{"id":3101,"date":"2022-01-03T03:56:22","date_gmt":"2022-01-03T03:56:22","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3101"},"modified":"2022-09-14T11:03:41","modified_gmt":"2022-09-14T11:03:41","slug":"as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/","title":{"rendered":"As Your Business Grows, So Does Its Attack Surface &#8211; Have Experts Assess Your Security Posture"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>As businesses increase in size, it&#8217;s more difficult to keep their security posture on the same level without a significant budget. Having the power of combining your security and business needs with available managed services on the market instead of hiring expensive dedicated staff is a great way of balancing spending and outcome.<\/p>\n<h2>An increasing attack surface<\/h2>\n<p>It is certainly not news that cyber threats are on the rise globally. Every day there are multiple headlines and social media posts about companies falling victim to an attack. Cyber risk is a growing threat to all companies, even small- and medium-sized businesses. It is no wonder that CISA has recently published a detailed advisory for all businesses on how to protect themselves against ransomware attacks.<\/p>\n<p>The fact is that over the past two years, driven by the urgent need to support new operating norms \u2013 remote work, eCommerce, digital payments \u2013 small and midsize businesses have heavily invested into digitizing their processes. Cloud computing platforms, APIs, apps and data located outside the traditional on-premises data centers are now the new normal of doing business. Despite the benefits afforded by this digital transformation, businesses are facing a whole new array of cyber threats and risks.<\/p>\n<p>Many small businesses falsely consider that they will not be targeted by cybercriminals because their value is not significant. However, this is far from being true. The fact is online criminals attack a small business just as much as a large one. As witnessed in the case of criminal group APT41, small and midsize businesses are often targeted as a gateway to higher-value targets, critical systems, and highly classified information.<\/p>\n<h2>A multi-faceted challenge<\/h2>\n<p>To respond and adapt to the expanding threat surface, most companies are planning to make, or have already begun making technology-driven organizational changes that define a digital transformation. These businesses have realized that cybersecurity is not yet another expense, but it is <a href=\"https:\/\/blog.netwrix.com\/2019\/10\/22\/how-can-cybersecurity-help-in-business-growth\/\" target=\"_blank\" rel=\"noopener\">essential to their competitiveness, growth, and future success<\/a>.<\/p>\n<p>Nevertheless, the cyber challenge faced by small and medium businesses is multi-faceted. They are often under-resourced and are particularly affected by a global cyber-skills shortage. Understaffed security teams are overwhelmed with defending the business from the full range of cyber threats while managing an increasingly distributed workforce and complex digital infrastructure.<\/p>\n<h2>An intolerable disruption<\/h2>\n<p>The combination of under-resourced security operations teams and sophisticated attackers can really become explosive for small and medium businesses.<\/p>\n<p>The recent <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password?sref=gKSeqgQQ\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline attack<\/a> demonstrated the damaging ripple effect of a single, well-crafted ransomware attack. To contain the breach, operators shut down 5,500 miles of pipeline, which carries 45% of the east coast\u2019s fuel supplies. A few days before that incident, a <a href=\"https:\/\/www.nbcsandiego.com\/news\/local\/scripps-health-employees-regaining-access-to-internal-systems-hit-by-cyberattack-2\/2619540\/\" target=\"_blank\" rel=\"noopener\">ransomware attack at Scripps Health<\/a>, a major healthcare system in San Diego, which led to the suspension of access to its online patient portal and website. Scripps\u2019 network was not fully operational for weeks after the event.<\/p>\n<p>This kind of disruption is intolerable for small and midsize businesses. Not only is it damaging to customer trust and to the wider reputation of the organization, but the cost can be enormous. According to the IBM Cost of Data Breach 2021 report, ransomware attacks cost an average of $4.62 million, more expensive than the average data breach ($4.24 million). In the retail sector, where many small and medium businesses operate, the cost of a data breach exploded to $3.27 million, an increase of 62.7% compared to 2020. These costs included escalation, notification, lost business, and response costs, but did not include the cost of the ransom.<\/p>\n<h2>Be realistic to avoid failure<\/h2>\n<p>Simply trying to stop attackers from getting onto systems is utopic. It doesn\u2019t work for the advanced attacks that businesses face today. Small and medium businesses must become resilient to contain the attacks quickly and minimize disruption so that the organization isn\u2019t negatively impacted. Accepting that attacks will happen is not accepting failure. It is the reality of being a mobile and interconnected business.<\/p>\n<p>While creating a culture of security to build the right defenses to reduce the overall risk to business is a key strategic choice, small and medium businesses do not have the funds to establish a robust posture.<\/p>\n<p>For example, while Chief Information Security Officers (CISOs) are imperative for enterprise companies to manage their cyber risk, the salary range for such professionals is likely prohibitive for small, even midsized businesses. In addition, building a security operations center (SOC) to continuously monitor for abnormal behavior is mandatory to have the capacity to detect an attack in its early stages and minimize the impact, but supporting such a facility requires skills and personnel.<\/p>\n<h2>Managed services can help businesses to avoid victimhood<\/h2>\n<p>The solution is not to become the victim of an ancient Greek sacrifice. Small and medium businesses have the opportunity to reap the benefits of <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" target=\"_blank\" rel=\"noopener\">managed services<\/a> offered by specialized companies. Whether these services come in the form of a vCISO, vSOC or <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">consulting<\/a>, they have become a popular option for a large number of companies, allowing them the option of obtaining the services of highly qualified professionals at a fraction of onboarded personnel salary.<\/p>\n<p>There are many reasons to consider contracting a managed services company:<\/p>\n<p><strong>1. Grow your business. <\/strong><\/p>\n<p>Growth-oriented businesses have already realized that cybersecurity is an enabler to success. Having in place a robust security program will demonstrate to your prospective clients that you have proactively and effectively built-in security to help discover and reduce vulnerabilities early.<\/p>\n<p><strong>2. Develop an effective cyber risk management program. <\/strong><\/p>\n<p>Putting an effective cybersecurity strategy in place can be overwhelming. And with a tight budget, how do you prioritize efforts when it comes to investing in a cyber risk management solution?\u00a0Investing in a managed service solution you will benefit from:<\/p>\n<ul>\n<li>Gaining visibility into your risk environment by performing a vulnerability risk assessment on your organization&#8217;s infrastructure.<\/li>\n<li>Analyzing the key risk factors to prioritize what to do in response.<\/li>\n<li>Understanding the level of risk reduction that can be expected from a given investment in risk mitigation.<\/li>\n<li>Evolving your cyber strategy over time to map with the business needs as your business evolves.<\/li>\n<\/ul>\n<p><strong>3. Maintain compliance with regulations and standards.<\/strong><\/p>\n<p>Maintaining compliance with an increasing patchwork of security and privacy regulations and standards is not yet another tick-in-the-cheat-sheet exercise. It is an ongoing effort that goes well beyond one-time assessment. Regulatory compliance is an enabler for robust cybersecurity and privacy posture and a demonstration of respect towards your customers and partners.<\/p>\n<h2>How ITEGRITI can help small and medium businesses<\/h2>\n<p>ITEGRITI offers a wide variety of managed cybersecurity services.<\/p>\n<p>By establishing a key set of necessary tasks and developing a model where organizations can select services to meet their specific need and budget, ITEGRITI can provide ongoing <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" target=\"_blank\" rel=\"noopener\">compliance and cybersecurity advisory<\/a> through our Virtual support models:\u00a0 vCISO, vCompliance Team, and Workforce Support. Our fractional resource models are very cost-effective.<\/p>\n<p>In addition, ITEGRITI <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">designs and implements programs<\/a> that help companies avoid hacks, detect breaches when they occur, minimize business disruption during a cybersecurity event, and reduce incident recovery time. We work with organizations to align cybersecurity programs with enterprise risks and first consider existing security hardware, software, and security\/compliance controls. We help companies establish and evaluate specific control objectives and internal controls, measure operational effectiveness, and establish an improvement plan that includes actionable remediation activities.<\/p>\n<p>To learn more, <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">contact<\/a> our experts now!<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As businesses increase in size, it&#8217;s more difficult to keep their security posture on the same level without a significant budget. Having the power of combining your security and business needs with available managed services on the market instead of hiring expensive dedicated staff is a great way of balancing spending and outcome.<\/p>\n","protected":false},"author":10,"featured_media":3104,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[2188,2193,2192,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>As Your Business Grows, So Does Its Attack Surface - Have Experts Assess Your Security Posture<\/title>\n<meta name=\"description\" content=\"As businesses increase in size, it&#039;s more difficult to keep their security posture on the same level without a significant budget.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"As Your Business Grows, So Does Its Attack Surface - Have Experts Assess Your Security Posture\" \/>\n<meta property=\"og:description\" content=\"As businesses increase in size, it&#039;s more difficult to keep their security posture on the same level without a significant budget.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-03T03:56:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-14T11:03:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"As Your Business Grows, So Does Its Attack Surface &#8211; Have Experts Assess Your Security Posture\",\"datePublished\":\"2022-01-03T03:56:22+00:00\",\"dateModified\":\"2022-09-14T11:03:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\"},\"wordCount\":1482,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Water Sector\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\",\"name\":\"As Your Business Grows, So Does Its Attack Surface - Have Experts Assess Your Security Posture\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg\",\"datePublished\":\"2022-01-03T03:56:22+00:00\",\"dateModified\":\"2022-09-14T11:03:41+00:00\",\"description\":\"As businesses increase in size, it's more difficult to keep their security posture on the same level without a significant budget.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg\",\"width\":800,\"height\":450,\"caption\":\"security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"As Your Business Grows, So Does Its Attack Surface &#8211; Have Experts Assess Your Security Posture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"As Your Business Grows, So Does Its Attack Surface - Have Experts Assess Your Security Posture","description":"As businesses increase in size, it's more difficult to keep their security posture on the same level without a significant budget.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/","og_locale":"en_US","og_type":"article","og_title":"As Your Business Grows, So Does Its Attack Surface - Have Experts Assess Your Security Posture","og_description":"As businesses increase in size, it's more difficult to keep their security posture on the same level without a significant budget.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-01-03T03:56:22+00:00","article_modified_time":"2022-09-14T11:03:41+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"As Your Business Grows, So Does Its Attack Surface &#8211; Have Experts Assess Your Security Posture","datePublished":"2022-01-03T03:56:22+00:00","dateModified":"2022-09-14T11:03:41+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/"},"wordCount":1482,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg","keywords":["Cybersecurity","Energy Sector","Finance Sector","Water Sector"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/","name":"As Your Business Grows, So Does Its Attack Surface - Have Experts Assess Your Security Posture","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg","datePublished":"2022-01-03T03:56:22+00:00","dateModified":"2022-09-14T11:03:41+00:00","description":"As businesses increase in size, it's more difficult to keep their security posture on the same level without a significant budget.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_blog75_attack_surface.jpg","width":800,"height":450,"caption":"security"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/as-your-business-grows-so-does-its-attack-surface-have-experts-assess-your-security-posture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"As Your Business Grows, So Does Its Attack Surface &#8211; Have Experts Assess Your Security Posture"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3101"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3101"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3101\/revisions"}],"predecessor-version":[{"id":3106,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3101\/revisions\/3106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3104"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}