{"id":24125,"date":"2022-10-05T13:07:15","date_gmt":"2022-10-05T17:07:15","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=24125"},"modified":"2024-06-24T17:41:13","modified_gmt":"2024-06-24T21:41:13","slug":"importance-of-cybersecurity-smbs","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/","title":{"rendered":"Importance of cybersecurity for SMBs"},"content":{"rendered":"<p>Small to medium-sized businesses or SMBs may think they aren\u2019t vulnerable <a href=\"https:\/\/www.sherweb.com\/blog\/security\/6-tips-avoid-hackers\/\">targets for hackers<\/a> and other cybercriminals, but they couldn\u2019t be more wrong.<\/p>\n<p>Indeed, small businesses are targeted in <a href=\"https:\/\/www.verizon.com\/business\/resources\/articles\/small-business-cyber-security-and-data-breaches\/\">approximately 43%<\/a> of all cyberattacks. Of those companies, 60%, go out of business within six months. Based on these figures alone, it\u2019s clear that SMBs can\u2019t afford to ignore cybersecurity.<\/p>\n<p>Let\u2019s explore the importance of cybersecurity for SMBs and go over <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/\">ways to protect<\/a> your company.<\/p>\n<h2>The risks of poor cybersecurity<\/h2>\n<p>SMBs must maintain <a href=\"https:\/\/www.sherweb.com\/security\/\">excellent cybersecurity practices<\/a>. If they fail to do so, and if they maintain poor cybersecurity protocols or systems, they could expose themselves to major risks, including but not limited to:<\/p>\n<ul>\n<li><strong>Significant damage to their brand:<\/strong> A single cybersecurity attack can lead to consumer mistrust. People don\u2019t want to shop at or give their personal information to brands vulnerable to malware or <a href=\"https:\/\/www.sherweb.com\/blog\/security\/best-ways-to-defend-against-ransomware\/\">ransomware attacks<\/a>.<\/li>\n<li><strong>Broad legal ramifications:<\/strong> Customers can sue businesses that do not practice good cybersecurity protocols or don\u2019t use modern, trustworthy cybersecurity technology. Furthermore, brands may be forced to pay major fines due to legislation such as the GDPR and CCPA.<\/li>\n<li><strong>Stolen data and loss of competitive information:<\/strong> Many small to medium-sized businesses rely on keeping their consumer information secret so competitors cannot overtake them. A <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/02\/05\/a-single-data-breach-can-ruin-a-business-and-ceos-cant-ignore-their-responsibilities\/\">single data breach<\/a> could result in a brand losing its market dominance.<\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\">Bottom line<\/span>: poor cybersecurity has enough major risks that SMBs should investigate better ways to protect their companies at the earliest opportunity.<\/p>\n<h2>How does cybersecurity bolster SMB brands?<\/h2>\n<p>While low or poor cybersecurity can lead to major issues for SMBs, the reverse is also true for brands that lean into good cybersecurity practices and technologies. Here are some of the benefits that come with having a solid security plan.<\/p>\n<h3>Improved reputation<\/h3>\n<p>For starters, excellent cybersecurity can improve a brand\u2019s reputation in the industry and with its target audience. When consumers feel they can trust an organization, they are more willing to make purchases there, share their personal information to join loyalty programs and interact with that brand.<\/p>\n<p>Furthermore, they are more likely to bring their friends and family to the brand too. They may recommend that company to others they know, leading to long-term revenue boosts and better performance on key performance indicators.<\/p>\n<p>An excellent reputation is key to thriving as an SMB, especially in competitive markets and niches. Therefore, it pays (literally) to practice good cybersecurity strategies ASAP.<\/p>\n<h3>Cost savings<\/h3>\n<p>Having stringent security measures in place may lead to cost savings as well. How? For starters, good cybersecurity allows the company to escape major fines and fees from institutions in charge of enforcing compliance and <a href=\"https:\/\/gdpr-info.eu\/\">legislation like the GDPR<\/a>. Companies don\u2019t have to pay fines for losing their consumers\u2019 data if it\u2019s never lost in the first place!<\/p>\n<p>However, server outages, customer outrage and lost data can also add up in costs. It\u2019s far cheaper to prevent a cyberattack by relying on cloud security, a strong firewall and teaching employees <a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-security-model\/\">cybersecurity best practices<\/a> than it is to recover after the fact.<\/p>\n<p>Therefore, SMBs that want not only to survive but thrive in the modern market should prioritize cybersecurity from the get-go. Even if you have to spend some money in the short term, you\u2019ll save much more money in the long term if you aren\u2019t attacked or hacked by a cybercriminal.<\/p>\n<h3>Market advantages<\/h3>\n<p>Lastly, good cybersecurity is important for SMBs because it may bring significant market advantages. If you have a secret process or manufacturing strategy, you want to protect that information at all costs. Similarly, you\u2019ll want to protect the personal contact information of your most important clients so your competitors can\u2019t get that info.<\/p>\n<p>A cyberattack can expose all that information to the public, leading to major problems. If you want to retain your SMB\u2019s business\u2019s competitive advantage, you need to ensure your servers are secure and your data can\u2019t be stolen.<\/p>\n<h2>How to improve cybersecurity as an SMB<\/h2>\n<p>Fortunately, there are ways in which you can bolster cybersecurity for your SMB. Here are just a few cybersecurity <u><a href=\"https:\/\/www.sherweb.com\/blog\/security\/cybersecurity-tips-and-best-practices\/\">best practices you can implement<\/a><\/u>:<\/p>\n<ul>\n<li><strong>Begin with a data security plan:<\/strong> You need to identify <a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/\">who can access your key data<\/a> and develop policies and procedures to limit that access as much as possible. Only authorized supervisors or key personnel should be able to access critical company data.<\/li>\n<li><strong>Conduct employee training:<\/strong> All your employees should know how to <a href=\"https:\/\/www.sherweb.com\/blog\/security\/protect-clients-where-theyre-most-vulnerable-email\/\">spot spam emails<\/a> and avoid threats like malware attacks. Regular employee seminars can keep your workers updated on modern cybersecurity practices and procedures.<\/li>\n<li><strong>Use strong passwords:<\/strong> Implement <a href=\"https:\/\/www.sherweb.com\/blog\/security\/password-policies\/\">password policies<\/a> throughout your organization so that employees do not accidentally cause a breach by using weak passwords that are easy for malicious actors to guess or steal.<\/li>\n<li><strong>Take a hybrid approach to your digital wallet security:<\/strong> Your company probably offers various payment options for its products and services, potentially including cryptocurrencies. Unfortunately, cryptocurrency account hacking is on the rise, so you must take extra steps to protect crypto payments. These steps include choosing a reputable digital exchange to<a href=\"https:\/\/cryptowallet.com\/best-bitcoin-btc-wallets\/\"> securely store<\/a> crypto payments, protecting your encryption keys with strong passwords and <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-enable-multi-factor-authentication\/\">multi-factor authentication<\/a>, and keeping most of your crypto in offline or physical wallets.<\/li>\n<li><strong>Always back up your company data, preferably using cloud services:<\/strong> The right <a href=\"https:\/\/www.sherweb.com\/infrastructure\/\">cloud services<\/a> can ensure your servers get back up and running in the <a href=\"https:\/\/www.sherweb.com\/blog\/security\/disaster-recovery-plan\/\">event of an outage<\/a> ASAP.<\/li>\n<li><strong>Use firewalls and antivirus software:<\/strong> Not only should you use these tools, but SMBs should also be sure to keep both updated all the time. Whether you do this yourself or hire a cybersecurity specialist, the right firewalls and <a href=\"https:\/\/www.sherweb.com\/security\/bitdefender\/\">antivirus software<\/a> can protect you from typical internet-based attacks<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Don\u2019t sleep on the importance of cybersecurity<\/h2>\n<p>SMBs can\u2019t afford to ignore cybersecurity without incurring significant risk. Good cybersecurity is important for companies of all sizes due to its ability to affect their bottom line\u2014the costs of poor cybersecurity are far too high. Follow the strategies above, and your brand can reduce the likelihood of damage by a single cyberattack or breach. Instead, you can continue pursuing your business goals for years to come!<\/p>\n<p>Need guidance on how to implement strong cybersecurity for your (or your clients\u2019) business? Sherweb can help! Explore our <a href=\"https:\/\/www.sherweb.com\/security\/\">available cybersecurity solutions<\/a> or check out our <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">Partner Guide<\/a> for more information about how Sherweb can help your business grow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small to medium-sized businesses or SMBs may think they aren\u2019t vulnerable targets for hackers a","protected":false},"author":177,"featured_media":24126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,934],"class_list":["post-24125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-cybersecurity-awareness-month"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding the importance of cybersecurity<\/title>\n<meta name=\"description\" content=\"The importance of cybersecurity any business simply can&#039;t be ignored. Let&#039;s review some of the ways SMBs in particular can improve.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the importance of cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The importance of cybersecurity any business simply can&#039;t be ignored. Let&#039;s review some of the ways SMBs in particular can improve.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T17:07:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T21:41:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/CybersecuritySMB-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Importance of cybersecurity for SMBs\",\"datePublished\":\"2022-10-05T17:07:15+00:00\",\"dateModified\":\"2024-06-24T21:41:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/\"},\"wordCount\":1078,\"commentCount\":3,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CybersecuritySMB-1200x480-1.jpg\",\"keywords\":[\"Cybersecurity\",\"Cybersecurity Awareness Month\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/\",\"name\":\"Understanding the importance of cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CybersecuritySMB-1200x480-1.jpg\",\"datePublished\":\"2022-10-05T17:07:15+00:00\",\"dateModified\":\"2024-06-24T21:41:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"The importance of cybersecurity any business simply can't be ignored. Let's review some of the ways SMBs in particular can improve.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CybersecuritySMB-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CybersecuritySMB-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"Illustration of cybersecurity on a computer and tablet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/importance-of-cybersecurity-smbs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Importance of cybersecurity for SMBs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding the importance of cybersecurity","description":"The importance of cybersecurity any business simply can't be ignored. Let's review some of the ways SMBs in particular can improve.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/","og_locale":"en_US","og_type":"article","og_title":"Understanding the importance of cybersecurity","og_description":"The importance of cybersecurity any business simply can't be ignored. Let's review some of the ways SMBs in particular can improve.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2022-10-05T17:07:15+00:00","article_modified_time":"2024-06-24T21:41:13+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/CybersecuritySMB-1200x480-1.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Importance of cybersecurity for SMBs","datePublished":"2022-10-05T17:07:15+00:00","dateModified":"2024-06-24T21:41:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/"},"wordCount":1078,"commentCount":3,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/CybersecuritySMB-1200x480-1.jpg","keywords":["Cybersecurity","Cybersecurity Awareness Month"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/","url":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/","name":"Understanding the importance of cybersecurity","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/CybersecuritySMB-1200x480-1.jpg","datePublished":"2022-10-05T17:07:15+00:00","dateModified":"2024-06-24T21:41:13+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"The importance of cybersecurity any business simply can't be ignored. Let's review some of the ways SMBs in particular can improve.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#primaryimage","url":"\/blog\/wp-content\/uploads\/CybersecuritySMB-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/CybersecuritySMB-1200x480-1.jpg","width":2400,"height":920,"caption":"Illustration of cybersecurity on a computer and tablet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/importance-of-cybersecurity-smbs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Importance of cybersecurity for SMBs"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Cybersecurity","Cybersecurity Awareness Month"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/24125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=24125"}],"version-history":[{"count":3,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/24125\/revisions"}],"predecessor-version":[{"id":24881,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/24125\/revisions\/24881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/24126"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=24125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=24125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=24125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}