{"id":14165,"date":"2021-11-03T09:36:19","date_gmt":"2021-11-03T04:06:19","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=14165"},"modified":"2023-07-16T12:53:45","modified_gmt":"2023-07-16T07:23:45","slug":"sme-cybersecurity-9-essential-elements","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/","title":{"rendered":"Should SMEs take cybersecurity seriously?"},"content":{"rendered":"<p>As an enterprise owner, you\u2019re sure to take umpteen measures to protect your firm from intruders. Huge investments will be made to set up world-class security systems consisting of CCTVs, intrusion alarms, fire and smoke detectors, various sensors, multi-level access controls and many more. You have a valid reason to spend such enormous amounts on security systems because your physical assets are priceless and are extremely important for your business.<\/p>\n<p>But at the same time, what measure have you taken to ensure SME cybersecurity? The chances are that you haven\u2019t taken any. A gentle reminder to you that, in a world propelled by internet and data, the importance of digital assets is beyond imagination. Many enterprises that had the latest on-premises security systems had to close down because of data breaches. So, if you\u2019re still not serious about protecting your digital assets, it&#8217;s high time that you reconsider your decision.<\/p>\n<p>This blog is a walkthrough on why SMEs should take cybersecurity more seriously. For that, we analyze the jeopardy associated with an SME world, and by the end of this blog, you\u2019ll see how having a device management solution can be a game-changer.<\/p>\n<h2>Data breaches are absolute nightmares!<\/h2>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/Back-view-of-hooded-hacker-sitting-near-computer-monitor-scaled.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/Back-view-of-hooded-hacker-sitting-near-computer-monitor-scaled.jpg\" alt=\"Data breach is still a grave concern for all the SMEs\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>Data breach is still a grave concern for all the SMEs<\/em><\/center>&nbsp;<\/p>\n<p>Every day, companies, irrespective of their size, type and geographical parameters, face countless cyber threats from a variety of sources. The small and medium enterprises are more likely than their counterparts to succumb to data breaches because most SMEs are still not serious about implementing much-needed cyber defenses in their firms. Also, the majority of them are yet to be equipped with necessary detection methods to identify a breach quickly and to act rapidly against it.<\/p>\n<p>Data is what drives most SMEs. Hence, a loss of data results in hefty financial costs. But again, how hefty? According to the latest data breach report by <a href=\"https:\/\/www.ibm.com\/in-en\/security\/data-breach\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">IBM and Ponemon Institute<\/a>, the average cost of data infringement per incident is around $4.24 million. In most cases, this amount exceeds what SMEs could afford to pay and quite naturally, the companies who are unable to pay the amount, shutter down.<\/p>\n<p>Studies also reveal that <a href=\"https:\/\/cybersecurityventures.com\/60-percent-of-small-companies-close-within-6-months-of-being-hacked\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">60% of SMEs<\/a> who were victims of a data breach went out of business in less than 6 months after a report of data breach from their firm. These statistics are all frustrating, but I\u2019m personally more concerned by the fact that even today, most of the SMEs are not willing to take serious safety measures in their company to protect data.<\/p>\n<h2>It is not just about \u2018loss of data\u2019<\/h2>\n<p>Data breaches also result in a loss of customers. Customer satisfaction and trust are two important parameters to be considered since victims of cybercrime are much more likely to develop negative feelings toward a company that was unable to protect itself and its customers.<\/p>\n<p>When the consumers were asked about recent high-profile cyber-attacks,<\/p>\n<ul>\n<li>71% admitted that they believed these events were damaging to the organization&#8217;s reputation.<\/li>\n<li>65% said that it decreased their trust in the brand.<\/li>\n<li>53% thought that it would damper people\u2019s engagement with the brand in the future.<\/li>\n<\/ul>\n<p>It\u2019s evident from the <a href=\"https:\/\/www.opinium.com\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">statistics<\/a> that the majority of customers are unwilling to cooperate with a firm affected by a data breach. Customer loss has a huge impact on financial deprivation. It is estimated that companies who lost 4% of their customers from a data breach could see the overall average cost of the incident rise to $5.1 million.<\/p>\n<p>Adding on, many companies shut down during cyber-attacks. Even this can be disastrous in terms of loss of wealth to a company as employee salary and other costs related to inventory management, equipment handling can add up to a humongous amount. (<a href=\"https:\/\/blog.avast.com\/the-cost-of-data-loss-to-your-small-business-avast\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">This can be as large as $72000+ on a weekly basis for a 20 employee company<\/a> )<\/p>\n<p>Furthermore, several countries have laws to ensure that the companies comply with a variety of state and federal laws and regulations. You might have heard about HIPAA <a href=\"https:\/\/www.hexnode.com\/blogs\/maintain-hipaa-compliance-with-mdm\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">(Health Insurance Portability and Accountability Act)<\/a> and GDPR\u00a0<a href=\"https:\/\/www.hexnode.com\/blogs\/gdpr-compliance-hexnode-mdm-step-ahead-towards-data-protection\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">(General Data Protection Regulation)<\/a>. Failure to manage your customer data in accordance with these relevant laws can also result in fines, litigation, and even criminal convictions.<\/p>\n<p>The bottom line is that data loss could be really troublesome for your firm. Without doubt the companies that are yet to take any precautionary measures are more prone to cyber-attacks in the future.<br \/>\nHaving understood some of the unfortunate incidents caused by a data breach, let\u2019s talk about a transition that might have a small influence in accelerating of data breaches.<\/p>\n<h2>BYOD: hero or villain?<\/h2>\n<p>With more than 6 billion unique smartphone users across the world, the concept of &#8216;Bring Your Own Device&#8217; for work was a groundbreaking thought. Especially during the pandemic situation, when everything was falling apart, most of the SMEs including IT companies managed to survive by incorporating BYOD and work from home concepts in their firms.<\/p>\n<p>Even though BYOD was a successful initiative, any spectator with a decent knowledge about computers and internet could see the security flaws that are brought to a company by BYOD. Cyber criminals are always looking for potential opportunities to steal corporate data. With unmanaged BYOD, the risk factor was really high as these portable devices were more prone to phishing scams, data leakage and spyware. On top of all these, the enterprises had to account for the possibility of an employee losing a mobile device or the device getting stolen.<\/p>\n<p>A <a href=\"https:\/\/www.hexnode.com\/blogs\/byod-management-in-the-workplace-do-you-need-it\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">managed BYOD<\/a> that is equipped with a proper device management solution on the other hand, could eliminate all the above-mentioned problems and provide the SMEs with a much better insight about the status of end-user devices.\u00a0Before we dwell into the contents of device management, we may go through device security and how implementing device security via a UEM can be decisive.<\/p>\n<h2>Device security: need or necessity?<\/h2>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/Professional-IT-Engineers-Working-in-System-Control-Center-scaled.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/Professional-IT-Engineers-Working-in-System-Control-Center-scaled.jpg\" alt=\"Cybersecurity personnels in a meeting\" width=\"682\" height=\"425\" \/><\/a><\/center><center><em>A supervisor giving instructions to his team about cybersecurity<\/em><\/center>&nbsp;<\/p>\n<p>Device security is a broad term to indicate all the measures designed to protect device information present in portable work devices such as laptops, mobile phones, desktops, and others. Data breach often take place due to the absence of a proper device security solution. There are four types of mobile device security threats,<\/p>\n<h4>1. Application security threats<\/h4>\n<p>Application based threats happen when people choose to download applications from unknown sites. These may look like legitimate apps but in reality, they\u2019re designed in a way to steal user data. In most cases the user may not be realizing that his data is being leaked in this manner.<\/p>\n<h4>2. Web based mobile security threats<\/h4>\n<p>These are the most common cases of data theft as these thefts are difficult to identify and hence go unnoticed for longer periods of time. Web based security threats happen when people go through malicious websites that might seem fine on the front but, in reality they download unwanted content in to a system without the user\u2019s knowledge.<\/p>\n<h4>3. Network security threats<\/h4>\n<p>These threats are also common and mainly these occur when cyber attackers target unsecured or free to use public WI-FI connections. In certain cases, hackers also create spoof networks that users unknowingly enter by providing user name and password, giving hackers the opportunity to compromise devices and credentials.<\/p>\n<h4>4. Device security threats<\/h4>\n<p>Physical threats to mobile devices refer to a case where the devices are stolen or lost. This threat becomes a danger for enterprises when people don\u2019t use a strong password, PIN or biometric authentication. The results of mobile device threats are that the attackers easily hack into the enterprise network using the device they obtained and to manipulate the corporate data.<\/p>\n<p>Each of these threats can result in data loss, and device security is an all-inclusive solution that can avert the possibility of these threats. Having understood that the effect of a breach can be disastrous, it\u2019s always wise to prepare yourself before it happens.<br \/>\n<section id='resource-single'>\n                    <div class='resource-box'>\n                        <div class='resource-box__image-section'>\n                            <div class='resource-box__image-wrap'>\n                                <img decoding=\"async\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2022\/06\/Building-a-cybersecurity-framework-for-your-enterprise.png?format=webp\" class=\"resource-box__image\" alt=\"Building a cybersecurity framework for your enterprise\" loading=\"lazy\" srcset=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2022\/06\/Building-a-cybersecurity-framework-for-your-enterprise.png?format=webp 864w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2022\/06\/Building-a-cybersecurity-framework-for-your-enterprise-234x300.png?format=webp 234w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2022\/06\/Building-a-cybersecurity-framework-for-your-enterprise-798x1024.png?format=webp 798w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2022\/06\/Building-a-cybersecurity-framework-for-your-enterprise-768x985.png?format=webp 768w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2022\/06\/Building-a-cybersecurity-framework-for-your-enterprise-78x100.png?format=webp 78w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" title=\"Building-a-cybersecurity-framework-for-your-enterprise\" \/>\n                            <\/div>\n                        <\/div>\n                        <div class='resource-box__content-section'>\n                            <h5 class='resource-box__content-subheading'>\n                            Featured resource\n                            <\/h5>\n                            <h4 class='resource-box__content-heading'>\n                            Building a cybersecurity framework for your enterprise\n                            <\/h4>\n                            <p class='resource-box__contents'>\n                            A cybersecurity framework consists of the best practices organizations can implement to manage all risks found within the scope of their business activities. Read this guide to get more insights on building the right cybersecurity framework for your organization.\n                            <\/p>\n                            <a class='resource-box__content-link hn-cta__blogs--resource-box' href='https:\/\/www.hexnode.com\/resources\/white-papers\/building-a-cybersecurity-framework-for-your-enterprise\/?utm_source=hexnode_blog_SME_cybersecurity&utm_medium=referral&utm_campaign=resource_box'>\n                            Download White paper\n                            <svg xmlns='http:\/\/www.w3.org\/2000\/svg' width='20' height='20' viewBox='0 0 20 20'>\n                            <g id='arrow' transform='translate(-309 -191)' opacity='0'>\n                                <rect id='base' width='20' height='20' transform='translate(309 191)' fill='none'\/>\n                                <path id='arrow-2' data-name='arrow' d='M13.093.5,6.8,6.8.5.5' transform='translate(315 207.594) rotate(-90)' fill='none' stroke='#0549d1' stroke-linecap='round' stroke-linejoin='round' stroke-width='1.2'\/>\n                            <\/g>\n                            <\/svg>\n\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                <\/section> <\/p>\n<h2>Get yourselves prepared with a UEM solution<\/h2>\n<p>UEM can be your go-to-go solution. You can choose any device management solution but make sure that it\u2019s apt for your SME.<br \/>\nHexnode UEM is an award-winning device management solution. Following are some of the endpoint management functions provided by Hexnode that can help you to secure your corporate data from the possibility of a data breach.<\/p>\n<h3>1. Wipe device<\/h3>\n<p>If a device goes missing or stolen and it contains sensitive data that you cannot risk being compromised, Lock device is your primary solution. But in certain cases, device passwords might be much easier to crack and to protect your data from reaching wrong hands, you\u2019re left with just a single option which is <a href=\"https:\/\/www.hexnode.com\/blogs\/remotely-wipe-phone-with-hexnode-mdm\/\" target=\"_blank\" rel=\"noopener\">device wipe<\/a> . In BYOD devices, only the work container will be wiped and this is called corporate wipe.<\/p>\n<p>Device wipe is supported in almost all the platforms like Android, macOS, iOS, Windows and even tvOS.<\/p>\n<h3>2. Lost mode<\/h3>\n<p>Hexnode UEM\u2019s Lost mode is a remote action that is aimed at protecting lost devices. Once the lost mode is activated, the device gets locked automatically and it stays in lost mode until the IT admin removes the lost mode policy. But in Android devices, one can exit from lost mode manually by entering the global exit passcode. During lost mode, all device activities will be stopped. By applying a <a href=\"https:\/\/www.hexnode.com\/blogs\/lost-mode-for-windows\/\" target=\"_blank\" rel=\"noopener\">location tracking policy,<\/a> the exact location of device can be identified.<\/p>\n<p>Lost mode is supported on device platforms like Android, Windows and iOS.<\/p>\n<h3>3. Password policy<\/h3>\n<p>Enforcing a strong device password is always the first line of defense for any corporate device. The password policy help enterprises to setup strong password requirements on their endpoint devices. Setting a strong password policy ensure that the end user meets these <a href=\"https:\/\/www.hexnode.com\/blogs\/enforce-password-policy\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">minimum requirements<\/a> while choosing their device password.<\/p>\n<p>Password policy can be applied to platforms like Windows, Android, iOS and macOS. If the end user password does not match the corporate set criteria; the device will be marked non-compliant. Hexnode has an inbuilt dashboard where an IT admin can review the compliance status of every enrolled device.<\/p>\n<h3>4. Blacklist\/Whitelist applications<\/h3>\n<p>With blacklisting and whitelisting of applications, an IT admin can regulate the access to certain apps that might be unsuitable for work environment.<\/p>\n<p>The set of apps that are unsafe or deemed to be inappropriate for the organization can be marked as blacklisted. Having a blacklisted app with malicious intent can make the device \u201cApplication non-compliant&#8221;. Blacklisting apps restrict the user from installing or accessing an app or a group of apps on the device.<\/p>\n<p>Whitelisting, on the other hand, allows a set of pre-selected apps to function in the device, blocking all others. Whitelisting allows the administrators to limit the set of applications the user can execute in his or her device.<\/p>\n<h3>5. VPN<\/h3>\n<p>A Virtual Private Network or VPN is a cloak of anonymity that reroutes the internet activity of a user. VPN uses a secure encrypted connection and thus help to mask user activity like search history, downloaded files, online activities, geolocation and more from possible attackers. The IT admin can configure a VPN server setting on devices such as iOS, macOS, Android and Windows devices via a policy in Hexnode UEM, which, when associated with target entities, sets up VPN configurations in the devices and creates new connections to the network.<br \/>\n<div class=\"next_blog\"><div class=\"post-next\"><div class=\"hex_blog_box_parent\"><div class=\"blog_warp_next\"><div class=\"next_blog_thumb\" style=\"background-image:url(https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/06\/Choosing-the-right-VPN-for-apple-devices.png?format=webp)\"><\/div><div class=\"next_post_content\"><div class=\"center_box\"><h4>On-Demand, Per App or Always On? Choosing the right VPN for Apple devices <\/h4><p>Setting up a VPN for Apple devices may sound very complex, but it\u2019s a breeze for a device managed by a modern UEM solution.<\/p><\/div><\/div><\/div><a class=\"hex_blog_box_link hn-cta__blogs--blog-box\" href=\"https:\/\/www.hexnode.com\/blogs\/choosing-the-right-vpn-for-apple-devices\/?utm_source=sme_cybersecurity&utm_medium=referral&utm_campaign=blog_box\" aria-label=\"On-Demand, Per App or Always On? Choosing the right VPN for Apple devices \"><\/a><\/div><\/div><\/div><\/p>\n<h3>6. Remote troubleshooting<\/h3>\n<p>Hexnode UEM\u2019s remote view action enables the IT admins to remotely connect to an endpoint device display in real-time. Remote view enables the IT admin to <a href=\"https:\/\/www.hexnode.com\/blogs\/infographic-remote-monitoring-and-management-faqs\/\" target=\"_blank\" rel=\"noopener\">supervise his endpoint devices<\/a> and can also provide valuable suggestions to a user who needs assistance. In Samsung Knox devices, Remote control is also possible where the admin can remotely control the endpoint device.<\/p>\n<h3>7. Global HTTP proxy<\/h3>\n<p>This policy helps to ensure that all the HTTP network communication is passing through a pre-configured proxy server. Global HTTP proxy helps prevent any possible attacks like phishing, buffer overflow and even SQL injection.<br \/>\nSupported on Android, macOS and iOS devices<\/p>\n<h3>8. Web content filtering<\/h3>\n<p>Web content filtering is a <a href=\"https:\/\/www.hexnode.com\/blogs\/what-is-web-content-filtering\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">perfect remedy<\/a> against web-based security threats. It allows the IT admins to be the moderators of your worker\u2019s web traffic. Any unwanted site can be blacklisted and the employee won\u2019t be able to access that website from his or her corporate device.<\/p>\n<h3>9. Geofencing<\/h3>\n<p>Geofencing is a location-based restriction. By applying geofence policy, a <a href=\"https:\/\/www.hexnode.com\/blogs\/geofencing-and-hexnode-mdm\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">virtual fence<\/a> is created around a geographical region and if the device goes out of this virtual fence the IT admins will be notified. This feature can be used in association with dynamic grouping and Hexnode policies to adapt to a wide range of use cases like making corporate resources and device configurations available based on device location or creating a compliance-based alert system that detects and notifies the admin if a device goes out of the geofence.<\/p>\n<h2>Takeaways<\/h2>\n<p>Otto Von Bismarck once quoted, \u201cA little caution outflanks a large cavalry\u201d. We\u2019ve seen the disastrous impact of data breaches and device security threats on SMEs. The struggle is real. The cavalry of cyber attackers is increasing in number every day. If a small caution could avert the danger, <a href=\"https:\/\/www.hexnode.com\/?utm_source=sme_cybersecurity&amp;utm_medium=referral&amp;utm_campaign=internal_link\" target=\"_blank\" rel=\"noopener\">then why not?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an enterprise owner, you\u2019re sure to take umpteen measures to protect your firm from&#8230;<\/p>\n","protected":false},"author":44,"featured_media":14214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4914,2021],"tags":[5039,5024,4967],"class_list":["post-14165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-insights","category-best-practices","tag-uem-for-smes","tag-cyber-threats","tag-data-security","tab_group-immersive-reads"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SME cybersecurity - 9 essential elements<\/title>\n<meta name=\"description\" content=\"SMEs are highly prone to data thefts. Take a look at some measures you can implement in your firms to enhance SME cybersecurity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SME cybersecurity - 9 essential elements\" \/>\n<meta property=\"og:description\" content=\"SMEs are highly prone to data thefts. Take a look at some measures you can implement in your firms to enhance SME cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-03T04:06:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-16T07:23:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/04140839\/SME-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ian Ziv\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian Ziv\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/\",\"name\":\"SME cybersecurity - 9 essential elements\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/SME-cybersecurity.jpg?format=webp\",\"datePublished\":\"2021-11-03T04:06:19+00:00\",\"dateModified\":\"2023-07-16T07:23:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6e98f56bc61450a31f8d8e7b4834cd24\"},\"description\":\"SMEs are highly prone to data thefts. Take a look at some measures you can implement in your firms to enhance SME cybersecurity\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/SME-cybersecurity.jpg?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/SME-cybersecurity.jpg?format=webp\",\"width\":1280,\"height\":688,\"caption\":\"Managers discussing about the importance of SME cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Should SMEs take cybersecurity seriously?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6e98f56bc61450a31f8d8e7b4834cd24\",\"name\":\"Ian Ziv\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b310e1e163d92391e206378e6f6690e9804cc07d77221110274ac6c00c3d3ab0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b310e1e163d92391e206378e6f6690e9804cc07d77221110274ac6c00c3d3ab0?s=96&d=mm&r=g\",\"caption\":\"Ian Ziv\"},\"description\":\"Sometimes it feels like I'm living in a simulation. But the other times? I'm trying to figure out what to eat\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/ian-ziv\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SME cybersecurity - 9 essential elements","description":"SMEs are highly prone to data thefts. Take a look at some measures you can implement in your firms to enhance SME cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/","og_locale":"en_US","og_type":"article","og_title":"SME cybersecurity - 9 essential elements","og_description":"SMEs are highly prone to data thefts. Take a look at some measures you can implement in your firms to enhance SME cybersecurity","og_url":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/","og_site_name":"Hexnode Blogs","article_published_time":"2021-11-03T04:06:19+00:00","article_modified_time":"2023-07-16T07:23:45+00:00","og_image":[{"width":1280,"height":688,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/04140839\/SME-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Ian Ziv","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ian Ziv","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/","url":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/","name":"SME cybersecurity - 9 essential elements","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/SME-cybersecurity.jpg?format=webp","datePublished":"2021-11-03T04:06:19+00:00","dateModified":"2023-07-16T07:23:45+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6e98f56bc61450a31f8d8e7b4834cd24"},"description":"SMEs are highly prone to data thefts. Take a look at some measures you can implement in your firms to enhance SME cybersecurity","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/SME-cybersecurity.jpg?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2021\/11\/SME-cybersecurity.jpg?format=webp","width":1280,"height":688,"caption":"Managers discussing about the importance of SME cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/sme-cybersecurity-9-essential-elements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Should SMEs take cybersecurity seriously?"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6e98f56bc61450a31f8d8e7b4834cd24","name":"Ian Ziv","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b310e1e163d92391e206378e6f6690e9804cc07d77221110274ac6c00c3d3ab0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b310e1e163d92391e206378e6f6690e9804cc07d77221110274ac6c00c3d3ab0?s=96&d=mm&r=g","caption":"Ian Ziv"},"description":"Sometimes it feels like I'm living in a simulation. But the other times? I'm trying to figure out what to eat","url":"https:\/\/www.hexnode.com\/blogs\/author\/ian-ziv\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/14165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=14165"}],"version-history":[{"count":32,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/14165\/revisions"}],"predecessor-version":[{"id":26430,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/14165\/revisions\/26430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/14214"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=14165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=14165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=14165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}