{"id":5516,"date":"2024-05-24T09:58:58","date_gmt":"2024-05-24T09:58:58","guid":{"rendered":"https:\/\/resizemyimg.com\/blog\/?p=5516"},"modified":"2024-09-02T22:48:03","modified_gmt":"2024-09-02T22:48:03","slug":"essential-cybersecurity-precautions-for-protecting-your-small-business","status":"publish","type":"post","link":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/","title":{"rendered":"Essential Cybersecurity Precautions for Protecting Your Small Business"},"content":{"rendered":"<p>Contrary to what you\u2019d read in the headlines, the modern cyber threat landscape is surprisingly egalitarian. For every data breach with millions of exposed records and equally high damage estimates, there are countless attacks targeting \u2013 and often crippling \u2013 small businesses.<\/p>\n<p>SMB owners don&#8217;t have the luxury of being too big to fail. However, they have the means to establish a formidable cybersecurity defense resistant to any attack. Here are the precautions to follow if you want to create such a defense.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5382\" src=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-scaled.jpg\" alt=\"clevguard security\" width=\"1800\" height=\"1200\" srcset=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-scaled.jpg 1800w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-300x200.jpg 300w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-1024x683.jpg 1024w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-575x383.jpg 575w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-768x512.jpg 768w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/02\/clevguard-security-1536x1024.jpg 1536w\" sizes=\"(max-width: 1800px) 100vw, 1800px\" \/><\/p>\n<h2>Assess Potential Threats &amp; Vulnerabilities<\/h2>\n<p>A successful cybersecurity strategy hinges on complete and timely information. What data does your business depend on and collect? Where is it stored? Which devices are part of your networks? What access policies are in place? Do you have a <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/disaster_recovery_plan\">disaster plan<\/a> in case of a data breach or other serious cyberattack? Having clear and current answers to these questions lets you shore up vulnerabilities and plan ahead.<\/p>\n<h2>Keep Devices Updated<\/h2>\n<p>Ensuring that devices use only the latest OS and program versions isn&#8217;t a cure-all. Still, it&#8217;s easy to enforce and a valuable safety measure. It prevents attackers from accessing your network via known exploits and happens automatically once you set it up. Mandating employees only to use work-issued devices and approved software to conduct business minimizes the potential attack area.<\/p>\n<h2>Use Firewalls<\/h2>\n<p>Firewalls are <a href=\"https:\/\/www.uschamber.com\/co\/run\/technology\/firewalls-for-small-business-security\">excellent defense tools<\/a> that protect hardware and software from harmful incoming and outgoing traffic. They can stop malware before it infiltrates a system or prevents careless employees from accessing blacklisted websites.<\/p>\n<h2>Implement Robust Access Policies<\/h2>\n<p>Giving everyone full access to sensitive files like customer information, patents, or marketing campaigns for upcoming products is irresponsible. Comprehensive access controls with a Zero-Trust policy ensure employees can do their jobs without issue but can\u2019t compromise data they have no need or right to interact with.<\/p>\n<h2>Enforce Strong Password Usage<\/h2>\n<p>Misplaced, simple, and duplicate passwords are to blame for far too many successful cyberattacks. <a href=\"https:\/\/nordpass.com\/business-password-manager\/\">Business password managers<\/a> eliminate the threat by supplying complex and unique passwords for as many accounts as employees need.<\/p>\n<p>They store these passwords securely in encrypted vaults while allowing users to sync account details across devices or fill login details in automatically and securely. Competent password managers also offer multi-factor authentication to prevent compromised or stolen credentials from endangering associated accounts.<\/p>\n<h2>Invest in Employee Training<\/h2>\n<p>Advanced, multilayered cybersecurity measures are still easy to bypass if hackers can exploit your poorly-trained workforce. The problem is common \u2013 studies estimate that <a href=\"https:\/\/securitytoday.com\/articles\/2022\/07\/30\/just-why-are-so-many-cyber-breaches-due-to-human-error.aspx\">the vast majority of data breaches<\/a> happen due to human error. While individually accountable, it&#8217;s unfair to shift the blame entirely on employees if the company doesn&#8217;t have up-to-date policies nor offers training opportunities that improve employees&#8217; competencies in recognizing and avoiding threats.<\/p>\n<h2>Encrypt &amp; Back Up Crucial Data<\/h2>\n<p>No prevention strategy guarantees 100% protection. However, some safeguards make recovery less painful. Encrypting important files makes their contents unreadable and, therefore, useless even if someone steals them from your network.<\/p>\n<p>Backups speed up disaster recovery and make your business less susceptible to ransomware attacks. Various effective backup strategies exist. Whichever you go for, make sure you regularly update the backups while keeping at least one offsite and offline.<\/p>\n<h2>Secure Remote Connections with a VPN<\/h2>\n<p>Small businesses aren\u2019t exempt from the WFH trend, which also comes with new cybersecurity challenges. While the pros outweigh the cons, employees need to exercise caution when accessing company resources, especially through vulnerable networks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2113\" src=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone.jpg\" alt=\"VPN locations on phone\" width=\"1849\" height=\"1200\" srcset=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone.jpg 1849w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone-300x195.jpg 300w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone-1024x665.jpg 1024w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone-575x373.jpg 575w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone-768x498.jpg 768w, https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2020\/11\/vpn-locations-on-phone-1536x997.jpg 1536w\" sizes=\"(max-width: 1849px) 100vw, 1849px\" \/><\/p>\n<p>Business VPNs mitigate connection insecurities through encrypted tunnels. Protection extends to the entire network, so users are secure whether browsing the web or exchanging confidential information with coworkers. Businesses that cater to a global audience can also take advantage of a VPN\u2019s worldwide server selection to assess their performance and accessibility in different markets. Though performance and speed can differ from provider to provider, it\u2019s good to evaluate market options, and sources like the <a href=\"https:\/\/www.reddit.com\/r\/VPN\/comments\/m736zt\/vpn_comparison_table\/\">VPN comparison table<\/a> make this easier.<\/p>\n<h2>Conclusion<\/h2>\n<p>The steady increase in cyber incidents and increasing sophistication of AI-fueled attacks make it abundantly clear that cybersecurity is neither a luxury nor a nice-to-have. It&#8217;s a core part of any business&#8217;s survival and growth strategy. Treat it as such to minimize risks and secure your small business&#8217;s uninterrupted growth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contrary to what you\u2019d read in the headlines, the modern cyber threat landscape is surprisingly egalitarian. For every data breach with millions of exposed records and equally high damage estimates, there are countless attacks targeting \u2013 and often crippling \u2013 small businesses. <\/p>\n<p class=\"read-more-container\"><a href=\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\" class=\"read-more button\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":5517,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[308,307,305,309,306,302,303,304],"class_list":["post-5516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-access-policies","tag-firewall","tag-internet-security","tag-password-use","tag-update-device","tag-vpn","tag-vpn-on-phone","tag-vpn-security","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essential Cybersecurity Precautions for Protecting Your Small Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Cybersecurity Precautions for Protecting Your Small Business\" \/>\n<meta property=\"og:description\" content=\"Contrary to what you\u2019d read in the headlines, the modern cyber threat landscape is surprisingly egalitarian. For every data breach with millions of exposed records and equally high damage estimates, there are countless attacks targeting \u2013 and often crippling \u2013 small businesses. Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Resize my Image Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/webfactoryltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-24T09:58:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T22:48:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"gordan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@webfactoryltd\" \/>\n<meta name=\"twitter:site\" content=\"@webfactoryltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gordan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\"},\"author\":{\"name\":\"gordan\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/6b80bbcf3f1d17805d134728bd589c22\"},\"headline\":\"Essential Cybersecurity Precautions for Protecting Your Small Business\",\"datePublished\":\"2024-05-24T09:58:58+00:00\",\"dateModified\":\"2024-09-02T22:48:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\"},\"wordCount\":710,\"publisher\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp\",\"keywords\":[\"Access policies\",\"Firewall\",\"internet security\",\"password use\",\"update device\",\"VPN\",\"VPN on phone\",\"VPN security\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\",\"url\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\",\"name\":\"Essential Cybersecurity Precautions for Protecting Your Small Business\",\"isPartOf\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp\",\"datePublished\":\"2024-05-24T09:58:58+00:00\",\"dateModified\":\"2024-09-02T22:48:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage\",\"url\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp\",\"contentUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp\",\"width\":1600,\"height\":800,\"caption\":\"Essential Cybersecurity Precautions for Protecting Your Small Business\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/resizemyimg.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential Cybersecurity Precautions for Protecting Your Small Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#website\",\"url\":\"https:\/\/resizemyimg.com\/blog\/\",\"name\":\"Resize my Image Blog\",\"description\":\"News, insights, tips&amp;tricks on image related business &amp; SaaS\",\"publisher\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/resizemyimg.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#organization\",\"name\":\"WebFactory Ltd\",\"url\":\"https:\/\/resizemyimg.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png\",\"contentUrl\":\"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png\",\"width\":300,\"height\":300,\"caption\":\"WebFactory Ltd\"},\"image\":{\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/webfactoryltd\/\",\"https:\/\/x.com\/webfactoryltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/6b80bbcf3f1d17805d134728bd589c22\",\"name\":\"gordan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a7e11456b252da6581705039dda5ba3?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a7e11456b252da6581705039dda5ba3?s=96&d=monsterid&r=g\",\"caption\":\"gordan\"},\"url\":\"https:\/\/resizemyimg.com\/blog\/author\/gordan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Essential Cybersecurity Precautions for Protecting Your Small Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/","og_locale":"en_US","og_type":"article","og_title":"Essential Cybersecurity Precautions for Protecting Your Small Business","og_description":"Contrary to what you\u2019d read in the headlines, the modern cyber threat landscape is surprisingly egalitarian. For every data breach with millions of exposed records and equally high damage estimates, there are countless attacks targeting \u2013 and often crippling \u2013 small businesses. Read more","og_url":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/","og_site_name":"Resize my Image Blog","article_publisher":"https:\/\/www.facebook.com\/webfactoryltd\/","article_published_time":"2024-05-24T09:58:58+00:00","article_modified_time":"2024-09-02T22:48:03+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp","type":"image\/webp"}],"author":"gordan","twitter_card":"summary_large_image","twitter_creator":"@webfactoryltd","twitter_site":"@webfactoryltd","twitter_misc":{"Written by":"gordan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#article","isPartOf":{"@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/"},"author":{"name":"gordan","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/6b80bbcf3f1d17805d134728bd589c22"},"headline":"Essential Cybersecurity Precautions for Protecting Your Small Business","datePublished":"2024-05-24T09:58:58+00:00","dateModified":"2024-09-02T22:48:03+00:00","mainEntityOfPage":{"@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/"},"wordCount":710,"publisher":{"@id":"https:\/\/resizemyimg.com\/blog\/#organization"},"image":{"@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage"},"thumbnailUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp","keywords":["Access policies","Firewall","internet security","password use","update device","VPN","VPN on phone","VPN security"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/","url":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/","name":"Essential Cybersecurity Precautions for Protecting Your Small Business","isPartOf":{"@id":"https:\/\/resizemyimg.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage"},"image":{"@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage"},"thumbnailUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp","datePublished":"2024-05-24T09:58:58+00:00","dateModified":"2024-09-02T22:48:03+00:00","breadcrumb":{"@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#primaryimage","url":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp","contentUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2024\/05\/essential-cybersecurity-precautions-for-protecting-your-small-business.webp","width":1600,"height":800,"caption":"Essential Cybersecurity Precautions for Protecting Your Small Business"},{"@type":"BreadcrumbList","@id":"https:\/\/resizemyimg.com\/blog\/essential-cybersecurity-precautions-for-protecting-your-small-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/resizemyimg.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Essential Cybersecurity Precautions for Protecting Your Small Business"}]},{"@type":"WebSite","@id":"https:\/\/resizemyimg.com\/blog\/#website","url":"https:\/\/resizemyimg.com\/blog\/","name":"Resize my Image Blog","description":"News, insights, tips&amp;tricks on image related business &amp; SaaS","publisher":{"@id":"https:\/\/resizemyimg.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/resizemyimg.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/resizemyimg.com\/blog\/#organization","name":"WebFactory Ltd","url":"https:\/\/resizemyimg.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png","contentUrl":"https:\/\/resizemyimg.com\/blog\/wp-content\/uploads\/2019\/12\/webfactory_icon.png","width":300,"height":300,"caption":"WebFactory Ltd"},"image":{"@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/webfactoryltd\/","https:\/\/x.com\/webfactoryltd"]},{"@type":"Person","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/6b80bbcf3f1d17805d134728bd589c22","name":"gordan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/resizemyimg.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a7e11456b252da6581705039dda5ba3?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a7e11456b252da6581705039dda5ba3?s=96&d=monsterid&r=g","caption":"gordan"},"url":"https:\/\/resizemyimg.com\/blog\/author\/gordan\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts\/5516"}],"collection":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/comments?post=5516"}],"version-history":[{"count":1,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts\/5516\/revisions"}],"predecessor-version":[{"id":5518,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/posts\/5516\/revisions\/5518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/media\/5517"}],"wp:attachment":[{"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/media?parent=5516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/categories?post=5516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/resizemyimg.com\/blog\/wp-json\/wp\/v2\/tags?post=5516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}