{"id":2431,"date":"2013-12-26T08:23:29","date_gmt":"2013-12-26T16:23:29","guid":{"rendered":"http:\/\/clikcloud.net\/dna\/cyber-attack-target\/"},"modified":"2013-12-26T08:23:29","modified_gmt":"2013-12-26T16:23:29","slug":"cyber-attack-target","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/","title":{"rendered":"Cyber Attack Target"},"content":{"rendered":"<p dir=\"ltr\"><span style=\"font-size: 13px;line-height: 19px\">Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a security breach, it often is highlighted in the news. What the media fails to recognize, is the susceptibility of small businesses to cyber attacks.<\/span><\/p>\n<h2>Small Business are Susceptible to Cyber Attacks<\/h2>\n<p dir=\"ltr\">Many small business owners believe their company is too small to be targeted by cyber crime. According to Verizon Wireless\u2019s 2012 Data Breach Investigation Study, 71% of data breaches occur in companies with fewer than 100 employees. An information breach can be devastating to a small business. Malware, or software used to interrupt a computer&#8217;s processing, is the most common way of perpetrating these attacks. Small businesses are often unprepared when it comes to these sorts of attacks.<\/p>\n<h2>Protecting Data from Cyber Attacks<\/h2>\n<p dir=\"ltr\">Action should be taken to protect your small business and your customer\u2019s sensitive information. First, audit your network regularly. Periodically scan your network for unauthorized computers and devices connected to your network directly or via Wi-Fi. Also, update any antivirus or malware software regularly. Also check your firewall and security settings. Make sure all your defense mechanisms are up to date and working properly. \u00a0It is also important that all employee are trained on your policies and procedures for avoiding malware and identifying phishing schemes.<\/p>\n<p>It is important to keep a secure network to ensure your customers trust. By keeping all software up to date and checking systems regularly, you can minimize the risk of cyber attack and help protect your sensitive information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6],"tags":[8,9,25,40,43,47,48,55],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Attack Target<\/title>\n<meta name=\"description\" content=\"Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zorro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/\",\"name\":\"Cyber Attack Target\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2013-12-26T16:23:29+00:00\",\"dateModified\":\"2013-12-26T16:23:29+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\"},\"description\":\"Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Attack Target\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\",\"name\":\"zorro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"caption\":\"zorro\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Attack Target","description":"Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/","twitter_misc":{"Written by":"zorro","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/","url":"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/","name":"Cyber Attack Target","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2013-12-26T16:23:29+00:00","dateModified":"2013-12-26T16:23:29+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942"},"description":"Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users. Compromised information included credit and debit card information, as well as customer names. When large businesses are victims of a","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/cyber-attack-target\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Cyber Attack Target"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942","name":"zorro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","caption":"zorro"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/2431"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=2431"}],"version-history":[{"count":0,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/2431\/revisions"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=2431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=2431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=2431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}