{"id":56,"date":"2012-02-08T22:50:07","date_gmt":"2012-02-08T22:50:07","guid":{"rendered":"http:\/\/www.stratospherenetworks.com\/blog\/?p=56"},"modified":"2018-06-26T12:05:07","modified_gmt":"2018-06-26T17:05:07","slug":"the-importance-of-data-security","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/","title":{"rendered":"The Importance of Data Security"},"content":{"rendered":"<div class=\"posterous_autopost\">\n<p><a href=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1552\" src=\"http:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security-300x200.jpg\" alt=\"cyber security\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security-300x200.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2014\/05\/security.jpg 849w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>It is easy to fall into the mistaken idea that you already have enough safeguards in place to protect your <a title=\"How SMBs can benefit from integrating virtualization\" href=\"http:\/\/www.stratospherenetworks.com\/blog\/how-smbs-can-benefit-from-integrating-virtualization\/\" target=\"_blank\">small business<\/a>. You probably stay current with the latest antivirus software, but is that sufficient? You also probably think that since you\u2019re not really a huge corporation, you don\u2019t have to worry about <a title=\"Will a real-time threat feed limit damage from cyber crimes\" href=\"http:\/\/www.stratospherenetworks.com\/blog\/will-a-real-time-threat-feed-limit-damage-from-cyber-crimes\/\" target=\"_blank\">cyber criminals<\/a> hacking into your system. But here\u2019s the unlucky reality: cyber criminals have upped their game and are starting to target small businesses more and more. Let\u2019s take a closer look to\u00a0 give you a better understanding of the level of danger your business may be under.<\/p>\n<p><strong>Small firms: low-hanging fruit<\/strong><\/p>\n<p>The truth is, hackers have discovered that small businesses are easier targets, and therefore are increasingly preying upon them. They are able to infiltrate their systems at a considerably faster rate, and with a better percentage of success as well. This means a cyber criminal can assault multiple targets in the time it would take them to lay siege to a better-guarded system with a higher level of data security. How can it be worth their while to steal from a mom and pop business? In today&#8217;s modern world, virtually every business utilizes digital payment processing methods. When your customers pay using a credit card, this data must run through your system to be verified. This represents a goldmine of information for hackers, as they can lift this data without being discovered. With your customers\u2019 credit card numbers, addresses and names, they can make counterfeit charges on their accounts.<\/p>\n<p><strong>How hackers gain access to your data<\/strong><\/p>\n<p>Even though you most likely have systems in position to defend your data, hackers will make use of several points of entry, so firewalls alone might not be enough. Harmful email attachments are one of the biggest offenders. These attachments can leave your system wide open for data mining. This year alone in the first quarter, 6 million malware programs were found. Apart from these more high-tech tactics, cyber criminals also use low-tech methods to steal information. Telephone calls as well as personal visits by someone posing as a network administrator or security firm can be damaging. We all hope our workers are smart enough not to be seduced by an apparent phishing scam, but it only takes one slip up to open yourself up for attack.<\/p>\n<p><strong>The buck stops with you<\/strong><\/p>\n<p>Many people believe that since credit card companies are usually responsible for any bogus charges that occur from a hacking event, that data security isn\u2019t crucial. While this may be true for a consumer, for a business owner the result may be very different. Consumers will hold you responsible personally should their information be stolen. Damage control after an attack can cost a company thousands of dollars and in some cases a single attack can spell the end of business in general.<\/p>\n<p><strong>An ounce of prevention\u2026<\/strong><\/p>\n<p>So, in relation to your data security, taking additional precautions is a sensible move. Not only should you upgrade your programs whenever possible, take a look at strengthening your passwords as well. Don&#8217;t use obvious phrases, and never leave the default password in place. Also, instruct your employees not to share their login information or open attachments from unfamiliar senders when checking their email. You can even hire an outside consultant to guarantee the security of your customers\u2019 data. Taking these kinds of measures can give you piece of mind, knowing that your systems are safe from attack.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It is easy to fall into the mistaken idea that you already have enough safeguards in place to protect your small business. You probably stay current with the latest antivirus software, but is that sufficient? You also probably think that &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[192],"tags":[],"class_list":["post-56","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-tips"],"yoast_head":"<title>The Importance of Data Security - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance of Data Security - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"og:description\" content=\"It is easy to fall into the mistaken idea that you already have enough safeguards in place to protect your small business. You probably stay current with the latest antivirus software, but is that sufficient? You also probably think that &hellip; Read more &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-08T22:50:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T17:05:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"The Importance of Data Security\",\"datePublished\":\"2012-02-08T22:50:07+00:00\",\"dateModified\":\"2018-06-26T17:05:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\"},\"wordCount\":586,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"IT Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\",\"name\":\"The Importance of Data Security - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2012-02-08T22:50:07+00:00\",\"dateModified\":\"2018-06-26T17:05:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Importance of Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"The Importance of Data Security - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/","og_locale":"en_US","og_type":"article","og_title":"The Importance of Data Security - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","og_description":"It is easy to fall into the mistaken idea that you already have enough safeguards in place to protect your small business. You probably stay current with the latest antivirus software, but is that sufficient? You also probably think that &hellip; Read more >","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2012-02-08T22:50:07+00:00","article_modified_time":"2018-06-26T17:05:07+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"The Importance of Data Security","datePublished":"2012-02-08T22:50:07+00:00","dateModified":"2018-06-26T17:05:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/"},"wordCount":586,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["IT Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/","name":"The Importance of Data Security - Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2012-02-08T22:50:07+00:00","dateModified":"2018-06-26T17:05:07+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/the-importance-of-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Importance of Data Security"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":8,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"predecessor-version":[{"id":1760,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions\/1760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}