{"id":1456,"date":"2018-09-11T12:34:11","date_gmt":"2018-09-11T12:34:11","guid":{"rendered":"https:\/\/www.technology-solved.com\/huntsville-al\/?p=1456"},"modified":"2023-07-17T21:53:14","modified_gmt":"2023-07-18T01:53:14","slug":"cybersecurity-statistics","status":"publish","type":"post","link":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/","title":{"rendered":"Cybersecurity Statistics"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1715 aligncenter\" src=\"\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png\" alt=\"\" width=\"195\" height=\"70\" \/><\/p>\n<p>\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d<\/p>\n<p>Small- and medium-sized businesses (SMBs) are the prime target for attackers because they tend to be easier targets. They\u2019re often less secure and unprepared for attack. Think about burglars that go after houses where they know no one is home. With more cybercrime automation and the rise of hacking kits, the cost and time it takes to launch a successful attack have decreased, increasing the amount of cyber-attacks executed.<\/p>\n<p><strong>You, like many SMBs, may not think you are a target.<\/strong><\/p>\n<p>82 percent of SMBs say they\u2019re not targets for attacks as they don\u2019t have anything worth stealing <a href=\"https:\/\/www.towergateinsurance.co.uk\/liability-insurance\/smes-and-cyber-attacks\" target=\"_blank\" rel=\"noopener noreferrer\">(Towergate Insurance)<\/a>.<\/p>\n<p>However, 55 percent of SMB respondents have experienced a cyber-attack in the past year, and another 50 percent have experienced a data breach involving customer and employee information (2016 State of SMB Cybersecurity).<\/p>\n<p><strong>You may underestimate the value of your information. <\/strong><\/p>\n<p>It doesn\u2019t always seem like it, but every business has data worth stealing.\u00a0Did you know that the average cost per lost or stolen record is $158? It may not seem like a lot, but this number grows quickly once these records are stolen by the hundreds <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">(Cost of Data Breach Study)<\/a>.<\/p>\n<p><strong>This means you might not be prepared to defend yourself.<\/strong><\/p>\n<p>Did you know that\u00a079 percent of small businesses do not have an incident response plan? Without one, you may never be able to fully recover when a security incident becomes a reality <a href=\"https:\/\/www.cybersecurity-insiders.com\/wp-content\/uploads\/2017\/02\/Cybersecurity-Trends-Report-2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">(Cybersecurity Trends Report 2017)<\/a>.<\/p>\n<p><strong>However, the consequences are significant and often business-crippling.<\/strong><\/p>\n<p>An IBM and Poneman Institute study found that the average cost of a data breach has increased to a staggering $3.79 million <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">(Cost of Data Breach Study)<\/a>.<\/p>\n<p>Similarly, 60 percent of companies that lose their data due to an attack or disaster will shut down within six months <a href=\"https:\/\/www.bostoncomputing.net\/consultation\/databackup\/statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">(Boston Computing Network)<\/a>.<\/p>\n<p><strong>Work with an MSP to receive the data protection you need.<\/strong><\/p>\n<p>Invest in an outsourced cybersecurity solution to protect against the expanding cyber threat landscape, and mitigate damages inflicted upon your business. Gain the expertise, technology and support you may be lacking, and grow your IT budget without growing your payroll.<\/p>\n<p><strong><br \/>\n<\/strong>Work with us today!<\/p>\n<p><strong>CT Business Solutions \u2013 256-652-6643<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they tend to be easier targets. They\u2019re often less secure and unprepared for attack. Think about burglars that go after houses where they know no one is home. With more [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":1715,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Statistics - Computer Troubleshooters Huntsville<\/title>\n<meta name=\"description\" content=\"\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Statistics - Computer Troubleshooters Huntsville\" \/>\n<meta property=\"og:description\" content=\"\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Troubleshooters Huntsville\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-11T12:34:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-18T01:53:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"195\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cthuntsville\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cthuntsville\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/\",\"name\":\"Cybersecurity Statistics - Computer Troubleshooters Huntsville\",\"isPartOf\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png\",\"datePublished\":\"2018-09-11T12:34:11+00:00\",\"dateModified\":\"2023-07-18T01:53:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90\"},\"description\":\"\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they\",\"breadcrumb\":{\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#primaryimage\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png\",\"contentUrl\":\"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png\",\"width\":195,\"height\":70,\"caption\":\"Computer Troubleshooters Business Solutions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Locations\",\"item\":\"https:\/\/www.technology-solved.com\/locations\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alabama\",\"item\":\"https:\/\/www.technology-solved.com\/alabama-state\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Homepage\",\"item\":\"https:\/\/www.technology-solved.com\/huntsville-al\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Statistics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#website\",\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/\",\"name\":\"Computer Troubleshooters Huntsville\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90\",\"name\":\"cthuntsville\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g\",\"caption\":\"cthuntsville\"},\"url\":\"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Statistics - Computer Troubleshooters Huntsville","description":"\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Statistics - Computer Troubleshooters Huntsville","og_description":"\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they","og_url":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/","og_site_name":"Computer Troubleshooters Huntsville","article_published_time":"2018-09-11T12:34:11+00:00","article_modified_time":"2023-07-18T01:53:14+00:00","og_image":[{"width":195,"height":70,"url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png","type":"image\/png"}],"author":"cthuntsville","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cthuntsville","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/","url":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/","name":"Cybersecurity Statistics - Computer Troubleshooters Huntsville","isPartOf":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#primaryimage"},"image":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png","datePublished":"2018-09-11T12:34:11+00:00","dateModified":"2023-07-18T01:53:14+00:00","author":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90"},"description":"\u201cThat will never happen to me. It\u2019s a risk I\u2019m willing to take.\u201d Small- and medium-sized businesses (SMBs) are the prime target for attackers because they","breadcrumb":{"@id":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#primaryimage","url":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png","contentUrl":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-content\/uploads\/sites\/13\/2018\/09\/CT-BS.png","width":195,"height":70,"caption":"Computer Troubleshooters Business Solutions"},{"@type":"BreadcrumbList","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/cybersecurity-statistics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Locations","item":"https:\/\/www.technology-solved.com\/locations\/"},{"@type":"ListItem","position":2,"name":"Alabama","item":"https:\/\/www.technology-solved.com\/alabama-state\/"},{"@type":"ListItem","position":3,"name":"Homepage","item":"https:\/\/www.technology-solved.com\/huntsville-al\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Statistics"}]},{"@type":"WebSite","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#website","url":"https:\/\/www.technology-solved.com\/huntsville-al\/","name":"Computer Troubleshooters Huntsville","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technology-solved.com\/huntsville-al\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/1141e403df8721a619d7e354767b4e90","name":"cthuntsville","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technology-solved.com\/huntsville-al\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49c28d4d89924d891416af438b65c9fbf92c3672c5e0dcc230d369e7105b78b?s=96&d=mm&r=g","caption":"cthuntsville"},"url":"https:\/\/www.technology-solved.com\/huntsville-al\/author\/cthuntsville\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/comments?post=1456"}],"version-history":[{"count":6,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1456\/revisions"}],"predecessor-version":[{"id":2424,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/posts\/1456\/revisions\/2424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media\/1715"}],"wp:attachment":[{"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/media?parent=1456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/categories?post=1456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technology-solved.com\/huntsville-al\/wp-json\/wp\/v2\/tags?post=1456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}