{"id":11644,"date":"2017-02-02T11:55:22","date_gmt":"2017-02-02T10:55:22","guid":{"rendered":"https:\/\/vboxxcloud.nl\/?p=11644"},"modified":"2018-03-21T15:06:01","modified_gmt":"2018-03-21T14:06:01","slug":"protect-business-cyberattacks","status":"publish","type":"post","link":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/","title":{"rendered":"How to protect your business from cyberattacks? &#8211; Part I"},"content":{"rendered":"<p>IT Managers of small to mid-sized companies tend to\u00a0not prioritize cybersecurity. Saving costs and the underlying assumption that only big companies are targeted by this sort of attacks, help explain this position. In reality, small to medium businesses are being targeted more since they are less likely to be protected.<\/p>\n<p><!--more--><\/p>\n<h4>How to protect your business?<\/h4>\n<p>Cyberattacks are a constant threat around large enterprises, government agencies and small companies. However, you can take a few simple steps towards protecting your business. By adopting these best practices, you will save money and protect your business against cyberattacks.<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>44% of small business have experienced a cyberattack, at an average cost of almost $9,000 per incident.<\/p><\/blockquote>\n<p style=\"text-align: right;\">Kerio.<\/p>\n<h4>The power of the password<\/h4>\n<p>This might seem an obvious recommendation, but it is surprising how many of us do not\u00a0spend enough time choosing a secure password. Keeping hackers at bay with strong passwords, is a more effective strategy than repairing the damage after they have accessed your network.<\/p>\n<p>A good password strategy is to make them strong and protecting them from unauthorized use. SO, how does a strong password look like?<\/p>\n<ul>\n<li>It\u2019s long &#8211; a minimum of eight characters.<\/li>\n<li>Uses letters, symbols, and numbers.<\/li>\n<li>Uses uppercase and lowercase letters.<\/li>\n<li>Avoids real words or meaningful dates.<\/li>\n<li>When using words, random words should be the rule<\/li>\n<\/ul>\n<h4>Protect your passwords<\/h4>\n<p>Strong passwords can help protect your data, but protecting the passwords also depends of the employees not only IT Managers. Employees must understand how to safeguard these passwords. This can be done for example by implementing clear\u00a0password policies.<\/p>\n<ul>\n<li>Password updates: Change passwords periodically. For example, every three months send a \u201cpassword change\u201d reminder.<\/li>\n<li>Password storage: Don\u2019t share passwords with coworkers or family members, or write them on paper that can be seen by others.<\/li>\n<li>Computer security: Implement a policy of login off or locking computers when away from the desk.<\/li>\n<li>Password mobility: Be aware of your surroundings when entering passwords in public places. Airports, coffee shops are high-risk places for cybercrime.<\/li>\n<\/ul>\n<p>Next week we will continue this series with more tips on how to make your business more secure against possible attacks and data loss.<\/p>\n<p><strong>Source:\u00a0<\/strong><a href=\"https:\/\/www.kerio.com\/blog\/cyberattacks-dont-just-happen-to-big-companies\" target=\"_blank\" rel=\"nofollow noopener\">Kerio<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Managers of small to mid-sized companies tend to\u00a0not prioritize cybersecurity. Saving costs and the underlying assumption that only big companies are targeted by this sort of attacks, help explain this position. In reality, small<\/p>\n","protected":false},"author":2,"featured_media":11652,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6],"tags":[],"class_list":["post-11644","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-vboxxcloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect your business from cyberattacks? - Part I<\/title>\n<meta name=\"description\" content=\"Managing IT for small and mid-sized business is challenging. Today, we share a few simple practices that help protect your business from cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your business from cyberattacks? - Part I\" \/>\n<meta property=\"og:description\" content=\"Managing IT for small and mid-sized business is challenging. Today, we share a few simple practices that help protect your business from cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"vBoxxCloud Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vBoxxbv\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-02T10:55:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-21T14:06:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"vBoxx Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@vboxx\" \/>\n<meta name=\"twitter:site\" content=\"@vboxx\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vBoxx Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\"},\"author\":{\"name\":\"vBoxx Team\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55\"},\"headline\":\"How to protect your business from cyberattacks? &#8211; Part I\",\"datePublished\":\"2017-02-02T10:55:22+00:00\",\"dateModified\":\"2018-03-21T14:06:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\"},\"wordCount\":372,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg\",\"articleSection\":[\"Security\",\"vBoxxCloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\",\"name\":\"How to protect your business from cyberattacks? - Part I\",\"isPartOf\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg\",\"datePublished\":\"2017-02-02T10:55:22+00:00\",\"dateModified\":\"2018-03-21T14:06:01+00:00\",\"description\":\"Managing IT for small and mid-sized business is challenging. Today, we share a few simple practices that help protect your business from cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg\",\"contentUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg\",\"width\":1024,\"height\":683,\"caption\":\"vboxxcloud cyberattacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vboxxcloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your business from cyberattacks? &#8211; Part I\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#website\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/\",\"name\":\"vBoxxCloud Blog\",\"description\":\"Follow our blog, for the latest vBoxxCloud updates and trends in technology.\",\"publisher\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vboxxcloud.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#organization\",\"name\":\"vBoxxCloud\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png\",\"contentUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png\",\"width\":158,\"height\":41,\"caption\":\"vBoxxCloud\"},\"image\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/vBoxxbv\/\",\"https:\/\/x.com\/vboxx\",\"https:\/\/www.instagram.com\/vboxx\/\",\"https:\/\/www.linkedin.com\/company\/vboxx-b-v-\",\"https:\/\/www.youtube.com\/channel\/UC-VmfbaWx3ggYr58qB4fXPQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55\",\"name\":\"vBoxx Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g\",\"caption\":\"vBoxx Team\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your business from cyberattacks? - Part I","description":"Managing IT for small and mid-sized business is challenging. Today, we share a few simple practices that help protect your business from cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"How to protect your business from cyberattacks? - Part I","og_description":"Managing IT for small and mid-sized business is challenging. Today, we share a few simple practices that help protect your business from cyberattacks.","og_url":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/","og_site_name":"vBoxxCloud Blog","article_publisher":"https:\/\/www.facebook.com\/vBoxxbv\/","article_published_time":"2017-02-02T10:55:22+00:00","article_modified_time":"2018-03-21T14:06:01+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg","type":"image\/jpeg"}],"author":"vBoxx Team","twitter_card":"summary_large_image","twitter_creator":"@vboxx","twitter_site":"@vboxx","twitter_misc":{"Written by":"vBoxx Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/"},"author":{"name":"vBoxx Team","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55"},"headline":"How to protect your business from cyberattacks? &#8211; Part I","datePublished":"2017-02-02T10:55:22+00:00","dateModified":"2018-03-21T14:06:01+00:00","mainEntityOfPage":{"@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/"},"wordCount":372,"commentCount":0,"publisher":{"@id":"https:\/\/vboxxcloud.com\/blog\/#organization"},"image":{"@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg","articleSection":["Security","vBoxxCloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/","url":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/","name":"How to protect your business from cyberattacks? - Part I","isPartOf":{"@id":"https:\/\/vboxxcloud.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg","datePublished":"2017-02-02T10:55:22+00:00","dateModified":"2018-03-21T14:06:01+00:00","description":"Managing IT for small and mid-sized business is challenging. Today, we share a few simple practices that help protect your business from cyberattacks.","breadcrumb":{"@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#primaryimage","url":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg","contentUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/02\/burrito-cyber-security.jpg","width":1024,"height":683,"caption":"vboxxcloud cyberattacks"},{"@type":"BreadcrumbList","@id":"https:\/\/vboxxcloud.com\/blog\/protect-business-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vboxxcloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to protect your business from cyberattacks? &#8211; Part I"}]},{"@type":"WebSite","@id":"https:\/\/vboxxcloud.com\/blog\/#website","url":"https:\/\/vboxxcloud.com\/blog\/","name":"vBoxxCloud Blog","description":"Follow our blog, for the latest vBoxxCloud updates and trends in technology.","publisher":{"@id":"https:\/\/vboxxcloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vboxxcloud.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/vboxxcloud.com\/blog\/#organization","name":"vBoxxCloud","url":"https:\/\/vboxxcloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png","contentUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png","width":158,"height":41,"caption":"vBoxxCloud"},"image":{"@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/vBoxxbv\/","https:\/\/x.com\/vboxx","https:\/\/www.instagram.com\/vboxx\/","https:\/\/www.linkedin.com\/company\/vboxx-b-v-","https:\/\/www.youtube.com\/channel\/UC-VmfbaWx3ggYr58qB4fXPQ"]},{"@type":"Person","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55","name":"vBoxx Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g","caption":"vBoxx Team"}}]}},"_links":{"self":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/posts\/11644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/comments?post=11644"}],"version-history":[{"count":0,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/posts\/11644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/media\/11652"}],"wp:attachment":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/media?parent=11644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/categories?post=11644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/tags?post=11644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}