{"id":1364,"date":"2016-08-08T08:00:23","date_gmt":"2016-08-08T12:00:23","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1364"},"modified":"2021-07-07T05:05:10","modified_gmt":"2021-07-07T09:05:10","slug":"study-reveals-more-than-50-of-smbs-have-experienced-a-data-breach-in-past-year","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1364","title":{"rendered":"Why is Cybersecurity Important? Half of SMBs Suffered Data Breaches In the Past Year."},"content":{"rendered":"<p style=\"text-align: justify;\">A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies\u2019 security required significant time and investment in order to successfully, if ever, penetrate the network. Soon, attacks were redirected toward a much easier target, SMBs, who often lack the budget or in-house expertise to prevent the same potential attacks, resulting in a higher frequency in SMB breaches.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Rate of Attacks:<\/strong><\/span> In today\u2019s environment, no business is too small to evade an attack or breach.\u00a0 For example, the study revealed of the more than 598 SMB respondents, nearly 55% said their companies experienced a cyber-attack, while 50 percent reported having a data breach involving customer and employee information, all within the past 12 months.\u00a0 What many SMBs don\u2019t realize however, is that a breach often goes undetected for quite some time.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8444\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Breaches-Attacks-768x522-1-300x204.png\" alt=\"\" width=\"500\" height=\"340\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Breaches-Attacks-768x522-1-300x204.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Breaches-Attacks-768x522-1.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\">It is a staggering realization only compounded when you consider the average cost of the incidents being $879,582 in damages or the comparable theft of IT assets; this does not account for the disruption in operations which averaged $955,429, or the average company losing more than 5,000 individual records as a result of the breach.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">Key Findings:<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>1.\u00a0<\/strong><\/span>The most common attacks used against SMBs were Web-Based and Phishing\/Social Engineering facilitated by negligent employees, contractors, and third parties sources.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8445\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Types-of-Attacks-768x740-1-300x289.png\" alt=\"\" width=\"500\" height=\"482\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Types-of-Attacks-768x740-1-300x289.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Types-of-Attacks-768x740-1.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8446\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Causes-of-Data-Breach-768x562-1-300x220.png\" alt=\"\" width=\"500\" height=\"366\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Causes-of-Data-Breach-768x562-1-300x220.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Causes-of-Data-Breach-768x562-1.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">2.<\/span>\u00a0<\/strong>When companies where asked what information they were most concerned over losing from a cyber-attack, the vast majority cited the potential loss or theft of customers\u2019 information and intellectual property.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8447\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Most-Concerned-Information-768x955-1-241x300.png\" alt=\"\" width=\"500\" height=\"622\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Most-Concerned-Information-768x955-1-241x300.png 241w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Most-Concerned-Information-768x955-1.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">3.<\/span>\u00a0<\/strong>Strong password and biometrics were recognized by the respondents as an essential part of their security defense strategies. Yet, despite being acknowledged and incorporated as a part of their security practices, few organizations had visibility into their employees\u2019 password practices, and\/or rarely enforce their own written security policies. (WISP)<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8448\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Password-Thoughts-768x386-1-300x151.png\" alt=\"\" width=\"500\" height=\"251\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Password-Thoughts-768x386-1-300x151.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Password-Thoughts-768x386-1.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">4.<\/span>\u00a0<\/strong>To make matters worse, many current technologies are unsuccessful in detecting or blocking many of today\u2019s targeted attacks. Most exploits have been engineered to evade detection systems or anti-virus solutions and rely on fooling end users to infiltrate otherwise secure networks and data.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8449\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Evading-Anti-Virus-768x844-1-273x300.png\" alt=\"\" width=\"500\" height=\"549\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Evading-Anti-Virus-768x844-1-273x300.png 273w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Evading-Anti-Virus-768x844-1.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">5.<\/span>\u00a0<\/strong>Some other factors contributing to the influx of intrusions are attributed to a lack of personnel, limited budgets, and insufficient or inappropriate technologies used to prevent these intrusions. The exhibit below outlines the prevalence of shortcomings throughout SMBs.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8450\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/IT-Security-Challenges-768x697-1.png\" alt=\"\" width=\"500\" height=\"454\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/IT-Security-Challenges-768x697-1.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/IT-Security-Challenges-768x697-1-300x272.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">6.\u00a0<\/span><\/strong>Determination of IT security priorities is not centralized. Some of the positions responsible are the Chief Executive and Chief Information Officer.\u00a0 However, thirty-five percent of respondents stated that no one position consistently determines the IT policies.\u00a0 This is a key role that requires expertise and knowledge of cyber security in order to make sound decisions that protects your business.\u00a0\u00a0 Without clear guidance, the risks are often left unchecked.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8451\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Determines-IT-Policies-768x252-1.png\" alt=\"\" width=\"500\" height=\"164\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Determines-IT-Policies-768x252-1.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Determines-IT-Policies-768x252-1-300x98.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">7.\u00a0<\/span><\/strong>Web and intranet servers are the most vulnerable endpoints or entry points to network and enterprise systems, with fifty-two percent of respondents stating their companies\u2019 Web Servers and forty-six percent of respondents saying their intranet servers are most vulnerable to attack. Yet despite this, many do not feel the threat of an attack is important enough to include in the current security strategy.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8452\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Vulnerable-Endpoints-768x807-1.png\" alt=\"\" width=\"500\" height=\"525\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Vulnerable-Endpoints-768x807-1.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Vulnerable-Endpoints-768x807-1-286x300.png 286w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">8.\u00a0<\/span><\/strong>Despite the influx of cyber-attacks toward SMBs, unsecured cloud usage and mobile device access to business applications\/infrastructure continue to become the industry standard, further weakening the network for future exploitation if the security of the information being transmitted is not also being taken into consideration. Nearly 29% believe the use of cloud services inherently improves their security posture, however, it is not enough to ensure protection against an attack, in fact, without proper network protection and end user education, you could open your entire cloud storage for anyone to grab.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8453\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Cloud-Security-Posture-768x669-1.png\" alt=\"\" width=\"500\" height=\"436\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Cloud-Security-Posture-768x669-1.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Cloud-Security-Posture-768x669-1-300x261.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Final Thoughts:<\/strong><\/span>\u00a0 While the continued advancement in technology has increased our mobility, access, and productivity, it has also made companies which were previously thought too small to be concerned with the potential risk of a cyber-attack extremely susceptible to infiltration.<\/p>\n<p style=\"text-align: justify;\">Many SMBs with budgetary constraints and limited expertise are now subject to the same security responsibilities of a company competing on the global scale.\u00a0 It is why having a trusted IT MSP is so vital to ensuring the safety and security of your company\u2019s future.\u00a0 To learn how Technical Support International can help you mitigate your exposure to risk and build a secure solution, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">contact us<\/a> today!<\/p>\n<p style=\"text-align: justify;\">Source:\u00a0 Exclusive Research Report: The 2016 State of SMB Cybersecurity. Ponemon Institute, n.d. Web.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new study on the topic of Cyber-security and the proliferation of cyber-attacks against Small and Medium-Sized Businesses (SMB) was released this month. Historically, criminals would focus attacks on larger enterprise level organizations in an effort to reap a much larger reward. However, the level of technical expertise needed to infiltrate these companies\u2019 security required&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[151,152,131,211,270,129,176,169,170],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why is Cybersecurity Important?| 50% of SMBs Suffered Data Breaches | TSI<\/title>\n<meta name=\"description\" content=\"Learn why cybersecurity is important. Read about the findings from a new study on SMBs and the affect of cyber-attacks on small and medium-sized businesses.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why is Cybersecurity Important?| 50% of SMBs Suffered Data Breaches | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn why cybersecurity is important. Read about the findings from a new study on SMBs and the affect of cyber-attacks on small and medium-sized businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1364\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-08T12:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:05:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364\",\"name\":\"Why is Cybersecurity Important?| 50% of SMBs Suffered Data Breaches | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png\",\"datePublished\":\"2016-08-08T12:00:23+00:00\",\"dateModified\":\"2021-07-07T09:05:10+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn why cybersecurity is important. Read about the findings from a new study on SMBs and the affect of cyber-attacks on small and medium-sized businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1364\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1364#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why is Cybersecurity Important? Half of SMBs Suffered Data Breaches In the Past Year.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why is Cybersecurity Important?| 50% of SMBs Suffered Data Breaches | TSI","description":"Learn why cybersecurity is important. Read about the findings from a new study on SMBs and the affect of cyber-attacks on small and medium-sized businesses.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why is Cybersecurity Important?| 50% of SMBs Suffered Data Breaches | TSI","og_description":"Learn why cybersecurity is important. Read about the findings from a new study on SMBs and the affect of cyber-attacks on small and medium-sized businesses.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1364","og_site_name":"TSI Support","article_published_time":"2016-08-08T12:00:23+00:00","article_modified_time":"2021-07-07T09:05:10+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1364","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1364","name":"Why is Cybersecurity Important?| 50% of SMBs Suffered Data Breaches | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1364#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1364#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png","datePublished":"2016-08-08T12:00:23+00:00","dateModified":"2021-07-07T09:05:10+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn why cybersecurity is important. Read about the findings from a new study on SMBs and the affect of cyber-attacks on small and medium-sized businesses.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1364#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1364"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1364#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/08\/Study-Reveals-More-Than-5025-of-SMBs-Have-Experienced-a-Data-Breach-in-Past-Year-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1364#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Why is Cybersecurity Important? Half of SMBs Suffered Data Breaches In the Past Year."}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1364"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1364"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1364\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8442"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}