{"id":32093,"date":"2022-03-01T23:22:31","date_gmt":"2022-03-02T04:22:31","guid":{"rendered":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/"},"modified":"2022-04-05T14:40:55","modified_gmt":"2022-04-05T19:40:55","slug":"cybercrimes-small-businesses-blog-the-logic-group","status":"publish","type":"post","link":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/","title":{"rendered":"Cybercrimes &#038; Small Businesses | Blog | The Logic Group"},"content":{"rendered":"<p dir=\"ltr\" style=\"line-height: 1.92; margin-top: 0pt; margin-bottom: 0pt; background-color: #ffffff;\">\n<div>Many small business owners think that cybercrimes only happens to Fortune 500 companies or government agencies.\u00a0 They\u2019re wrong!\u00a0 While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>With extremely valuable data such as customer records intellectual property customer credit card information financial information employee records and business correspondence small businesses are increasingly becoming the target of hackers.\u00a0 In their 2018 Cyber Risk report <a href=\"https:\/\/www.hiscox.com\/documents\/2018-Hiscox-Small-Business-Cyber-Risk-Report.pdf\" target=\"_blank\" rel=\"noopener\">Hiscox<\/a> stated that forty\u2011seven percent of small businesses suffered at least one cyber attack in the past 12 months.\u00a0 That\u2019s right nearly half of all small businesses have been attacked once and many have been attacked multiple times.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>A majority of small business owners don\u2019t have plans in place to deter attacks or detect them early.\u00a0 Also as you know small businesses also lack the capabilities to grapple with the financial losses associated with a data breach.\u00a0 While cyber insurance can help sixty-percent of small businesses will go out of business due to the inability to recover within six months of experiencing a cyber attack.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>The good news is that there are ways to fight back.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>Small businesses can take steps to counter this evolving threat. Companies can protect themselves with simple and cost-effective ways.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>\n<p dir=\"ltr\" style=\"text-align: center; line-height: 1.38; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Open Sans'; color: #4b4b4d; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">Phishing |General Malware | Compromised or Stolen devices<\/span><\/p>\n<p dir=\"ltr\" style=\"text-align: center; line-height: 1.38; margin-top: 0pt; margin-bottom: 8pt;\"><span style=\"font-size: 12pt; font-family: 'Open Sans'; color: #4b4b4d; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">Malicious insider |Ransomware<\/span><\/p>\n<div><span style=\"font-size: 12pt; font-family: 'Open Sans'; color: #4b4b4d; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">\u00a0<\/span><\/div>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>The list above represents some of the most common threats small businesses encounter.\u00a0 Since many of these attacks are using social engineering targeting employees by sending emails appearing to be from known contacts or companies in order to convince individuals to share personal information such as passwords and credit card numbers.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>Implementing a training program on these schemes is critical. This is a proven way to reduce the likelihood that one (or multiple) employees will open a nefarious email by helping to better identify one.\u00a0 Additionally training your team on the proper ways to create and manage passwords is important and easy.\u00a0 Best practices are to use long passphrases (including numbers letters and special characters) implement 2-factor authentication and apply password encryption.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>Other steps your business should consider are securing your access to the Internet using antispyware and antivirus software implement data policies and procedures and lock down your mobile devices.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div>You can also consult with your internal technology team or a full-service IT and network services provider like The Logic Group to help develop a plan for mitigating the impact of cybercrimes.<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><a href=\"https:\/\/thelogicgroup.com\/contact\/\" target=\"_self\" rel=\"noopener\">Contact the Logic Group<\/a> today to get a free evaluation of your current situation.<\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Any business can be the victim of cybercrime. Learn more about cybercrimes and how they can affect small businesses from The Logic Group&#8217;s Blog.<\/p>\n","protected":false},"author":13,"featured_media":32094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-32093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrimes &amp; Small Businesses | Blog | The Logic Group - The Logic Group<\/title>\n<meta name=\"description\" content=\"While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrimes &amp; Small Businesses | Blog | The Logic Group - The Logic Group\" \/>\n<meta property=\"og:description\" content=\"While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\" \/>\n<meta property=\"og:site_name\" content=\"The Logic Group\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-02T04:22:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-05T19:40:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Doug Yocco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Doug Yocco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\"},\"author\":{\"name\":\"Doug Yocco\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3\"},\"headline\":\"Cybercrimes &#038; Small Businesses | Blog | The Logic Group\",\"datePublished\":\"2022-03-02T04:22:31+00:00\",\"dateModified\":\"2022-04-05T19:40:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\"},\"wordCount\":427,\"commentCount\":3,\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\",\"url\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\",\"name\":\"Cybercrimes & Small Businesses | Blog | The Logic Group - The Logic Group\",\"isPartOf\":{\"@id\":\"https:\/\/thelogicgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg\",\"datePublished\":\"2022-03-02T04:22:31+00:00\",\"dateModified\":\"2022-04-05T19:40:55+00:00\",\"author\":{\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3\"},\"description\":\"While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.\",\"breadcrumb\":{\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage\",\"url\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg\",\"contentUrl\":\"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg\",\"width\":800,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/thelogicgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrimes &#038; Small Businesses | Blog | The Logic Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thelogicgroup.com\/#website\",\"url\":\"https:\/\/thelogicgroup.com\/\",\"name\":\"The Logic Group\",\"description\":\"Turn to The Logic Group for all your Philadelphia managed IT services.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thelogicgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3\",\"name\":\"Doug Yocco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g\",\"caption\":\"Doug Yocco\"},\"url\":\"https:\/\/thelogicgroup.com\/author\/dyoccoabstraktmg-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrimes & Small Businesses | Blog | The Logic Group - The Logic Group","description":"While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrimes & Small Businesses | Blog | The Logic Group - The Logic Group","og_description":"While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.","og_url":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/","og_site_name":"The Logic Group","article_published_time":"2022-03-02T04:22:31+00:00","article_modified_time":"2022-04-05T19:40:55+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg","type":"image\/jpeg"}],"author":"Doug Yocco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Doug Yocco","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#article","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/"},"author":{"name":"Doug Yocco","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3"},"headline":"Cybercrimes &#038; Small Businesses | Blog | The Logic Group","datePublished":"2022-03-02T04:22:31+00:00","dateModified":"2022-04-05T19:40:55+00:00","mainEntityOfPage":{"@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/"},"wordCount":427,"commentCount":3,"image":{"@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/","url":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/","name":"Cybercrimes & Small Businesses | Blog | The Logic Group - The Logic Group","isPartOf":{"@id":"https:\/\/thelogicgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage"},"image":{"@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage"},"thumbnailUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg","datePublished":"2022-03-02T04:22:31+00:00","dateModified":"2022-04-05T19:40:55+00:00","author":{"@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3"},"description":"While the potential for gain is higher with larger entities many have protections in place to combat hackers.\u00a0 Most small businesses don\u2019t.","breadcrumb":{"@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#primaryimage","url":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg","contentUrl":"https:\/\/thelogicgroup.com\/wp-content\/uploads\/2022\/03\/Cybercrimes-Small-Businesses-1.jpg","width":800,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/thelogicgroup.com\/cybercrimes-small-businesses-blog-the-logic-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thelogicgroup.com\/"},{"@type":"ListItem","position":2,"name":"Cybercrimes &#038; Small Businesses | Blog | The Logic Group"}]},{"@type":"WebSite","@id":"https:\/\/thelogicgroup.com\/#website","url":"https:\/\/thelogicgroup.com\/","name":"The Logic Group","description":"Turn to The Logic Group for all your Philadelphia managed IT services.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thelogicgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/a5db1afbf72970d1ec4b6b0f3e0131f3","name":"Doug Yocco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/thelogicgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a864342d50a97c4d5b0bdb07ab31eb9d3bcfe88d5b5d3a6fd94a73523964a84?s=96&d=mm&r=g","caption":"Doug Yocco"},"url":"https:\/\/thelogicgroup.com\/author\/dyoccoabstraktmg-com\/"}]}},"_links":{"self":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/comments?post=32093"}],"version-history":[{"count":0,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/posts\/32093\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media\/32094"}],"wp:attachment":[{"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/media?parent=32093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/categories?post=32093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thelogicgroup.com\/wp-json\/wp\/v2\/tags?post=32093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}