{"id":292,"date":"2023-02-22T22:13:50","date_gmt":"2023-02-22T22:13:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pasan001\/?p=292"},"modified":"2023-02-22T22:13:50","modified_gmt":"2023-02-22T22:13:50","slug":"journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pasan001\/2023\/02\/22\/journal-entry-7\/","title":{"rendered":"Journal Entry #7"},"content":{"rendered":"\n<p>The development of cybersecurity programs in businesses is crucial today. The National Small Business Association, better known as NSBA, discovered in its 2014 Year-End Economic Report that &#8220;half of all small businesses indicate they have been the target of a cyber-attack &#8211; up from 44% just two years ago&#8221; (The Impact of Cybercrime on Small Business). Cyberattacks are widespread and becoming more common. A lot of small businesses are prone to cyber since they lack resources and are aware of the risks. \u201cThe cost of cybercrime to a small business can be devastating . In 2013 , cyberattacks cost small businesses on average , $ 8,699 per attack . Today , that number has skyrocketed to $ 20,752 per attack &#8221; (The Impact of Cybercrime on Small Business.)\u00a0 Implementing an efficient security program can have a significant positive financial impact. These vulnerable businesses stand to gain thousands from it. The protection of private and sensitive data is another benefit of establishing a cybersecurity program. According to The Impact of Cybercrime on Small Business, &#8220;sensitive data, intellectual property, and personal information of small and medium-sized businesses are targeted by an ever-growing and sophisticated community of cybercriminals.&#8221; A comprehensive cybersecurity program can be implemented to protect and monitor private and sensitive data. There will be more trust with using the internet as a business platform whereas\u00a0 customer information, credit card information, and other client information cannot be hacked. The reduction of phishing and impersonation events is another advantage of creating cybersecurity programs in businesses. &#8220;Small businesses are particularly vulnerable to email attacks closely resembling those of banks or other trusted institutions and citing an urgent need to login to an account or supply some other essential information,&#8221; according to The Effect of Cybercrime on Small Business. Many employees lack the knowledge necessary to spot attempts to access sensitive data, making them vulnerable to hackers. These situations can be prevented by utilizing cybersecurity programs. For all personnel, education and training are required.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The development of cybersecurity programs in businesses is crucial today. The National Small Business Association, better known as NSBA, discovered in its 2014 Year-End Economic Report that &#8220;half of all small businesses indicate they have been the target of a cyber-attack &#8211; up from 44% just two years ago&#8221; (The Impact of Cybercrime on Small&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pasan001\/2023\/02\/22\/journal-entry-7\/\">Read More<\/a><\/div>\n","protected":false},"author":25759,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/users\/25759"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}