{"id":1057,"date":"2021-12-17T19:44:00","date_gmt":"2023-06-06T19:44:35","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=1057"},"modified":"2023-07-06T02:18:01","modified_gmt":"2023-07-06T02:18:01","slug":"cybersecurity-secure-business-data","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/","title":{"rendered":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point"},"content":{"rendered":"\n<p>Virtual spaces are new territory for cyber attacks, data leaks and company breaches. In fact, according to the <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" adhocenable=\"false\" rel=\"noopener\">IBM Cost of Data Breach Report 2021<\/a>, phishing attempts have risen 600% and cloud-based attacks rose 630%.<\/p>\n\n\n\n<p>What would you do if your business data fell into the wrong hands?<\/p>\n\n\n\n<p>To stay secure, there are a number of layers of data security you need to consider.&nbsp; From physical hardware, to digital networks, and every manner of encryption in the cloud.<\/p>\n\n\n\n<p>Explore our cybersecurity infographic below to see how to secure your data, and get more tips on data security and compliance for every IT Leader in this <a href=\"https:\/\/www.salesforce.com\/ap\/resources\/guides\/data-security-governance-it-guide\/?d=7013y000000vVTHAA2&amp;nc=7013y000000vVRVAA2\" target=\"_blank\" adhocenable=\"false\" rel=\"noopener\">e-book<\/a>.<\/p>\n\n\n\n<p>Can you afford not to protect your most important business asset?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.salesforce.com\/ap\/resources\/guides\/data-security-governance-it-guide\/?d=7013y000000vVTHAA2&amp;nc=7013y000000vVRVAA2\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/salesforce-news-blog-develop.go-vip.net\/wp-content\/uploads\/sites\/8\/2023\/06\/infographic-cybersecurity-secure-business-data.jpg\" alt=\"Click infographic to go to The IT Leader's Guide to Data Security and Governance web page.\"> <\/a> <\/p>\n\n\n\n<p class=\"has-text-align-center\"> <a href=\"https:\/\/www.salesforce.com\/ap\/blog\/assets\/infographics\/cybersecurity-secure-business-data.html\" target=\"_blank\" rel=\"noopener\">For details on this infographic, please click here.<\/a> <span id=\"authorRoot\" path=\"\/content\/blogs\/sg\/en\/authors\/\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a digital-first world, cybersecurity is vital. Read our cybersecurity infographic to see how to secure your most important business data.<\/p>\n","protected":false},"author":1,"featured_media":1055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"38523b0056074c099f07db0908787d89","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[7,18,1,14,34],"sf_content_type":[],"coauthors":[3],"class_list":["post-1057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-data-management","sf_topic-digital-transformation","sf_topic-infographics","sf_topic-it","sf_topic-practical-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Insights: Secure Your Business Data at Every Touch Point - Salesforce<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Insights: Secure Your Business Data at Every Touch Point\" \/>\n<meta property=\"og:description\" content=\"In a digital-first world, cybersecurity is vital. Read our cybersecurity infographic to see how to secure your most important business data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T19:44:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-06T02:18:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1\"}],\"headline\":\"Cybersecurity Insights: Secure Your Business Data at Every Touch Point\",\"datePublished\":\"2023-06-06T19:44:35+00:00\",\"dateModified\":\"2023-07-06T02:18:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\"},\"wordCount\":133,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg\",\"inLanguage\":\"en-SG\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\",\"name\":\"Cybersecurity Insights: Secure Your Business Data at Every Touch Point - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg\",\"datePublished\":\"2023-06-06T19:44:35+00:00\",\"dateModified\":\"2023-07-06T02:18:01+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#breadcrumb\"},\"inLanguage\":\"en-SG\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-SG\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg\",\"width\":500,\"height\":281,\"caption\":\"Cybersecurity Insights: Secure Your Business Data at Every Touch Point\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/ap\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Insights: Secure Your Business Data at Every Touch Point\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/ap\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-SG\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1\",\"name\":\"Salesforce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-SG\",\"@id\":\"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/e6bed802dbc774e7364f59f5f076fd2a\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1\",\"contentUrl\":\"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1\",\"width\":\"150\",\"height\":\"150\",\"caption\":\"Salesforce\"},\"description\":\"Salesforce is the #1 AI CRM, bringing companies and customers together in the digital age. We're immersed in the world of customer relationship management, helping businesses unlock the full potential of their data and connect with their customers in more meaningful ways. Whether it\u2019s using AI to improve service or streamlining sales processes, we're passionate about the tools and strategies that help our customers succeed in the digital age.\",\"url\":\"https:\/\/www.salesforce.com\/ap\/blog\/author\/salesforce\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point - Salesforce","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/","og_type":"article","og_title":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point","og_description":"In a digital-first world, cybersecurity is vital. Read our cybersecurity infographic to see how to secure your most important business data.","og_url":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/","og_site_name":"Salesforce","article_published_time":"2023-06-06T19:44:35+00:00","article_modified_time":"2023-07-06T02:18:01+00:00","og_image":[{"width":500,"height":281,"url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg","type":"image\/jpeg"}],"author":"Salesforce","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Salesforce","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1"}],"headline":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point","datePublished":"2023-06-06T19:44:35+00:00","dateModified":"2023-07-06T02:18:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/"},"wordCount":133,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg","inLanguage":"en-SG","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/","url":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/","name":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg","datePublished":"2023-06-06T19:44:35+00:00","dateModified":"2023-07-06T02:18:01+00:00","author":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3"},"breadcrumb":{"@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#breadcrumb"},"inLanguage":"en-SG","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-SG","@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#primaryimage","url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg","contentUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg","width":500,"height":281,"caption":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/ap\/blog\/cybersecurity-secure-business-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/ap\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Insights: Secure Your Business Data at Every Touch Point"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#website","url":"https:\/\/www.salesforce.com\/ap\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/ap\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-SG"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/2ae386e5431d87a4765b35117b6738e1","name":"Salesforce","image":{"@type":"ImageObject","inLanguage":"en-SG","@id":"https:\/\/www.salesforce.com\/ap\/blog\/#\/schema\/person\/image\/e6bed802dbc774e7364f59f5f076fd2a","url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1","contentUrl":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/Salesforce-logo.webp?w=150&h=150&crop=1","width":"150","height":"150","caption":"Salesforce"},"description":"Salesforce is the #1 AI CRM, bringing companies and customers together in the digital age. We're immersed in the world of customer relationship management, helping businesses unlock the full potential of their data and connect with their customers in more meaningful ways. Whether it\u2019s using AI to improve service or streamlining sales processes, we're passionate about the tools and strategies that help our customers succeed in the digital age.","url":"https:\/\/www.salesforce.com\/ap\/blog\/author\/salesforce\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/ap\/blog\/wp-content\/uploads\/sites\/8\/2023\/06\/cybersecurity-secure-business-data.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/ap\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/1057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/comments?post=1057"}],"version-history":[{"count":3,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/1057\/revisions"}],"predecessor-version":[{"id":3244,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/posts\/1057\/revisions\/3244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/media\/1055"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/media?parent=1057"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/sf_topic?post=1057"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/sf_content_type?post=1057"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/ap\/blog\/wp-json\/wp\/v2\/coauthors?post=1057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}