{"id":2268,"date":"2021-02-23T09:00:33","date_gmt":"2021-02-23T09:00:33","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=2268"},"modified":"2021-04-12T05:18:16","modified_gmt":"2021-04-12T05:18:16","slug":"smb-cybersecurity-guide-security-awareness-training","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/","title":{"rendered":"SMB&#8217;s Cybersecurity Guide: Security Awareness &#038; Training"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Human error, or unintentional actions by human users that contribute to security issues, is one of the most significant digital security challenges confronting small- to mid-size businesses (SMBs) today. The United Kingdom\u2019s Information Commissioner\u2019s Office (ICO) found that 90% of data breaches reported to it in 2019 were the result of human error, for instance. Per <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/90-data-breaches-human-error\/\" target=\"_blank\" rel=\"noopener noreferrer\">Infosecurity Magazine<\/a>, phishing was responsible for nearly half (45%) of the data breach reports submitted to the ICO over the course of that year.<\/p>\n<p>Oz Alashe, CEO of CybSafe, said that these findings reflect the fallibility of human behavior when it comes to digital security. As quoted by Infosecurity Magazine:<\/p>\n<blockquote>\n<p>As this analysis shows, it\u2019s almost always human error that enables attackers to access encrypted channels and sensitive information. Staff can make a variety of mistakes that put their company\u2019s data or systems at risk, often because they lack the knowledge or motivation to act securely, or simply because they accidentally slip up.<\/p>\n<\/blockquote>\n<h2 class=\"navy\">How Technical Controls Can Help<\/h2>\n<p>Organizations can try to address the threat of human error and phishing by implementing technical security controls. When it comes to defending against human error, for instance, <a href=\"https:\/\/safetymanagement.eku.edu\/blog\/how-to-reduce-human-error-and-increase-information-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Eastern Kentucky University<\/a> recommends that organizations can begin by instituting multifactor authentication (MFA). This measure requires that users supply an additional authentication factor such as a fingerprint or an authentication app code in order to sign into their accounts. In doing so, MFA can help to prevent digital attackers from compromising a user\u2019s account even if they steal the account credentials.<\/p>\n<p>Further, they recommend that organizations also invest in their ability to manage the network. This specifically involves investigating the dependencies that the network has, identifying the critical assets on which the organization relies and safeguarding their sensitive data. Towards this end, organizations can begin by mapping the network to obtain a wider view of their connected systems. They can then use a threat and risk analysis along with risk assessments to pinpoint key areas on which they might want to focus their security efforts. Once they have implemented access management, MFA and other technical controls, organizations can use monitoring to watch out for anomalous network activity and respond to potential security issues before they balloon into a full-fledged incident.<\/p>\n<p>There are plenty of technical controls available to organizations when it comes to defending against phishing attacks, as well. As explained by <a href=\"https:\/\/insights.sei.cmu.edu\/insider-threat\/2018\/07\/4-technical-methods-for-improving-phishing-defense.html\" target=\"_blank\" rel=\"noopener noreferrer\">Carnegie Mellon University<\/a>, organizations need to limit the privileges that they give to user accounts by handing out administrative privileges to only those accounts that need them. Such a move will limit the types of actions that a malicious actor could perform if they were to compromise an ordinary user\u2019s account. It also allows organizations to configure the scope of their monitoring tools to watch for anomalous activity across a fewer number of administrative accounts, thereby helping organizations to respond to suspicious user behavior on those accounts more quickly.<\/p>\n<p>In addition to those measures, Carnegie Mellon University notes that organizations can use network segmentation to help to prevent malicious actors from using a successful phish to move laterally across the network to critical assets, block Microsoft Office macros and use attachment filtering to shut down common attack vectors for phishers as well as safeguard their domains by setting up Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM) and Domain-based Message Authentication, Reporting &amp; Conformance (DMARC).<\/p>\n<h2 class=\"navy\">The Limitations of Technical Controls<\/h2>\n<p>Notwithstanding the best practices discussed above, technical controls alone will carry organizations\u2019 digital security posture only so far. <a href=\"https:\/\/www.itgovernanceusa.com\/blog\/gdpr-compliance-why-even-the-best-technical-controls-arent-enough\" target=\"_blank\" rel=\"noopener noreferrer\">IT Governance USA<\/a> reveals that the problem is fourfold. First, there\u2019s the issue that organizations could implement technical controls that don\u2019t reflect a proper risk assessment. This could leave organizations vulnerable to employee negligence, process shortcomings and other risks stemming from human error.<\/p>\n<p>Another problem is the opportunity for misconfigurations of organizations\u2019 other technical controls. Security analysts are human; they\u2019re not exempt from making mistakes. Those mistakes could apply to some of the most fundamental security controls that their employer needs to keep its most critical assets and information safe.<\/p>\n<p>But the risks extend beyond just critical systems. Information and assets are interconnected, after all, a fact which gives organizations the opportunity to leverage one compromise and potentially turn it into another in some way. This possibility, when combined with the reality that threats are constantly evolving past what technical controls are designed to detect or prevent, highlights the limitations of grounding digital security efforts in technology alone.<\/p>\n<h2 class=\"navy\">Putting a Focus on People<\/h2>\n<p>If they want to truly address the threats of human error and phishing, organizations need to complement their technical controls with their people controls. They can do this by building a security awareness training program. Such an initiative inherently recognizes that all people\u2014including contractors, employees and executives\u2014are responsible for helping to uphold their employers\u2019 security as well as to advance their organizations\u2019 security posture.<\/p>\n<p>Organizations can begin by creating and implementing a process for providing digital security training to their workforce. To complete this step, it\u2019s important that organizations identify the training that all of their covered roles need, decide upon a frequency for providing training and select the topics that they would like to emphasize in their training.<\/p>\n<p>Next, they can select a process for distributing the training. Perhaps they want to create their own security awareness training content. Or maybe their security requirements would be better met by working with a <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\">managed services provider<\/a> like ITEGRITI that can provide this content for them. It\u2019s then up to them to provide the security awareness training to their workforce.<\/p>\n<p>Either way, organizations need to have an understanding of their digital security risk baseline to get started with creating a security awareness training program. Organizations can understand their current risk exposure by taking ITEGRITI\u2019s Cybersecurity Risk Assessment. These risk assessment questions are based on the essential cybersecurity controls that help companies to avoid hacks and minimize business impact during cybersecurity events. They will receive a copy of the risk baseline report along with a cybersecurity maturity score based solely on this attestation in addition to control implications in areas where cybersecurity controls may need improvement.<\/p>\n<p>For more information, check out ITEGRITI\u2019s assessment <a href=\"https:\/\/www.research.net\/r\/cyberriskbaseline\">here<\/a>.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\"><p>This SMB Guide is part of a series to assist small and medium-sized businesses with their cybersecurity needs. You can read others in the series here:<\/p>\n<ul>\n<li><a href=\"\/2021\/blog\/smb-cybersecurity-guide-the-role-of-a-ciso\/\">Cybersecurity Guide: The Role of a CISO<\/a><\/li>\n<li><a href=\"\/2021\/blog\/smb-cybersecurity-guide-security-awareness-training\/\">Cybersecurity Guide: Security Awareness &amp; Training<\/a><\/li>\n<li><a href=\"\/2021\/blog\/smb-cybersecurity-guide-to-asset-inventory\/\">Cybersecurity Guide: Asset Inventory<\/a><\/li>\n<li><a href=\"\/2021\/blog\/smbs-cybersecurity-guide-asset-baselines-hardening-change-management\/\">Cybersecurity Guide: Asset Baselines, Hardening and Change Management<\/a><\/li>\n<li><a href=\"\/2021\/managed-services\/smbs-cybersecurity-guide-vulnerability-management\/\">Cybersecurity Guide: Vulnerability Management<\/a><\/li>\n<li><a href=\"\/2021\/managed-services\/smb-guide-to-access-account-management\/\">Cybersecurity Guide: Access &amp; Account Management<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-guide-to-supply-chain-management-third-party-vendors\/\">Cybersecurity Guide: Supply Chain Management\/Third Party Vendors<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-guide-to-incident-management-review\/\">Cybersecurity Guide: Incident Management &amp; Review<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smbs-cybersecurity-guide-information-management-protection\/\">Cybersecurity Guide: Information Management &amp; Protection<\/a><\/li>\n<li><a href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-guide-to-boundary-defense-electronic-physical-security\/\">Cybersecurity Guide: Boundary Defense, Electronic &amp; Physical Security<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Human error, or unintentional actions by human users that contribute to security issues, is one of the most significant digital security challenges confronting SMEs. <\/p>\n","protected":false},"author":12,"featured_media":2350,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[839,633],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SMB&#039;s Cybersecurity Guide: Security Awareness &amp; Training - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SMB&#039;s Cybersecurity Guide: Security Awareness &amp; Training\" \/>\n<meta property=\"og:description\" content=\"Human error, or unintentional actions by human users that contribute to security issues, is one of the most significant digital security challenges confronting SMEs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-23T09:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:18:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Bisson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Human error, or unintentional actions by human users that contribute to security issues, is one of the most significant digital security challenges confronting SMEs.\" \/>\n<meta name=\"twitter:creator\" content=\"@DMBisson\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Bisson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\"},\"author\":{\"name\":\"David Bisson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\"},\"headline\":\"SMB&#8217;s Cybersecurity Guide: Security Awareness &#038; Training\",\"datePublished\":\"2021-02-23T09:00:33+00:00\",\"dateModified\":\"2021-04-12T05:18:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\"},\"wordCount\":1335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg\",\"keywords\":[\"8 Minute Read\",\"Recent\"],\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\",\"name\":\"SMB's Cybersecurity Guide: Security Awareness & Training - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg\",\"datePublished\":\"2021-02-23T09:00:33+00:00\",\"dateModified\":\"2021-04-12T05:18:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SMB&#8217;s Cybersecurity Guide: Security Awareness &#038; Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\",\"name\":\"David Bisson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"caption\":\"David Bisson\"},\"description\":\"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/\",\"https:\/\/x.com\/DMBisson\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SMB's Cybersecurity Guide: Security Awareness & Training - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/","og_locale":"en_US","og_type":"article","og_title":"SMB's Cybersecurity Guide: Security Awareness & Training","og_description":"Human error, or unintentional actions by human users that contribute to security issues, is one of the most significant digital security challenges confronting SMEs.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-02-23T09:00:33+00:00","article_modified_time":"2021-04-12T05:18:16+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg","type":"image\/jpeg"}],"author":"David Bisson","twitter_card":"summary_large_image","twitter_description":"Human error, or unintentional actions by human users that contribute to security issues, is one of the most significant digital security challenges confronting SMEs.","twitter_creator":"@DMBisson","twitter_site":"@itegriti","twitter_misc":{"Written by":"David Bisson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/"},"author":{"name":"David Bisson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807"},"headline":"SMB&#8217;s Cybersecurity Guide: Security Awareness &#038; Training","datePublished":"2021-02-23T09:00:33+00:00","dateModified":"2021-04-12T05:18:16+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/"},"wordCount":1335,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg","keywords":["8 Minute Read","Recent"],"articleSection":["Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/","name":"SMB's Cybersecurity Guide: Security Awareness & Training - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg","datePublished":"2021-02-23T09:00:33+00:00","dateModified":"2021-04-12T05:18:16+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_smb_awareness_training.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/smb-cybersecurity-guide-security-awareness-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"SMB&#8217;s Cybersecurity Guide: Security Awareness &#038; Training"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807","name":"David Bisson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","caption":"David Bisson"},"description":"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.","sameAs":["https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/","https:\/\/x.com\/DMBisson"],"url":"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2268"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2268"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2268\/revisions"}],"predecessor-version":[{"id":2275,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2268\/revisions\/2275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2350"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}