{"id":4793,"date":"2016-12-13T15:32:44","date_gmt":"2016-12-13T23:32:44","guid":{"rendered":"http:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/"},"modified":"2016-12-13T15:32:44","modified_gmt":"2016-12-13T23:32:44","slug":"cybersecurity-everybodys-business","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/","title":{"rendered":"Cybersecurity is Everybody\u2019s Business"},"content":{"rendered":"<p dir=\"ltr\"><a href=\"http:\/\/clikcloud.net\/wp-content\/uploads\/2016\/09\/shutterstock_397766131.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft  wp-image-3821\" alt=\"Cyber Security\" src=\"http:\/\/clikcloud.net\/wp-content\/uploads\/2016\/09\/shutterstock_397766131-150x150.jpg\" width=\"120\" height=\"120\" \/><\/a>It is no surprise, technology flattens the world for many businesses. What\u2019s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.<\/p>\n<h1 dir=\"ltr\">Cybersecurity Risks Go Beyond Borders<\/h1>\n<p dir=\"ltr\">Factors outside industry, including geographic considerations and sensitive consumer data, can create cybersecurity risks that need to be managed. These factors run the gamut of domestic and international laws, regulatory bodies, and private-party business agreements. Cybersecurity compliance can touch every business to some degree.<\/p>\n<h1 dir=\"ltr\">Internet of Things (IoT) and Cybersecurity<\/h1>\n<p dir=\"ltr\">Adding to the list of concerns are non-traditional technologies entering your businesses network. IP-enabled technology called Internet of Things (IoT) is rapidly being adopted in the workplace. \u00a0The Cybersecurity threat is moving beyond desktops, laptops and services. A new generation of mobile devices&#8211;Point of Sale (POS), IP video surveillance, embedded sensors, VoIP, and others&#8211;is just the first wave of emerging technologies that need to be secured.<\/p>\n<h1 dir=\"ltr\">How to Minimize Cybersecurity Risks<\/h1>\n<p dir=\"ltr\">There are many things a business can do to reduce Cybersecurity threats. According to the Computing Technology Industry Association (CompTIA), the following elements are the building blocks for a cybersecurity program:<\/p>\n<div dir=\"ltr\"><\/div>\n<ul>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Documented policies, procedures &amp; standards<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Asset management<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Identity &amp; access controls<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Risk management<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Vendor management<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Physical &amp; environmental security<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Compliance<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Privacy<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Remote access<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Data backups<\/p>\n<\/li>\n<li dir=\"ltr\">\n<p dir=\"ltr\">Data destruction<\/p>\n<\/li>\n<\/ul>\n<p>Cybersecurity threats are a reality of today\u2019s world. The risks of data compromise and\/or loss can cost more than dollars; such risks can cost your reputation. Your business is only as secure as your Network. If you have questions about your business needs, ask your technology advisor about how to manage Cybersecurity threats to your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is no surprise, technology flattens the world for many businesses. What\u2019s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.  <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6,100],"tags":[8,9,10,13,118,24,25,28,40,55,56,57],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity is Everybody\u2019s Business<\/title>\n<meta name=\"description\" content=\"It is no surprise, technology flattens the world for many businesses. What\u2019s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/\",\"name\":\"Cybersecurity is Everybody\u2019s Business\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2016-12-13T23:32:44+00:00\",\"dateModified\":\"2016-12-13T23:32:44+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"It is no surprise, technology flattens the world for many businesses. What\u2019s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity is Everybody\u2019s Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity is Everybody\u2019s Business","description":"It is no surprise, technology flattens the world for many businesses. What\u2019s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/","url":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/","name":"Cybersecurity is Everybody\u2019s Business","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2016-12-13T23:32:44+00:00","dateModified":"2016-12-13T23:32:44+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"It is no surprise, technology flattens the world for many businesses. What\u2019s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/cybersecurity-everybodys-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity is Everybody\u2019s Business"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/4793"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=4793"}],"version-history":[{"count":0,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/4793\/revisions"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=4793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=4793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=4793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}