{"id":5514,"date":"2018-11-13T16:57:33","date_gmt":"2018-11-13T23:57:33","guid":{"rendered":"http:\/\/clikcloud.com\/?p=5673"},"modified":"2018-11-13T18:02:40","modified_gmt":"2018-11-14T01:02:40","slug":"what-is-cybersecurity-and-why-it-matters","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/","title":{"rendered":"What is Cybersecurity and Why it Matters"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as well, and may not have the resources to overcome a data breach. According to <\/span><a href=\"http:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/09\/12\/explaining-the-new-normal-in-cybersecurity-to-the-c-suite\/#dbe66d2568a8\"><span style=\"font-weight: 400;\">Forbes<\/span><\/a><span style=\"font-weight: 400;\">, the question is not if a cyber attack will occur, but when. Read on to learn what comprises cybersecurity and why it is so important. <\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is Cybersecurity?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/cybersecurity\"><span style=\"font-weight: 400;\">definition<\/span><\/a><span style=\"font-weight: 400;\"> of cybersecurity is \u201cthe protection of Internet-connected systems&#8211;including hardware, software, and data&#8211;from cyber attacks.\u201d It can be thought of as a constellation of equipment and practices designed to keep a company\u2019s data and infrastructure safe from natural and man-made hazards. On the technical side, protections include operating system patches and current anti-virus and anti-malware definitions. Data encryption is another key protection, both on-premise and in the cloud. On the human side, employees need to learn how to protect the company\u2019s data by recognizing attempts by hackers to get into the company\u2019s systems. Phishing schemes are one such way cybercriminals attempt to steal passwords and other data. If an attack happens, employees need to be trained in how to report and escalate it. All of these aspects can make a difference in keeping your business, in business.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The Importance of Cybersecurity<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With cybercriminals becoming ever more sophisticated, and technological innovations such as the Internet of Things developing quickly, there are more points at which a business\u2019s systems and data can be threatened. And what does this mean for your company? If a data breach occurs, customer data can be stolen or lost, especially sensitive information. In this case, the business can lose clients\u2019 trust and, in strictly regulated industries, be subject to steep fines. If nothing else, an outage can result in lost revenue and employee downtime. Natural disasters such as fires and storms can also put business continuity at risk. Of businesses suffering a disaster, many are out of business within two years. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Protection from cyber attacks is well worth the time and money. If you are unsure about your business\u2019 protections, contact your technology advisor today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as well, and may not have the resources to overcome a data breach. According to Forbes, the question is not if a cyber attack will occur, but when. Read on to learn what comprises cybersecurity and why it is so important.<\/p>\n","protected":false},"author":1,"featured_media":5516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100],"tags":[22],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cybersecurity and Why it Matters<\/title>\n<meta name=\"description\" content=\"Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as well, and may not have the resources to overcome a data breach. According to Forbes, the question is not if a cyber attack will occur, but when. Read on to learn what comprises cybersecurity and why it is so important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/\",\"name\":\"What is Cybersecurity and Why it Matters\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2018-11-13T23:57:33+00:00\",\"dateModified\":\"2018-11-14T01:02:40+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as well, and may not have the resources to overcome a data breach. According to Forbes, the question is not if a cyber attack will occur, but when. Read on to learn what comprises cybersecurity and why it is so important.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cybersecurity and Why it Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cybersecurity and Why it Matters","description":"Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as well, and may not have the resources to overcome a data breach. According to Forbes, the question is not if a cyber attack will occur, but when. Read on to learn what comprises cybersecurity and why it is so important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/","url":"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/","name":"What is Cybersecurity and Why it Matters","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2018-11-13T23:57:33+00:00","dateModified":"2018-11-14T01:02:40+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as well, and may not have the resources to overcome a data breach. According to Forbes, the question is not if a cyber attack will occur, but when. Read on to learn what comprises cybersecurity and why it is so important.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/what-is-cybersecurity-and-why-it-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"What is Cybersecurity and Why it Matters"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5514"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5514"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5514\/revisions"}],"predecessor-version":[{"id":5515,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5514\/revisions\/5515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5516"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}