{"id":2301,"date":"2022-10-05T20:56:00","date_gmt":"2023-09-04T20:56:51","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=2301"},"modified":"2024-02-28T13:27:39","modified_gmt":"2024-02-28T13:27:39","slug":"cyber-security-for-small-business","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/","title":{"rendered":"How to Create a Small Business Cyber Security Strategy"},"content":{"rendered":"\n<p>Small business cyber security is a crucial concern for many of today\u2019s enterprises, as collecting and leveraging data is more important than ever. But at a time when ransomware and phishing scams are proliferating \u2013 and internal threats can also present significant challenges \u2013 how can small businesses make sure that their data is secure?<\/p>\n\n\n\n<p>Let\u2019s take a look at why small business cyber security is a concern, and then talk about how to create a better blueprint for small business cyber security.<\/p>\n\n\n\n<div class=\"layout-six wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\"><span>The SMB Trends Report 5th Edition<\/span><\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Discover what&#8217;s driving today&#8217;s small businesses &#8211; and see where they might be headed next.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/uk\/form\/pdf\/2022-small-business-trends-report\/?d=inc-blog-banner&#038;nc=7013y000002hPhSAAU\">Download the E-Book<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/smb-trends-device-image-eu.png\" class=\"attachment-full size-full\" alt=\"smb-trends-report-fifth-edition\" srcset=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/smb-trends-device-image-eu.png 1268w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/smb-trends-device-image-eu.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/smb-trends-device-image-eu.png?w=768&amp;h=432 768w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/smb-trends-device-image-eu.png?w=1024&amp;h=577 1024w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/smb-trends-device-image-eu.png?w=150&amp;h=84 150w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t<\/div>\n\t<\/div>\n\n\t\n\t<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-small-business-cyber-security-is-so-important\"><b>Why small business cyber security is so important<\/b><\/h2>\n\n\n\n<p>If you think it\u2019s only big businesses that have to worry about cyber threats, you might be surprised to know how prolific cyber-attacks against small businesses are. In fact, an <a href=\"https:\/\/www.fsb.org.uk\/resources-page\/small-firms-suffer-close-to-10-000-cyber-attacks-daily.html\" target=\"_blank\" rel=\"noopener\">FSB report<\/a> shows that there are nearly 10,000 cyber-attacks against small businesses every day. <\/p>\n\n\n\n<p>This has resulted in more than 530,000 small firms being <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/small-business-guide\/avoiding-phishing-attacks\" target=\"_blank\" rel=\"noopener\">subjected to phishing scams<\/a> over the past two years, with the annual cost of cyber-attacks against small businesses estimated to be north of \u00a34.5 billion.<\/p>\n\n\n\n<p>These attacks don\u2019t just inflict financial damage on UK institutions; they can destroy a business\u2019s reputation as well. Some of the negative effects of cyber-attacks include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Financial losses due to business disruption.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Loss of customer trust and damage to industry reputation.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">The costs of customer compensation.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Compromised data that could fall into the hands of competitors.<\/span> <\/li>\n<\/ul>\n\n\n\n<p>In a time when creating trust is paramount, it\u2019s easy to see why so many small businesses are creating a cyber security strategy to protect themselves from multiple new threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-are-the-top-cyber-security-threats-facing-small-businesses\"><b>What are the top cyber security threats facing small businesses?<\/b><\/h2>\n\n\n\n<p>Digital threats are emerging regularly, and any cyber security strategy should be frequently revisited. Hackers and malicious actors are growing more sophisticated in their attacks, using readily available sources such as social media pages to gather private information and personalise phishing scams. Keystroke loggers can be deployed to reveal passwords and sensitive data, and entire websites can be held hostage until a ransom is paid into an untraceable account.<\/p>\n\n\n\n<p>But despite these advances in cyber-crime techniques and technologies, the most common small business cyber security threat is still the most basic: human error.<\/p>\n\n\n\n<p><b>Here are 5 small business cyber security threats to look out for:<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Human error.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Weak passwords or re-using passwords across multiple accounts.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Phishing scams.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Malware\/ransomware.<\/span> <\/li>\n\n\n\n<li><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Inside threats.<\/span> <\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-tips-for-creating-a-small-business-cyber-security-strategy\"><b>6 tips for creating a small business cyber security strategy<\/b><\/h3>\n\n\n\n<p>If the bad news is that cybercriminals are becoming savvier, the good news is that there are plenty of ways to improve your cyber security strategy and stay a step ahead.<\/p>\n\n\n\n<p><b>Here are 6 tips for creating a cyber security strategy that safeguards your data, <a href=\"https:\/\/www.salesforce.com\/uk\/learning-centre\/ecommerce\/boosting-website-ecommerce-security\/\" target=\"_blank\" rel=\"noopener\">protects your customers<\/a> and keeps your workforce plugged in.<\/b><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Train the workforce. <\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Human error accounts for a huge percentage of cyber-security issues, so it\u2019s imperative that the workforce has been trained to ensure security protocols are met. You can use on-demand training platforms to create custom learning journeys based on your business\u2019s unique security needs or put together a cyber-security handbook that covers all the basics.<\/span> <\/li>\n\n\n\n<li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Limit third-party apps and the use of personal devices<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">. Otherwise known as<\/span> <\/li>\n\n\n\n<li><p>Shadow IT, the use of unsanctioned apps and personal devices in the office, has risen in the age of remote and hybrid work. While shadow IT can offer benefits in terms of boosting productivity, it also presents a security concern, as any vulnerabilities and violations will be beyond the purview of the IT department.<\/p><\/li>\n\n\n\n<li> <b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Beware of big phish:<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> Phishing attacks can be especially damaging cyber-crimes, and it\u2019s been estimated that the average worker receives 14 phishing emails each year, and <\/span><a style=\"font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em; background-color: rgb(255, 255, 255);\" href=\"https:\/\/www.ibm.com\/security\/data-breach\/threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">half<\/a><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> will respond to a phishing attempt that includes a Voice element. Ensure that the workforce operates on a \u2018zero trust\u2019 policy when receiving calls and emails. <\/span> <\/li>\n\n\n\n<li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Update software or utilise <a href=\"https:\/\/www.salesforce.com\/uk\/learning-centre\/tech\/cloudcomputing\/\" target=\"_blank\" rel=\"noopener\">cloud computing platforms<\/a> with automatic updates. <\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">It\u2019s important to always update your software in order to patch any security vulnerabilities, but if you use a cloud-computing solution this will be handled for you. On top of that, cloud computing solutions often offer customisable security options, so you can choose the level of security that matches your business goals.<\/span> <\/li>\n\n\n\n<li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Use two-factor authentication.<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> One of the easiest and most cost-effective ways to improve small business cyber security is to use two-factor authentication. With TFA, users need more than a password to access data, they also need to confirm via their mobile or with a fingerprint. This produces a line of defence against hackers and brute-force cyber-attacks.<\/span> <\/li>\n\n\n\n<li><b style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\">Use VPNs.<\/b><span style=\"color: var(--c-nero); font-family: var(--f-secondary); font-size: 1rem; letter-spacing: 0.0012em;\"> VPNs can encrypt confidential and corporate data through a secure connection so that it\u2019s protected from prying eyes. Devices that are connected to the VPN will use security keys to decode the data, while any attackers would only see the meaningless encrypted data. When using a VPN, it\u2019s paramount that all devices and accounts are kept secure, as one compromised account will give an attacker the \u2018key\u2019 to access everything connected to the VPN.<\/span> <\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"6 Tips For Privacy And Data Security | Salesforce Explained\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/osct7nOjTng?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-small-business-cyber-security-isn-t-a-one-off-concern-it-s-an-ongoing-issue\"><b>Small business cyber security isn\u2019t a one-off concern \u2013 it\u2019s an ongoing issue<\/b><\/h2>\n\n\n\n<p>There\u2019s a fine line between keeping your data safe and making it inaccessible. In order to compete in the current climate, organisations need to be data-driven and customer-centric. They not only need to be able to access and leverage their data whenever and wherever they need it; they need to make sure that their data complies with protocols and regulations.<\/p>\n\n\n\n<p>Locking down data is not the answer. Instead, look to <a href=\"https:\/\/www.salesforce.com\/uk\/blog\/2022\/01\/democratise-data-accelerate-business-intelligence.html\" target=\"_blank\" rel=\"noopener\">democratise your data<\/a> and eliminate rogue elements. Make sure the workforce is trained to be on the lookout for phishing and ransomware attacks. Limit the use of outside devices by making sanctioned processes and platforms easy, efficient and employee-friendly. And most importantly, stay up to date on emerging threats. After all, it\u2019s a continual race between the <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/black-hat\" target=\"_blank\" rel=\"noopener\">white hats and the black hats on the new data frontier<\/a>, and new technology trends can create a Pandora\u2019s box as well as a goldmine.<\/p>\n\n\n\n<p> <b>To see more about how small businesses are addressing the concerns of the digital age, check out our <a href=\"https:\/\/www.salesforce.com\/uk\/form\/pdf\/2022-small-business-trends-report\/?nc=7013y000002hPhSAAU\" target=\"_blank\" rel=\"noopener\">SME Trends Report<\/a>. And to see how connecting business processes can help your organisation unlock game-changing benefits, get a free copy of the <a href=\"https:\/\/www.salesforce.com\/uk\/form\/pdf\/connected-small-business-processes\/?nc=7013y000002lWUJAA2\" target=\"_blank\" rel=\"noopener\">Connected Small Business<\/a> eBook.<\/b><\/p>\n\n\n\n<div class=\"layout-six wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\"><span>The Small Business Growth Kit is now live<\/span><\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">View the latest guide for tips on connecting with the customer, mastering your sales pitch, and navigating the twists and turns of the road to business growth.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/uk\/form\/pdf\/small-business-growth-kit\/\/?d=inc-blog-banner&#038;nc=7013y0000022VtqAAE\">Get the Kit<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/10\/gk-smb-blog-img-768x432-uk.png\" class=\"attachment-full size-full\" alt=\"smb-growth-kit\" srcset=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/10\/gk-smb-blog-img-768x432-uk.png 768w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/10\/gk-smb-blog-img-768x432-uk.png?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/10\/gk-smb-blog-img-768x432-uk.png?w=150&amp;h=84 150w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t<\/div>\n\t<\/div>\n\n\t\n\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.<\/p>\n","protected":false},"author":1,"featured_media":804,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"11499a024c2349c09527e39ca1edba66","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[11,32,33],"sf_content_type":[],"coauthors":[16],"class_list":["post-2301","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-data-culture","sf_topic-small-business","sf_topic-startups"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gone Phishing: Your Guide to Small Business Cyber Security - Salesforce<\/title>\n<meta name=\"description\" content=\"Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Create a Small Business Cyber Security Strategy\" \/>\n<meta property=\"og:description\" content=\"Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-04T20:56:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-28T13:27:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Salesforce UK\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salesforce UK\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/33c8591ac1216f9740d1866229926a3e\"}],\"headline\":\"How to Create a Small Business Cyber Security Strategy\",\"datePublished\":\"2023-09-04T20:56:51+00:00\",\"dateModified\":\"2024-02-28T13:27:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\"},\"wordCount\":1057,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\",\"name\":\"Gone Phishing: Your Guide to Small Business Cyber Security - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg\",\"datePublished\":\"2023-09-04T20:56:51+00:00\",\"dateModified\":\"2024-02-28T13:27:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3\"},\"description\":\"Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg\",\"width\":500,\"height\":334,\"caption\":\"How to Create a Small Business Cyber Security Strategy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Create a Small Business Cyber Security Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/33c8591ac1216f9740d1866229926a3e\",\"name\":\"Salesforce UK\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Salesforce UK\"},\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/author\/salesforce-uk\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gone Phishing: Your Guide to Small Business Cyber Security - Salesforce","description":"Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/","og_locale":"en_GB","og_type":"article","og_title":"How to Create a Small Business Cyber Security Strategy","og_description":"Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.","og_url":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/","og_site_name":"Salesforce","article_published_time":"2023-09-04T20:56:51+00:00","article_modified_time":"2024-02-28T13:27:39+00:00","og_image":[{"width":500,"height":334,"url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg","type":"image\/jpeg"}],"author":"Salesforce UK","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Salesforce UK","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/33c8591ac1216f9740d1866229926a3e"}],"headline":"How to Create a Small Business Cyber Security Strategy","datePublished":"2023-09-04T20:56:51+00:00","dateModified":"2024-02-28T13:27:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/"},"wordCount":1057,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg","inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/","url":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/","name":"Gone Phishing: Your Guide to Small Business Cyber Security - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg","datePublished":"2023-09-04T20:56:51+00:00","dateModified":"2024-02-28T13:27:39+00:00","author":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3"},"description":"Data leaks are on the rise, and having a cyber-security strategy is more important than ever. Here\u2019s where to start.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#primaryimage","url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg","contentUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg","width":500,"height":334,"caption":"How to Create a Small Business Cyber Security Strategy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-security-for-small-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/eu\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Create a Small Business Cyber Security Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website","url":"https:\/\/www.salesforce.com\/eu\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/33c8591ac1216f9740d1866229926a3e","name":"Salesforce UK","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Salesforce UK"},"url":"https:\/\/www.salesforce.com\/eu\/blog\/author\/salesforce-uk\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/small-business-cyber-security.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/eu\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/2301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/comments?post=2301"}],"version-history":[{"count":5,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/2301\/revisions"}],"predecessor-version":[{"id":9804,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/2301\/revisions\/9804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media\/804"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media?parent=2301"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_topic?post=2301"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_content_type?post=2301"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/coauthors?post=2301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}