{"id":2680,"date":"2018-11-07T13:58:24","date_gmt":"2018-11-07T18:58:24","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2680"},"modified":"2018-11-08T19:35:11","modified_gmt":"2018-11-09T00:35:11","slug":"why-data-breach-prevention-matters-for-small-and-midsize-businesses","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/","title":{"rendered":"Why Data Breach Prevention Matters for Small and Midsize Businesses"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/data-breach-prevention.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-2683\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/data-breach-prevention-300x200.jpg\" alt=\"data security illustration\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/data-breach-prevention-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/data-breach-prevention-768x512.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/data-breach-prevention-1024x683.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2018\/11\/data-breach-prevention.jpg 1254w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Has your business experienced a data breach yet? It\u2019s no longer a matter of if but when hackers will target your organization. As <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Verizon\u2019s 2018 Data Breach Investigations Report<\/a> (DBIR) warns, \u201cIt will probably be you one day.\u201d<\/p>\n<p>All it takes is for one of your team members to click on a malicious email or <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/4-key-reasons-to-use-a-password-manager\/\" target=\"_blank\" rel=\"noopener\">share a password<\/a> that falls into the wrong hands and ends up for sale on the dark web. <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/11-ways-to-tell-if-youve-been-hacked\/\" target=\"_blank\" rel=\"noopener\">Hackers can infiltrate<\/a> their target\u2019s network in mere minutes, but it typically takes much longer for the affected organization to notice. The majority (68 percent) of data breaches aren\u2019t discovered for months or even longer, according to Verizon\u2019s DBIR.<\/p>\n<p>On top of that, the data breach epidemic that\u2019s developed in recent years is only getting worse. In 2017, the number of data breaches in the U.S. reached a record high of 1,579, a 44.7 percent increase compared to the previous year, according to the <a href=\"https:\/\/www.idtheftcenter.org\/2017-data-breaches\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Identity Theft Resource Center<\/a>.<\/p>\n<p>Cybercrime is still going strong this year: As of October 3, there were a total of 932 breaches <a href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2018\/10\/2018-September-Data-Breach-Package.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">identified by the ITRC<\/a> in the U.S. so far in 2018, exposing a total of approximately 47.2 million records.<\/p>\n<p>Most of the headlines related to data breaches address large incidents involving big corporations. For instance, it was hard to miss the media storm following the <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/facebook-data-breach-faq-5-things-you-should-know\/\" target=\"_blank\" rel=\"noopener\">recent Facebook breach<\/a>, which was the largest in the company\u2019s history and affected nearly 50 million users.<\/p>\n<p>However, larger enterprises aren\u2019t the only ones that need to worry about breaches. Cybercriminals also target small to midsize businesses in their pursuit of sensitive data. If you\u2019re part of the leadership team at a small to medium-sized company, it\u2019s crucial to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-make-infrastructure-secure-adopt-proactive-approach\/\" target=\"_blank\" rel=\"noopener\">take action<\/a> to reduce your data breach risk, if you haven\u2019t already. Here\u2019s everything that you should know about why and how to secure your IT environment.<\/p>\n<p><strong>Why Small Businesses Need to Take Action<\/strong><br \/>\nThe stereotype of hackers setting their sights exclusively on billion-dollar enterprises is misleading, Verizon\u2019s DBIR states.<\/p>\n<p>\u201cMost attacks are opportunistic and target not the wealthy or famous but the unprepared,\u201d the report explains.<\/p>\n<p>Our IT security experts at Stratosphere Networks have observed that hackers often go after smaller organizations rather than large ones. The majority (58 percent) of cyberattacks target small businesses, the 2018 DBIR confirms.<\/p>\n<p>Smaller organizations are less likely to have sophisticated cybersecurity defenses in place, which means they\u2019re generally easier to infiltrate. Only 21 percent of small and medium-sized businesses classify their ability to take on cyber vulnerabilities, risks, and attacks as highly effective, according to the <a href=\"https:\/\/keepersecurity.com\/2017-State-Cybersecurity-Small-Medium-Businesses-SMB.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2017 State of Cybersecurity in Small and Medium-Sized Businesses (SMB) report<\/a> from the Ponemon Institute.<\/p>\n<p>Hacking into the IT environment of a large company that has invested in advanced IT security solutions, on the other hand, necessitates crafting a sophisticated plan of attack. As a result, it\u2019s become common for cybercriminals to launch numerous scripted or AI-based attacks against various small businesses instead of putting a large amount of effort into taking down the defenses of one big corporation.<\/p>\n<p>Because smaller organizations have become attractive targets for cybercriminals, it\u2019s imperative that these businesses take proactive steps to stop malicious entities from infiltrating their networks. Particularly for companies with limited resources, a data breach can prove disastrous. The global average cost of a data breach has reached $3.86 million, according to the <a href=\"https:\/\/www.ibm.com\/security\/data-breach?cm_mmc=Search_Google-_-Security_Optimize+the+Security+Program-_-WW_NA-_-+breach+of++data_Broad_-&amp;cm_mmca2=10000253&amp;cm_mmca7=9030963&amp;cm_mmca8=aud-322244832184:kwd-295901324379&amp;cm_mmca9=_k_EAIaIQobChMIv_aL1ua23gIVAb7ACh1qUgXREAAYASABEgIZXPD_BwE_k_&amp;cm_mmca10=253508236943&amp;cm_mmca11=b&amp;mkwid=_k_EAIaIQobChMIv_aL1ua23gIVAb7ACh1qUgXREAAYASABEgIZXPD_BwE_k_&amp;cvosrc=ppc.google.&amp;cvo_campaign=000000NJ&amp;cvo_crid=253508236943&amp;Matchtype=b&amp;gclid=EAIaIQobChMIv_aL1ua23gIVAb7ACh1qUgXREAAYASABEgIZXPD_BwE\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2018 Cost of a Data Breach Study<\/a> from the Ponemon Institute and IBM.<\/p>\n<p>A data breach can negatively affect your business in the following ways, among others:<\/p>\n<ul>\n<li>Decreased productivity due to downtime and inaccessible data<\/li>\n<li>Reputation damage<\/li>\n<li>Loss of both current and prospective clients<\/li>\n<li>Regulatory consequences<\/li>\n<\/ul>\n<p>The losses can prove extensive, and many organizations don\u2019t bounce back: Approximately half of small companies that become victims of cyberattacks end up going out of business within six months, according to the <a href=\"https:\/\/www.sec.gov\/news\/statement\/cybersecurity-challenges-for-small-midsize-businesses.html#_edn6\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">U.S. Securities and Exchange Commission<\/a>.<\/p>\n<p>Luckily, there are plenty of steps small and midsize businesses can take to significantly reduce their data breach risk.<\/p>\n<p><strong>What You Can Do to Stay Safe<br \/>\n<\/strong>The IT security threat landscape changes at an extremely rapid pace, with hackers finding new ways to get past cybersecurity defenses and launching novel types of malware every day. It takes a team of skilled IT experts to keep up and stay one step ahead of the bad guys in guarding your company\u2019s network and sensitive data.<\/p>\n<p>If your business has limited resources and can\u2019t realistically hire cybersecurity experts to serve as part of your internal staff, partnering with a managed IT service provider can make a huge difference. An MSP can deliver and\/or manage a range of advanced cybersecurity solutions as well as services to minimize your data breach risk.<\/p>\n<p>Here are just some of the steps and solutions that can have a significant impact on your business\u2019s security status:<\/p>\n<p><strong>IT security risk assessment. <\/strong>This is a crucial first step on the path to establishing a comprehensive security strategy for your business. A diagnostic scan can <a href=\"https:\/\/www.stratospherenetworks.com\/3-things-an-it-security-assessment-will-tell-you.html\" target=\"_blank\" rel=\"noopener\">identify any vulnerabilities<\/a> in your network that hackers could potentially exploit to gain access to sensitive data. You want to find your weak spots before cybercriminals do.<\/p>\n<p><strong>Employee awareness training.<\/strong> Educating your team and making sure they\u2019re aware of best practices for optimal IT security is essential for any business looking to avoid a breach. Employees\u2019 mistakes can open the door to hackers: Errors were the root cause of 17 percent of breaches studied in the 2018 DBIR. Those missteps included sending emails to the wrong recipient, misconfiguring servers, or forgetting to shred documents containing sensitive information.<\/p>\n<p>Awareness training can address and correct common bad habits such as using weak passwords and clicking on links or downloading attachments from suspicious emails. Everyone should be well-informed and on-board with your plan to safeguard your company\u2019s IT environment.<\/p>\n<p><strong>Penetration testing. <\/strong>You don\u2019t really know how well your cybersecurity defenses work unless you test them regularly. Penetration testing (a.k.a. pen testing) will give you a good idea of how secure your network really is and help your business find and fix any vulnerabilities.<\/p>\n<p><strong>Spam filtering.<\/strong> Even if you\u2019ve educated your employees about how to spot a suspicious message, spam filtering adds an extra layer of protection against phishing campaigns by preventing malicious emails from reaching your team members\u2019 inboxes.<\/p>\n<p><strong>Next-generation firewall.<\/strong> Traditional firewalls are no longer adequate when it comes to defending against increasingly sophisticated cyberattacks. A <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/do-you-need-a-next-generation-firewall\/\" target=\"_blank\" rel=\"noopener\">next-gen firewall<\/a> leverages advanced tools such as integrated security management, application control, and advanced logging capabilities to fend off security threats.<\/p>\n<p><strong>Secure VPN.<\/strong> Prevent unauthorized users from infiltrating your network while still allowing remote workers to securely access sensitive data. A secure VPN allows users to safely connect to your business\u2019s private network via a public telecommunication infrastructure (e.g., the internet).<\/p>\n<p><strong>Encryption.<\/strong> <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/4-reasons-for-email-encryption\/\" target=\"_blank\" rel=\"noopener\">Employing encryption<\/a> to ensure your emails stay secure is a must in an age of widespread data breaches and cybercrime.<\/p>\n<p><strong>Backup and disaster recovery.<\/strong> In the event that your organization becomes the target of malware such as <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/get-hit-ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> (which holds data hostage and demands payment for a decryption key), have <a href=\"https:\/\/www.stratospherenetworks.com\/backup-and-disaster-recovery.html\" target=\"_blank\" rel=\"noopener\">backup and disaster recovery solutions<\/a> in place can allow you to move forward without having to give in to cybercriminals\u2019 demands.<\/p>\n<p><strong>Proactive monitoring (network, web applications, log correlation and analysis, etc.).<\/strong> If you wait until you see or experience obvious signs of a cyberattack, it will be far too late to minimize the fallout. Proactively monitoring your network for weak spots and signs of intruders is the best way to ensure that even if malicious entities get past your defenses, they won\u2019t have a chance to do too much harm.<\/p>\n<p><strong>Virtual chief security officer (vCSO)\/virtual chief information security officer (vCISO).<\/strong> Having a full-time high-level security expert on staff can dramatically reduce your organization\u2019s risk level. However, smaller organizations often don\u2019t have the budget needed to hire an in-house CSO or CISO.<\/p>\n<p>Fortunately, <a href=\"https:\/\/www.stratospherenetworks.com\/virtual-chief-security-officer.html\" target=\"_blank\" rel=\"noopener\">virtual CSO and CISO services<\/a> allow you to get on-demand access to high-level security expertise without having to worry about hiring costs, training, or turnover.<\/p>\n<p>Ultimately, small and midsize businesses must be vigilant in securing their IT environments and working to prevent data breaches. If you have any concerns or questions about data breach prevention and developing a comprehensive cybersecurity strategy, don\u2019t hesitate to contact our team of expert techs. Connect with us today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Has your business experienced a data breach yet? It\u2019s no longer a matter of if but when hackers will target your organization. As Verizon\u2019s 2018 Data Breach Investigations Report (DBIR) warns, \u201cIt will probably be you one day.\u201d All it &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>Data Breach Prevention for Small and Midsize Businesses<\/title>\n<meta name=\"description\" content=\"This guide to data breach prevention for small to midsize businesses covers everything you need to know about why and how to secure your IT environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breach Prevention for Small and Midsize Businesses\" \/>\n<meta property=\"og:description\" content=\"This guide to data breach prevention for small to midsize businesses covers everything you need to know about why and how to secure your IT environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-07T18:58:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-09T00:35:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"Why Data Breach Prevention Matters for Small and Midsize Businesses\",\"datePublished\":\"2018-11-07T18:58:24+00:00\",\"dateModified\":\"2018-11-09T00:35:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\"},\"wordCount\":1415,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\",\"name\":\"Data Breach Prevention for Small and Midsize Businesses\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2018-11-07T18:58:24+00:00\",\"dateModified\":\"2018-11-09T00:35:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"This guide to data breach prevention for small to midsize businesses covers everything you need to know about why and how to secure your IT environment.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Data Breach Prevention Matters for Small and Midsize Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"Data Breach Prevention for Small and Midsize Businesses","description":"This guide to data breach prevention for small to midsize businesses covers everything you need to know about why and how to secure your IT environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Data Breach Prevention for Small and Midsize Businesses","og_description":"This guide to data breach prevention for small to midsize businesses covers everything you need to know about why and how to secure your IT environment.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2018-11-07T18:58:24+00:00","article_modified_time":"2018-11-09T00:35:11+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"Why Data Breach Prevention Matters for Small and Midsize Businesses","datePublished":"2018-11-07T18:58:24+00:00","dateModified":"2018-11-09T00:35:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/"},"wordCount":1415,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/","name":"Data Breach Prevention for Small and Midsize Businesses","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2018-11-07T18:58:24+00:00","dateModified":"2018-11-09T00:35:11+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"This guide to data breach prevention for small to midsize businesses covers everything you need to know about why and how to secure your IT environment.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/why-data-breach-prevention-matters-for-small-and-midsize-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Data Breach Prevention Matters for Small and Midsize Businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2680"}],"version-history":[{"count":3,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2680\/revisions"}],"predecessor-version":[{"id":2687,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2680\/revisions\/2687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}