\/h2>\n\n\n\n<p>In a word: ABSOLUTELY. In 2023 alone, <a href=\"https:\/\/www.eset.com\/apac\/cybersecurity-for-smb-report-2024\/\">73% of Asia Pacific-based SMBs<\/a> were victims of at least one cybersecurity incident. Many of those incidents (44%) were caused by poor security measures. In the U.S., nearly <a href=\"https:\/\/www.lastpass.com\/resources\/reports\/smb-commercial-cybersecurity-report\">47% of <\/a><a href=\"https:\/\/www.lastpass.com\/resources\/reports\/smb-commercial-cybersecurity-report\">SMBs<\/a> were breached due to a stolen password.<\/p>\n\n\n\n<p>Such incidents cost money. In its 2024 Data Breach Investigations Report (DBIR), Verizon\u2019s data indicated that median losses for SMBs affected by ransomware or extortion-related crimes were<a href=\"https:\/\/www.verizon.com\/business\/resources\/infographics\/2024-dbir-smb-infographic.pdf\"> $46,000<\/a>. That\u2019s an awful lot for cash-strapped small businesses.<\/p>\n\n\n\n<p>Cybersecurity is something SMBs can&#8217;t do without. But why would the bad guys target such small prey when they could cash in more by breaching into corporations?<\/p>\n\n\n\n<p>Because they&#8217;re easier to catch for several reasons, namely they&#8217;re often not as well protected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7 Cybersecurity Fundamentals You Can\u2019t Do Without<\/h2>\n\n\n\n<p>OK, I guess you\u2019ve got the picture. Now, let\u2019s get down to business and learn seven golden rules your SMB cybersecurity basics handbook should include.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Security Basic #1 \u2014 Employees Are Your First Line of Defense<\/h3>\n\n\n\n<p>In the digital era, Verizon\u2019s 2024 DBIR reports that <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">6<\/a><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">8% of breaches<\/a> are caused by human-related factors. These are issues that frequent cybersecurity basic training can help prevent. For example, an employee<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>downloading a malware-infected attachment,<\/li>\n\n\n\n<li>revealing sensitive information on social media, or<\/li>\n\n\n\n<li>being tricked into <a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/singaporean-authorities-and-interpol-recover-40-million-from-massive-bec-scam\/\">transferring funds to a threat actor\u2019s bank account<\/a>.<\/li>\n<\/ul>\n\n\n\n<p>By the way, training doesn&#8217;t have to be boring. A <a href=\"https:\/\/www.youtube.com\/results?search_query=password+security+fun+training\">quick search on YouTube<\/a> shows how password security can become a fun topic if presented the right way to engage your audience. Learn how to unleash your creativity, much like how The Defence Works did in this short, entertaining video about phishing:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Defence Works Sketches   Phishing Emails in Real Life   Funny Security Awareness Training\" width=\"940\" height=\"529\" src=\"https:\/\/www.youtube.com\/embed\/wcXw3q91L7M?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Set up small contests (e.g., spot the phishing email) or use <a href=\"https:\/\/awarego.com\/7-ways-to-create-gamified-cybersecurity-training\/\">gamification<\/a> to make training interactive. The more you engage your employees and other network users, the more likely they will remember the lessons learned and apply them in their roles.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Security Basic #2 \u2014 Strong Passwords &amp; Access Controls Keep Your Data Safe<\/h3>\n\n\n\n<p>Are you still requiring your users to utilize passwords that are at least eight characters long? Sure, that meets the absolute base requirements, but it\u2019s time to take it up a notch. The National Institute of Standards and Technology (NIST) updated its <a href=\"https:\/\/pages.nist.gov\/800-63-4\/sp800-63b.html\">password guidelines in 2024<\/a> to recommend a minimum password length of at least 15 characters.<a href=\"https:\/\/pages.nist.gov\/800-63-4\/sp800-63b.html\"><\/a><\/p>\n\n\n\n<p>That\u2019s nearly twice as long as its eight-character minimum requirement. But there\u2019s a reason behind it, which I think you\u2019ll understand with our next example. How long do you think ChatGPT takes to crack an eight-character password comprised of numbers, lowercase and uppercase letters, and symbols? According to data from Hive Systems, it can take as little as <a href=\"https:\/\/www.hivesystems.com\/blog\/are-your-passwords-in-the-green\"><em>one second<\/em><\/a> (depending on the hardware and hashing functions used).<\/p>\n\n\n\n<p>Implementing and enforcing a strong <a href=\"https:\/\/sectigostore.com\/blog\/12-password-policy-best-practices-to-adopt-today\/\">password policy<\/a> helps you secure the following against attackers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Applications,<\/li>\n\n\n\n<li>Systems, and<\/li>\n\n\n\n<li>Data (including the passwords themselves)<\/li>\n<\/ul>\n\n\n\n<p>Beware: A <a href=\"https:\/\/www.thesslstore.com\/blog\/password-security-what-your-organization-needs-to-know\/\"><\/a><a href=\"https:\/\/www.thesslstore.com\/blog\/password-security-what-your-organization-needs-to-know\/\">passwor<\/a>d is only considered strong<a href=\"https:\/\/www.thesslstore.com\/blog\/password-security-what-your-organization-needs-to-know\/\"><\/a> and effective if it\u2019s unique (i.e., only used once). Reusing the same password for multiple sites or applications leaves it vulnerable. If the password gets compromised through any one of those use cases, it means the password is compromised across all of them because it can be used to carry out <a href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/#:~:text=4.-,Brute Force Attacks,-In brute force\">brute force attacks<\/a>.<\/p>\n\n\n\n<p>To make it even more secure, use access controls and <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/multifactor-authentication-MFA\">multi-factor authentication<\/a>. MFA requires a second form of verification (e.g., a one-time PIN) before granting access to the resource. Want to stop worrying about password cracking for good? Go <a href=\"https:\/\/sectigostore.com\/blog\/passwordless-login-security-mistakes-and-how-to-avoid-them\/\">passwordless<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-how-mfa-works-1024x507.png\" alt=\"An illustration that shows the cyber security basics of how multi-factor authentication works\" class=\"wp-image-3529\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-how-mfa-works-1024x507.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-how-mfa-works-300x148.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-how-mfa-works-560x277.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-how-mfa-works-940x465.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-how-mfa-works.png 1340w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: Adding multi-factor authentication as an additional security layer enhances login security.<\/em><\/figcaption><\/figure>\n\n\n\n<p>And if, despite all these measures, a cybercriminal does manage to break through \u2014 yes, it does happen \u2014 implementing access controls (<a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-the-principle-of-least-privilege\">i.e., the principle of least privilege<\/a>) limits the potential damage by ensuring that people have only access to what they need to do their work<a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-the-principle-of-least-privilege\"><\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Security Basic #3 \u2014 Maintaining Up-to-Date Software Keeps Vulnerabilities at Bay<\/h3>\n\n\n\n<p>A software vulnerability is like a hole in a physical gate. Even if you can only open the gate without a key from inside, a thief can put his hand through the hole to access the opening mechanism. Bingo, he\u2019s in.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Seal the holes in your gate as soon as you find them. Yes, keeping your software up to date and installing patches can be hard work. However, your diligence will pay off by preventing attackers from exploiting vulnerabilities to access your network, install malware, or modify code.<\/p>\n\n\n\n<p>To eliminate such vulnerabilities, you\u2019ll want to keep all of the following up to date:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Systems,<\/li>\n\n\n\n<li>Devices, and<\/li>\n\n\n\n<li>Any antiviruses and antimalware software.<\/li>\n<\/ul>\n\n\n\n<p>So, think twice before using that old smartphone to check your work emails. The device might still be working, but old (legacy) operating systems don&#8217;t get security updates.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Security Basic #4 \u2014 Encryption Secures Your Communication and Information<\/h3>\n\n\n\n<p><a href=\"https:\/\/sectigostore.com\/blog\/what-is-encryption-and-how-does-it-work\/\">E<\/a><a href=\"https:\/\/sectigostore.com\/blog\/what-is-encryption-and-how-does-it-work\/\">ncryption<\/a> transforms plain text data into indecipherable gibberish that can only be decrypted with a <a href=\"https:\/\/sectigostore.com\/blog\/public-key-vs-private-key-how-do-they-work\/\">private key<\/a>. It uses small files (i.e., digital certificates) that contain the owner\u2019s details (e.g., info that verifies the certificate is tied to your identity or company) and are issued by a <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-certificate-authority-certification-authorities-explained\/\">certificate authority<\/a> that vetted you.<\/p>\n\n\n\n<p>Use a <a href=\"https:\/\/sectigostore.com\/ssl-certificates\">secure socket layer\/transport layer security<\/a> (SSL\/TLS) certificate to encrypt and protect data in transit. This will help keep your customer&#8217;s sensitive data, such as credit card details entered on your website, secure from cybercriminals\u2019 prying eyes.<\/p>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-central-palette-2-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/sectigostore.com\/ssl-certificates\" style=\"border-radius:3px;color:#ffffff\">Buy an SSL\/TLS Certificate<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity-basics-how-ssl-tls-secure-data-1024x578.png\" alt=\"A simplified illustration shows that SSL\/TLS certificates play a role in helping secure data by enabling a secure, encrypted connection.\" class=\"wp-image-3530\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity-basics-how-ssl-tls-secure-data-1024x578.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity-basics-how-ssl-tls-secure-data-300x169.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity-basics-how-ssl-tls-secure-data-560x316.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity-basics-how-ssl-tls-secure-data-940x530.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cybersecurity-basics-how-ssl-tls-secure-data.png 1202w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: This simplified illustration shows how you can keep your customer&#8217;s sensitive data safe over the internet with an SSL\/TLS certificate, which enables the use of the secure HTTPS protocol.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Opt for an <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">email certificate<\/a> to encrypt your sensitive messages, especially those containing payroll information, customer data, etc. NOTE: This only works if both parties are using email signing certificates. The same certificate will also add a <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/\">digital signature<\/a> to each email. (Digital signatures don\u2019t require both parties to have an email signing certificate \u2014 only the signer.)<\/p>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-central-palette-2-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\" style=\"border-radius:3px;color:#ffffff\">Shop Email Certificates<\/a><\/div>\n\n\n\n<p>This approach will introduce another layer of authenticity, integrity protection, and security to every email you send.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-email-signing-certificate-1024x576.png\" alt=\"An illustration demonstrating how using an email signing certificate to enable encryption and digital signing helps ensure the security, authenticity, and integrity of your emails \" class=\"wp-image-3531\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-email-signing-certificate-1024x576.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-email-signing-certificate-300x169.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-email-signing-certificate-560x315.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-email-signing-certificate-940x529.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-email-signing-certificate.png 1229w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: An email certificate protects your messages in transit with encryption, assets your identity as a sender, and guarantees the integrity and authenticity of your messages.<\/em><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Security Basic #5 \u2014 Your Network Is Only as Secure As You Make It<\/h3>\n\n\n\n<p>Do you use remote security cameras, one or more point of sale (POS) devices, or any smart devices? In the first half of 2024, SonicWall reports that Internet of Things (IoT) related malware attacks <a href=\"https:\/\/www.sonicwall.com\/threat-report\">increased by 107%<\/a>.<\/p>\n\n\n\n<p>Of course, good, up-to-date antivirus software and antimalware will shield you from several SMB threats (e.g., ransomware, spam, phishing). But that\u2019s not enough. Critical systems should be on a private, dedicated network, separated from IoT devices and guest access, and protected by firewalls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Basic #6 \u2014 Backing Up Your Data and Websites Frequently Can Save Your Bacon<\/h3>\n\n\n\n<p>In 2024, the percentage of organizations that experienced data loss due to ransomware <a href=\"https:\/\/www.hornetsecurity.com\/en\/blog\/nearly-a-third-of-businesses-suffered-data-loss-in-2024\/\">nearly doubled<\/a>. The takeaway? Back up your data regularly. You don\u2019t even need to do it manually. Tools like <a href=\"https:\/\/sectigostore.com\/codeguard\/backup\">CodeGuard\u2019s b<\/a><a href=\"https:\/\/sectigostore.com\/codeguard\/backup\"><\/a><a href=\"https:\/\/sectigostore.com\/codeguard\/backup\">ackup and <\/a>r<a href=\"https:\/\/sectigostore.com\/codeguard\/backup\"><\/a><a href=\"https:\/\/sectigostore.com\/codeguard\/backup\">estor<\/a>ation features<a href=\"https:\/\/sectigostore.com\/codeguard\/backup\"><\/a> do it for you automatically. This way, if something happens, you&#8217;ll be up and running again in a few clicks. It also uses AES 256-bit encryption to add another layer of security to your backup data.<\/p>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-central-palette-2-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/sectigostore.com\/codeguard\/backup\" style=\"border-radius:3px;color:#ffffff\">Learn More About CodeGuard<\/a><\/div>\n\n\n\n<p>Other tools go even further. For instance, Sectigo\u2019s <a href=\"https:\/\/sectigostore.com\/sitelock.aspx\">SiteLock<\/a> combines antivirus, antimalware, and vulnerability scans with fully automated daily backups of your website files and databases. Install it, grab a cup of coffee, and watch it do the heavy lifting for you.<\/p>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-central-palette-2-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/sectigostore.com\/sitelock.aspx\" style=\"border-radius:3px;color:#ffffff\">Learn More About SiteLock<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Basic #7 \u2014 Cybersecurity Isn\u2019t Only About Protection; It\u2019s About Prevention<\/h3>\n\n\n\n<p>\u201cAnything that can go wrong will go wrong.\u201d In cybersecurity, <a href=\"https:\/\/www.merriam-webster.com\/dictionary\/Murphy's%20Law\">\u201cMurphy\u2019s Law\u201d<\/a> really resonates. The digital world isn\u2019t a place for slackers who don\u2019t take action to ensure their security. Be proactive and set up your safety net (i.e., create plans for incident response, business continuity, and recovery) for when, not if, something goes wrong.<\/p>\n\n\n\n<p>Hopefully, you&#8217;ll never have to use them. But there&#8217;s a reason why recovery is one of the core functions of the <a href=\"https:\/\/sectigostore.com\/blog\/5-smb-takeaways-from-the-nist-cybersecurity-framework-2-0\/\">NIST Cybersecurity Framework 2.0<\/a>. Furthermore, this new framework version was published to address SMBs\u2019 concerns specifically.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts About Cyber Security Basics Every SMB Should Know<\/h2>\n\n\n\n<p>So, there you have it. You&#8217;ve now learned the most important cybersecurity basics for SMBs. It wasn&#8217;t overly complicated, right? What you&#8217;ve learned today won&#8217;t only boost the security of your SMB and keep it out of trouble; it&#8217;ll also increase trust with your customers and business partners and help you improve your brand&#8217;s image. Beware, cybercriminals! There\u2019s a new SMB guardian angel in town. Hungry for more? Check out this brilliant <a href=\"https:\/\/www.ftc.gov\/system\/files\/attachments\/cybersecurity-small-business\/cybersecuirty_sb_factsheets_all.pdf\">SMB Cybersecurity Basics guide<\/a> issued by the U.S. Federal Trade Commission (FTC).&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stop flying blind. Nail the top SMB cyber security basics in less than five minutes, even if you&#8217;re an absolute beginner\u2026 78% of SMBs are concerned that a cyber attack&#8230;<\/p>\n","protected":false},"author":23,"featured_media":3532,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[307,15,301],"class_list":["post-3526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-security-basics","tag-smb","tag-smb-cyber-security","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Cyber Security Basics Every SMB Should Know - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"These cyber security basics will help you evolve from a cyber security &quot;newbie&quot; to a cyber-aware entrepreneur in less than five minutes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Cyber Security Basics Every SMB Should Know - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"These cyber security basics will help you evolve from a cyber security &quot;newbie&quot; to a cyber-aware entrepreneur in less than five minutes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nadia Bonini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nadia Bonini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/\"},\"author\":{\"name\":\"Nadia Bonini\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4ce6500b99e7563f71f0d1d6394f135\"},\"headline\":\"7 Cyber Security Basics Every SMB Should Know\",\"datePublished\":\"2024-11-11T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/\"},\"wordCount\":1605,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cyber-security-basics-feature.jpg\",\"keywords\":[\"cyber security basics\",\"SMB\",\"SMB Cyber Security\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/\",\"name\":\"7 Cyber Security Basics Every SMB Should Know - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cyber-security-basics-feature.jpg\",\"datePublished\":\"2024-11-11T12:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4ce6500b99e7563f71f0d1d6394f135\"},\"description\":\"These cyber security basics will help you evolve from a cyber security \\\"newbie\\\" to a cyber-aware entrepreneur in less than five minutes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cyber-security-basics-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/cyber-security-basics-feature.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"The feature image for an article on SMB cyber security basics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/cyber-security-basics-every-smb-should-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Cyber Security Basics Every SMB Should Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4ce6500b99e7563f71f0d1d6394f135\",\"name\":\"Nadia Bonini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g\",\"caption\":\"Nadia Bonini\"},\"description\":\"Nadia is a technical writer with more than 15 years of experience in IT, software development projects, email and cybersecurity. She has worked for leaders in the IT industry and Fortune 500 companies. A Certified CSPO mail application security product owner and a former application security engineer, she also works as a professional translator. She is a big fan of Ubuntu, traveling and Japan.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Cyber Security Basics Every SMB Should Know - InfoSec Insights","description":"These cyber security basics will help you evolve from a cyber security \"newbie\" to a cyber-aware entrepreneur in less than five minutes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/","og_locale":"en_US","og_type":"article","og_title":"7 Cyber Security Basics Every SMB Should Know - InfoSec Insights","og_description":"These cyber security basics will help you evolve from a cyber security \"newbie\" to a cyber-aware entrepreneur in less than five minutes.","og_url":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/","og_site_name":"InfoSec Insights","article_published_time":"2024-11-11T12:00:00+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-feature.jpg","type":"image\/jpeg"}],"author":"Nadia Bonini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nadia Bonini","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/"},"author":{"name":"Nadia Bonini","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/f4ce6500b99e7563f71f0d1d6394f135"},"headline":"7 Cyber Security Basics Every SMB Should Know","datePublished":"2024-11-11T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/"},"wordCount":1605,"image":{"@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-feature.jpg","keywords":["cyber security basics","SMB","SMB Cyber Security"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/","url":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/","name":"7 Cyber Security Basics Every SMB Should Know - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-feature.jpg","datePublished":"2024-11-11T12:00:00+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/f4ce6500b99e7563f71f0d1d6394f135"},"description":"These cyber security basics will help you evolve from a cyber security \"newbie\" to a cyber-aware entrepreneur in less than five minutes.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2024\/11\/cyber-security-basics-feature.jpg","width":1600,"height":1000,"caption":"The feature image for an article on SMB cyber security basics"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/cyber-security-basics-every-smb-should-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Cyber Security Basics Every SMB Should Know"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/f4ce6500b99e7563f71f0d1d6394f135","name":"Nadia Bonini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/871770d58b7b0abd48f90fb2f9643895c766b7ab6c1d4fa58e3651941cdc9e63?s=96&d=mm&r=g","caption":"Nadia Bonini"},"description":"Nadia is a technical writer with more than 15 years of experience in IT, software development projects, email and cybersecurity. She has worked for leaders in the IT industry and Fortune 500 companies. A Certified CSPO mail application security product owner and a former application security engineer, she also works as a professional translator. She is a big fan of Ubuntu, traveling and Japan."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=3526"}],"version-history":[{"count":4,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3526\/revisions"}],"predecessor-version":[{"id":3536,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3526\/revisions\/3536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/3532"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=3526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=3526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=3526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}