{"id":27555,"date":"2018-10-01T10:59:55","date_gmt":"2018-10-01T17:59:55","guid":{"rendered":"https:\/\/paladinpointofsale.com\/retailscience\/?p=27555"},"modified":"2025-11-06T08:42:15","modified_gmt":"2025-11-06T15:42:15","slug":"identify-prevent-small-business-cybersecurity-attacks","status":"publish","type":"post","link":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/","title":{"rendered":"How to Identify and Prevent Small Business Cybersecurity Attacks"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_placement=&#8221;background&#8221; text_color=&#8221;light&#8221; text_background=&#8221;on&#8221; text_bg_color=&#8221;rgba(0,0,0,0.5)&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; parallax=&#8221;on&#8221; text_orientation=&#8221;center&#8221; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Picture this: You\u2019re a small retailer and you purchase some unique items for resale from a local artisan. You exchange a couple of emails, an invoice and a payment. Because of a security breach in your supplier\u2019s network, now yours is infected too. You\u2019re a victim of a small business cybersecurity attack.<\/p>\n<p>Your antivirus software is no longer sufficient to protect against the sophisticated threats that have evolved over the last two years, so your system is now compromised and is at risk for completely shutting down your business. It\u2019s also possible that your customers\u2019 information has been compromised. It\u2019s a scenario that happens all too often.<\/p>\n<p>The cost of data breaches is expected to reach $2 trillion by next year. While most business owners may think those kinds of attacks target big business, the Verizon 2017 Data Breach Investigation Report shows that 61% of breaches hit smaller businesses.<\/p>\n<p>A <a href=\"https:\/\/upscapital.com\/product-services\/cyber-liability-insurance\/\" target=\"_blank\" rel=\"noopener noreferrer\">UPS Capital<\/a> report adds that most small businesses aren\u2019t prepared.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Costs of Cyberattacks&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Costs of Cyberattacks<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_circle_counter title=&#8221;of breaches hit smaller businesses&#8221; number=&#8221;61&#8243; bar_bg_color=&#8221;#cc6633&#8243; _builder_version=&#8221;4.16&#8243; number_text_color=&#8221;#3e5061&#8243; number_font_size=&#8221;52&#8243; max_width=&#8221;150px&#8221; custom_css_percent_text=&#8221;padding: 30% 0;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_circle_counter][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_circle_counter title=&#8221;of small businesses fold within six months of an attack&#8221; number=&#8221;60&#8243; bar_bg_color=&#8221;#cc6633&#8243; _builder_version=&#8221;4.16&#8243; number_text_color=&#8221;#3e5061&#8243; number_font_size=&#8221;52&#8243; max_width=&#8221;150px&#8221; custom_css_percent_text=&#8221;padding: 30% 0;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_circle_counter][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_circle_counter title=&#8221;of small businesses don\u2019t use data protection for company and customer information&#8221; number=&#8221;90&#8243; bar_bg_color=&#8221;#cc6633&#8243; _builder_version=&#8221;4.16&#8243; number_text_color=&#8221;#3e5061&#8243; number_font_size=&#8221;52&#8243; max_width=&#8221;150px&#8221; custom_css_percent_text=&#8221;padding: 30% 0;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_circle_counter][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Small business cybersecurity attacks cost between&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center\"><strong><span style=\"font-size: 18pt;color: #cc6633\">Small business cybersecurity attacks cost between<\/span><\/strong><br \/>\n<strong><span style=\"font-size: 36pt;color: #cc6633\">$84,000 and $148,000<\/span><\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Since 2004,&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Since 2004, October has been recognized as <a href=\"https:\/\/staysafeonline.org\/cybersecurity-awareness-month\/\">National Cybersecurity Awareness Month <\/a>through a joint effort of the U.S. Department of Homeland Security and the National Cyber Security Alliance. The campaign is designed to make everyone more cognizant of computer security and deter as many attacks as possible. Unfortunately, the bad guys are at least as smart and well-armed as those trying to protect us.<\/p>\n<p>As the world population becomes more and more dependent on forms of electronic communications and commerce, and cybercrime continues to rise, businesses worldwide will increase their investment in cybersecurity. Realistically, who doesn\u2019t bank or shop from home via the internet nowadays? Statista reports that since 2010, spending on cybersecurity has increased three-fold, and many experts agree it will top $170 billion by 2020.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_cta title=&#8221;Get the FREE Infographic&#8221; button_url=&#8221;http:\/\/info.paladinpos.com\/RetailScience_Infographic_Cybersecurity.pdf&#8221; button_text=&#8221;Open Now&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#cc6633&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;SMB Cybersecurity Attacks Not Small Change&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>SMB Cybersecurity Attacks Not Small Change<\/h2>\n<p>Believe it or not, an astonishing 87% of independent merchants don\u2019t think they are at risk of a cybersecurity attack even though small businesses are desirable targets for hackers. Because they don\u2019t devote much of their budget to security, including but not limited to employee training, they\u2019re much more vulnerable than larger businesses or corporations.<\/p>\n<p>Most retailers today looking to remain relevant in the marketplace do business online, which not only increases their bottom line but also increases the risk of a security breach.<\/p>\n<p>\u201cThese issues represent an existential threat to some small businesses as firms could go bankrupt from the costs of responding to a cyberattack, or from the lost revenue and customers resulting from a business disruption,\u201d Daniel Castro, the vice president of the Information Technology &amp; Innovation Foundation, explains. \u201cMoreover, these attacks are a drain on the economy.\u201d<\/p>\n<p>According to <em>Small Business Trends,<\/em> respondents to a survey indicated that during a 12-month period in 2015-16 55% said they had experienced a cyberattack, and 50% of those involved customer and employee information. Things have only gotten worse since then. The Better Business Bureau reported earlier this year that about 36% of the businesses that reported being hacked wound up losing money with an annual overall loss averaging nearly $80,000.<\/p>\n<p>\u201cMany businesses continue to think that they are too small to be the target of a cyberattack,\u201d\u00a0Russell Schrader, the executive director of the National Cyber Security Alliance, tells <em>Technology<\/em>. \u201cThese businesses lack the technology, resources, finances, and legal knowledge that they need to protect themselves.\u201d<\/p>\n<p>Or in the case of small businesses, they don\u2019t realize there are advanced security solutions available to them at an affordable price.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Attacks are Hard to Detect&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Attacks are Hard to Detect<\/h2>\n<p>Many of the biggest, most sophisticated companies in the world often struggle to identify and solve cyberattacks. Many attacks aren\u2019t discovered until weeks or months after the hackers gain entrance into a company\u2019s network.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Ghosts in the Machine&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Ghosts in the Machine<\/h2>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x41;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;In May 2014&#8230;&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In May 2014, eBay announced that 145 million of its users\u2019 personal information \u2013 names, addresses, birthdates and encrypted passwords \u2013 had been compromised. The company said the perpetrators rummaged around in its system for 229 days.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x41;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Another infamous data breach&#8230;&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]Another infamous data breach started before Thanksgiving 2013 when Target stores were hacked. The thieves compromised the credit\/debit card information of up to 110 million customers and the action wasn\u2019t discovered for weeks. The ability to identify and respond to cybersecurity attacks has steadily improved, but it hasn\u2019t stopped the disruptions.<br \/>\n[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#x41;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; admin_label=&#8221;Just this year&#8230;&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Just this year, retailers Macy\u2019s, Adidas, Under Armour, Saks Fifth Avenue, Saks Off 5<sup>th<\/sup>, Lord &amp; Taylor and others have reported significant data breaches.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Cisco Systems&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cisco Systems said in its \u201c2017 Midyear Cybersecurity Report\u201d that the industry average for detecting cyberthreats is 100 to 200 days.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;What to do&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What to do<\/h2>\n<p>The survey of 2,000 consumers and 1,100 businesses found that awareness of the potential of a cybersecurity attack is high \u2013 93% of BBB-accredited business owners know of risks such as ransomware, phishing, malware, et cetera. Nine out of 10 of those businesses have some form of cybersecurity in place. \u00a0Antivirus (81%) and firewall (75%) protection on their networks are the easiest and most used forms of protection. Roughly 47% added employee education programs.<\/p>\n<p>However, when it comes to ongoing management of their network, regular audits, dedicated IT security, outside cybersecurity contractors, and a cyberattack response plan, businesses are woefully outgunned in cybersecurity warfare. Only 20% regularly manage their network security, just 17% have dedicated IT staff or hire an outside cybersecurity prevention firm, and just 15% have a security incident response plan or cybersecurity insurance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Cisco also recommends&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]Cisco also recommends these simple security measures:<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Identify mysterious emails&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe010;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Note unusual password activity&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe000;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;Identify suspicious pop-ups&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe101;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Report a slower-than-normal network&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe02d;||divi||400&#8243; icon_color=&#8221;#cc6633&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Cybersecurity is a threat&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cybersecurity is a threat to all small businesses but taking steps to prevent it isn\u2019t as overwhelming as it might seem. Many companies that provide digital business platforms also offer network security services. Most offer some form of cybersecurity, while others provide automated network monitoring and maintenance.<\/p>\n<p>It\u2019s important to have a managed, multi-tiered approach to security. Having simple antivirus, patch management and backups on your PCs isn\u2019t enough these days. The bad guys have gotten very sophisticated, especially in the past couple of years. With ongoing monitoring, managed network services will automatically identify and prevent breaches in real time, well before the customer knows there was a threat.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Update your system&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Update your system and protect your information:<\/strong> Merchants should regularly update computers \u2013 including desktops, laptops, mobile devices and point of sale systems. For added protection, consider outsourcing network management to the security professionals whose business it is to maintain the security of your systems.<\/p>\n<p><strong>Regular Backups:<\/strong> Protect your point of sale data against disaster. After you close for the day, many digital platform providers go to work backing up application databases, including accounts receivable, inventory, sales tax information, customer data, etc., to secure off-site data hosts, along with all the other important data stored in a point of sale system.<\/p>\n<p><strong>Adopt a Multi-Tiered Approach to Security:<\/strong> It\u2019s not enough to rely on just antivirus software these days. Many companies offer affordable solutions that allow merchants to employ multiple security strategies from multiple manufacturers, which will drastically improve their security posture.<\/p>\n<p><strong>Educate employees: <\/strong>Merchants should establish basic, but essential security practices and policies for employees. Internet and email guidelines, along with strong user passwords, are vital to protecting a business\u2019s digital security.<\/p>\n<p><strong>Limit access:<\/strong> According to the Ponemon Institute, human error is responsible for 80% of business data breaches. Many of the leaks are caused by employees browsing the web or opening unsecured emails. One errant click can be fatal to a business network.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;High-Security Industries&#8221; _builder_version=&#8221;4.22.0&#8243; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>High-Security Industries<\/h2>\n<p>&nbsp;<\/p>\n<p>Healthcare, manufacturing, financial services, government agencies and education are all\u00a0value-rich targets, because they store so much valuable data.<\/p>\n<p>Retail is also an information-rich target for hackers looking for consumer information. Retail giants eBay, Target and Home Depot are all listed on CSO.com\u2019s list of the 17 biggest data breaches in this century, and consumer information was the target of those thefts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Conclusion&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Conclusion<\/h2>\n<p>As the future of retail leads all consumers more and more toward electronic interconnectivity, the threat of small business cybersecurity attacks grows. As more small businesses adapt to the digital marketplace with\u00a0web browsing, online sales, online banking, email and digital marketing programs, the more vulnerable they are to cyberattacks.<\/p>\n<p>Improving cybersecurity isn\u2019t like buying a new delivery van. You can\u2019t plunk down cash and drive it until the wheels fall off. Cybersecurity requires constant vigilance and improvement to keep up with changes in technology, trends and the hackers.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Valuable Cybersecurity Resources&#8221; _builder_version=&#8221;4.16&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Valuable Cybersecurity Resources<\/h2>\n<p>The <a href=\"https:\/\/www.fcc.gov\/general\/cybersecurity-small-business\">Federal Communications Commission<\/a>, <a href=\"https:\/\/www.sba.gov\/managing-business\/cybersecurity\/top-ten-cybersecurity-tips\">Small Business Administration<\/a>, <a href=\"https:\/\/www.bbb.org\/all\/cyber-security-resources\" target=\"_blank\" rel=\"noopener\">Better Business Bureau<\/a> and other organizations all offer resources and tips on how to prevent small business cyberattacks.<\/p>\n<p><a href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/PCISSC_SMB_Flyer_-web.pdf\"><strong>PCI Security Standards Council<\/strong><\/a><strong>: <\/strong>This resource provides small businesses with awareness on protecting payment card data, which small merchants rely on for transactions. The resource features a variety of guides for small merchants.<\/p>\n<p><a href=\"https:\/\/staysafeonline.org\/\"><strong>NCSA (National Cyber Security Alliance)<\/strong><\/a><strong>: <\/strong>The NCSA offers a resource that helps your business safeguard its operations from cyberattacks, privacy breaches, and other threats.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_team_member name=&#8221;John Oetinger&#8221; position=&#8221;Director of Managed Network Services, Paladin Data Corp&#8221; admin_label=&#8221;John Oetinger Author Box&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.<\/p>\n","protected":false},"author":13,"featured_media":28319,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,16],"tags":[],"class_list":["post-27555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-posts","category-how-tos","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Identify and Prevent Small Business Cybersecurity Attacks - Retail Science<\/title>\n<meta name=\"description\" content=\"A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Identify and Prevent Small Business Cybersecurity Attacks - Retail Science\" \/>\n<meta property=\"og:description\" content=\"A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Retail Science\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/paladindatacorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-01T17:59:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-06T15:42:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2018\/10\/RS-CyberAttacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Bullock\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@paladindatacorp\" \/>\n<meta name=\"twitter:site\" content=\"@paladindatacorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Bullock\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/\"},\"author\":{\"name\":\"Brian Bullock\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#\\\/schema\\\/person\\\/e5b5b4a78ded2bf74f8b4ca69f2a0518\"},\"headline\":\"How to Identify and Prevent Small Business Cybersecurity Attacks\",\"datePublished\":\"2018-10-01T17:59:55+00:00\",\"dateModified\":\"2025-11-06T15:42:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/\"},\"wordCount\":3221,\"image\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/10\\\/RS-CyberAttacks.jpg\",\"articleSection\":[\"All Posts\",\"How-To's\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/\",\"name\":\"How to Identify and Prevent Small Business Cybersecurity Attacks - Retail Science\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/10\\\/RS-CyberAttacks.jpg\",\"datePublished\":\"2018-10-01T17:59:55+00:00\",\"dateModified\":\"2025-11-06T15:42:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#\\\/schema\\\/person\\\/e5b5b4a78ded2bf74f8b4ca69f2a0518\"},\"description\":\"A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/10\\\/RS-CyberAttacks.jpg\",\"contentUrl\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/10\\\/RS-CyberAttacks.jpg\",\"width\":900,\"height\":600,\"caption\":\"Computer screens monitoring cyber activity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/identify-prevent-small-business-cybersecurity-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Identify and Prevent Small Business Cybersecurity Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#website\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/\",\"name\":\"Retail Science\",\"description\":\"Intelligent Research for Retailers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/#\\\/schema\\\/person\\\/e5b5b4a78ded2bf74f8b4ca69f2a0518\",\"name\":\"Brian Bullock\",\"url\":\"https:\\\/\\\/paladinpointofsale.com\\\/retailscience\\\/home\\\/author\\\/brianbullock\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Identify and Prevent Small Business Cybersecurity Attacks - Retail Science","description":"A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How to Identify and Prevent Small Business Cybersecurity Attacks - Retail Science","og_description":"A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.","og_url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/","og_site_name":"Retail Science","article_publisher":"https:\/\/www.facebook.com\/paladindatacorp\/","article_published_time":"2018-10-01T17:59:55+00:00","article_modified_time":"2025-11-06T15:42:15+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2018\/10\/RS-CyberAttacks.jpg","type":"image\/jpeg"}],"author":"Brian Bullock","twitter_card":"summary_large_image","twitter_creator":"@paladindatacorp","twitter_site":"@paladindatacorp","twitter_misc":{"Written by":"Brian Bullock","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#article","isPartOf":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/"},"author":{"name":"Brian Bullock","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#\/schema\/person\/e5b5b4a78ded2bf74f8b4ca69f2a0518"},"headline":"How to Identify and Prevent Small Business Cybersecurity Attacks","datePublished":"2018-10-01T17:59:55+00:00","dateModified":"2025-11-06T15:42:15+00:00","mainEntityOfPage":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/"},"wordCount":3221,"image":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2018\/10\/RS-CyberAttacks.jpg","articleSection":["All Posts","How-To's"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/","url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/","name":"How to Identify and Prevent Small Business Cybersecurity Attacks - Retail Science","isPartOf":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#website"},"primaryImageOfPage":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#primaryimage"},"image":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2018\/10\/RS-CyberAttacks.jpg","datePublished":"2018-10-01T17:59:55+00:00","dateModified":"2025-11-06T15:42:15+00:00","author":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#\/schema\/person\/e5b5b4a78ded2bf74f8b4ca69f2a0518"},"description":"A small business cybersecurity attack can cost up to $148,000. Patch management and backups on your PCs isn\u2019t enough these days.","breadcrumb":{"@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#primaryimage","url":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2018\/10\/RS-CyberAttacks.jpg","contentUrl":"https:\/\/paladinpointofsale.com\/retailscience\/wp-content\/uploads\/sites\/2\/2018\/10\/RS-CyberAttacks.jpg","width":900,"height":600,"caption":"Computer screens monitoring cyber activity"},{"@type":"BreadcrumbList","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/identify-prevent-small-business-cybersecurity-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/paladinpointofsale.com\/retailscience\/home\/"},{"@type":"ListItem","position":2,"name":"How to Identify and Prevent Small Business Cybersecurity Attacks"}]},{"@type":"WebSite","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#website","url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/","name":"Retail Science","description":"Intelligent Research for Retailers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/paladinpointofsale.com\/retailscience\/home\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/paladinpointofsale.com\/retailscience\/home\/#\/schema\/person\/e5b5b4a78ded2bf74f8b4ca69f2a0518","name":"Brian Bullock","url":"https:\/\/paladinpointofsale.com\/retailscience\/home\/author\/brianbullock\/"}]}},"_links":{"self":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/posts\/27555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/comments?post=27555"}],"version-history":[{"count":0,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/posts\/27555\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/media\/28319"}],"wp:attachment":[{"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/media?parent=27555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/categories?post=27555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/paladinpointofsale.com\/retailscience\/home\/wp-json\/wp\/v2\/tags?post=27555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}