{"id":3322,"date":"2020-06-09T14:54:49","date_gmt":"2020-06-09T18:54:49","guid":{"rendered":"https:\/\/new.b2b2c.ca\/b2bcybersecure\/securiser-votre-systeme-telephonique-voip-est-ce-necessaire\/"},"modified":"2021-05-12T14:32:08","modified_gmt":"2021-05-12T18:32:08","slug":"basic-primer-on-computer-fraud-targeting-smbs","status":"publish","type":"post","link":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/","title":{"rendered":"Basic primer on computer fraud targeting SMBs"},"content":{"rendered":"<div class=\"message-box relative dark\" style=\"padding-top:21px;padding-bottom:21px;\"><div class=\"message-box-bg-image bg-fill fill\" ><\/div><div class=\"message-box-bg-overlay bg-fill fill\" ><\/div><div class=\"container relative\"><div class=\"inner last-reset\">\n<div class=\"row align-middle align-center\"  id=\"row-1082080541\">\n\n\t<div class=\"col medium-11 small-12 large-11\"  >\n\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n<p>60% of small businesses close within 6 months of a cyber attack. 1<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<\/div><\/div><\/div>\n\t<section class=\"section\" id=\"section_169024586\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t<div class=\"is-border\"\n\t\tstyle=\"border-color:rgb(235, 235, 235);border-width:1px 0px 0px 0px;\">\n\t<\/div>\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row row-large align-center\"  id=\"row-388956752\">\n\n\t<div class=\"col medium-6 small-12 large-6\"  >\n\t\t<div class=\"col-inner text-left\"  >\n\t\t\t\n\t\t\t\n<p style = \"text-align: left;\"> Have you ever been the victim of a cyberattack? All businesses are at one time or another at risk of computer fraud. The stakes are high. Some of these attacks can even be fatal. <\/p>\n<p> What are the most common types of computer fraud or cyberattacks? Read on. We will define the 3 main ones. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-6 small-12 large-6\"  >\n\t\t<div class=\"col-inner box-shadow-2 box-shadow-5-hover\" style=\"background-color:rgb(255, 255, 255);padding:15px 15px 15px 15px;\" >\n\t\t\t\n\t\t\t\n<h3> What is cybercrime against businesses? <\/h3>\n<p> Cybercrime is an activity carried out by criminal organizations which targets to compromise the computer systems of our companies via the Internet. The goal is in most cases the theft of confidential or critical data from our operations for financial purposes. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\n  <div class=\"banner has-hover\" id=\"banner-11649016\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                                    \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-1429714396\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text dark\">\n              \n              <div class=\"text-inner text-center\">\n                  \n<h4 class = \"uppercase\"> most common types of cyber fraud in Canada during a pandemic <\/h4>\n\t<div id=\"gap-378792869\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style scope=\"scope\">\n\n#gap-378792869 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div class=\"img has-hover x md-x lg-x y md-y lg-y\" id=\"image_149016648\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"406\" src=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Capture-decran-le-2021-04-30-a-15.14.47-1400x557.png\" class=\"attachment-large size-large\" alt=\"types de cyberfraudes les plus survenues au Canada en temps de pand\u00e9mie\" srcset=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Capture-decran-le-2021-04-30-a-15.14.47-1400x557.png 1400w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Capture-decran-le-2021-04-30-a-15.14.47-800x318.png 800w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Capture-decran-le-2021-04-30-a-15.14.47-768x305.png 768w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Capture-decran-le-2021-04-30-a-15.14.47-1536x611.png 1536w, https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/04\/Capture-decran-le-2021-04-30-a-15.14.47.png 1952w\" sizes=\"auto, (max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style scope=\"scope\">\n\n#image_149016648 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n              <\/div>\n           <\/div>\n                            \n<style scope=\"scope\">\n\n#text-box-1429714396 {\n  width: 75%;\n}\n#text-box-1429714396 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-11649016 {\n  padding-top: 394px;\n}\n<\/style>\n  <\/div>\n\n\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_169024586 {\n  padding-top: 59px;\n  padding-bottom: 59px;\n  min-height: 300px;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_2121482776\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row\"  id=\"row-1010471731\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner box-shadow-2 box-shadow-5-hover\" style=\"padding:15px 15px 15px 15px;\" >\n\t\t\t\n\t\t\t\n<h2> What is phishing? <\/h2>\n<p> Also known as &#8220;phishing&#8221;, this type of fraud occurs when a business has been attacked through fraudulent communications. For example, an employee may accidentally open a fraudulent link in an email that directs them to a bogus website. From that point on, scammers have remote access to the employee&#8217;s computer in order to retrieve personal information such as usernames and passwords. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-867945603\">\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<h3> What can be done to reduce the risk of phishing? <\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-8 small-12 large-8\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p> To counter phishing, SMBs provide training to their employees to make them aware of the danger. A To this, they obtain a specific cybercrime insurance policy and finally they hire experts to strengthen their IT and to be accompanied in the event of an incident. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-1295201804\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner box-shadow-2 box-shadow-5-hover\" style=\"padding:15px 15px 15px 15px;\" >\n\t\t\t\n\t\t\t\n<h2> What is a malware attack? <\/h2>\n<p> This technique refers to any program that is designed to break into and infect computers and computer networks through a vulnerability. Malware comes in many forms such as spyware, ransomware, and viruses. <\/p>\n<p> Hackers can block access to company networks and render company systems unusable, or hack into a database in order to steal passwords, credit card numbers and data. &#8216;other confidential information. This compromises the security of all records for both internal employees and clients of the company. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-1204589797\">\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<h3> What can be done to reduce the risk of malware? <\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-8 small-12 large-8\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p> The first step is to be vigilant. For example, beware of emails that ask us to provide information such as passwords. <\/p>\n<p> A professional IT solution should be in place to protect your computer and network. Antivirus software can detect malware and recognize potential threats. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-297885253\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner box-shadow-2 box-shadow-5-hover\" style=\"padding:15px 15px 15px 15px;\" >\n\t\t\t\n\t\t\t\n<h2> What is a man-in-the-middle attack (HDM)? <\/h2>\n<p> Also known as the man-in-the-middle attack or man-in-the-middle attack, this type of fraud occurs when a hacker breaks into a transaction between two people with the aim of to go and steal their personal information. These can be introduced through an unsecured WiFi network or through malware. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-1156428757\">\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<h3> What can be done to reduce the risks of the middle man? <\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-8 small-12 large-8\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p> It is advisable to install encryption software that allows the encryption of communications between devices passing through unsecured networks such as the Internet. <\/p>\n<p> If your employees must use public networks, L implementing firewall technologies reduces the risk to your network. It is also important to keep all your security software up to date, as well as all other applications and operating systems on your computers. These updates often target the fixing of known security vulnerabilities. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n<div class=\"row row-large align-middle align-center\"  id=\"row-1827521796\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner box-shadow-2 box-shadow-5-hover\" style=\"background-color:rgb(255, 255, 255);padding:15px 15px 15px 15px;\" >\n\t\t\t\n\t\t\t\n<h2 style = \"text-align: left;\"> What is an employee cyberattack? <\/h2>\n<p style = \"text-align: left;\"> Unfortunately, a threat of fraud can arise internally, whether intentional or unintentional. For example, a malicious employee may be able to sell the personal data of company customers to another company for a fee. An error can also be involved. For example, an employee may post customer information online by accidentally attaching a confidential file via email. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n<div class=\"row\"  id=\"row-1584351427\">\n\n\t<div class=\"col medium-4 small-12 large-4\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<h3> How to reduce the risk of an employee&#8217;s cyberattacks? <\/h3>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n\t<div class=\"col medium-8 small-12 large-8\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p> It all starts with having a privacy policy in place and clearly detailing the company&#8217;s security processes. <\/p>\n<p> It can be difficult to prevent ill-intentioned employees, but we can always limit who can access the confidential data of our customers and employees. Technologies also exist to detect the sending by email of data marked confidential and to record the identity of the members of your personnel requesting its export. <\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_2121482776 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_256779236\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t<div class=\"is-border\"\n\t\tstyle=\"border-color:rgb(235, 235, 235);border-width:1px 0px 0px 0px;\">\n\t<\/div>\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row row-large align-middle align-center\"  id=\"row-838567791\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\" style=\"background-color:rgb(255, 255, 255);\" >\n\t\t\t\n\t\t\t\n<h2 style=\"text-align: left;\">Final thoughts<\/h2>\n<p style=\"text-align: left;\">Computer fraud has become a source of concern not just for large companies, but also for our SMBs. With e-commerce growing rapidly and teleworking forced by the pandemic, the risk of being affected is multiplied and for SMBs the risk is proportionately greater.<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\n  <div class=\"banner has-hover\" id=\"banner-2026197516\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill bg-loaded\"><\/div>\n                                    \n                    <\/div>\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n   <div id=\"text-box-560964289\" class=\"text-box banner-layer x50 md-x50 lg-x50 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text dark\">\n              \n              <div class=\"text-inner text-center\">\n                  \n<h3 class=\"uppercase\">costs associated with cyber fraud<\/h3>\n<h5 class=\"uppercase\">MORE IMPORTANT for small businesses<\/h5>\n<p>\u00a0<\/p>\n<p><span style=\"font-size: 180%;\"> Small businesses $ 1088 <\/span><\/p>\n<p><span style=\"font-size: 180%;\"> Large business $ 284<\/span><\/p>\n<p>per employee<\/p>\n              <\/div>\n           <\/div>\n                            \n<style scope=\"scope\">\n\n#text-box-560964289 {\n  width: 86%;\n}\n#text-box-560964289 .text {\n  font-size: 100%;\n}\n<\/style>\n    <\/div>\n \n        <\/div>\n      <\/div>\n\n            \n<style scope=\"scope\">\n\n#banner-2026197516 {\n  padding-top: 285px;\n  background-color: #6a79b7;\n}\n<\/style>\n  <\/div>\n\n\n<div class=\"row\"  id=\"row-338290227\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<p>It is certainly important to react quickly when you are the victim of a computer attack or fraud, but to do that you have to understand our risk and be prepared. The basic practices that we have presented in this article are all recommended, but from these we encourage you to establish as soon as possible a relationship with a group of cybersecurity experts like B2B Cyber Secure. This relationship will bring the knowledge you need to quickly understand and reduce risk to your business.<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_256779236 {\n  padding-top: 59px;\n  padding-bottom: 59px;\n  min-height: 300px;\n}\n<\/style>\n\t<\/section>\n\t\n\t<section class=\"section\" id=\"section_300648022\">\n\t\t<div class=\"bg section-bg fill bg-fill bg-loaded bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n<div class=\"row\"  id=\"row-377431812\">\n\n\t<div class=\"col small-12 large-12\"  >\n\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<h2>Refences<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.fr\/resource-center\/preemptive-safety\/what-is-malware-and-how-to-protect-against-it\">https:\/\/www.kaspersky.fr\/resource-center\/preemptive-safety\/what-is-malware-and-how-to-protect-against-it<\/a>\u00a0\u00a0<\/p>\n<p><a href=\"https:\/\/www.cisco.com\/c\/fr_ca\/products\/security\/common-cyberattacks.html#~comment-fonctionnent-les-cyberattaques\">https:\/\/www.cisco.com\/c\/fr_ca\/products\/security\/common-cyberattacks.html#~comment-fonctionnent-les-cyberattaques<\/a>\u00a0\u00a0<\/p>\n<p><a href=\"https:\/\/actualiteinformatique.fr\/cybersecurite\/quest-ce-quune-cyberattaque\">https:\/\/actualiteinformatique.fr\/cybersecurite\/quest-ce-quune-cyberattaque<\/a>\u00a0\u00a0<\/p>\n<p><a href=\"https:\/\/actualiteinformatique.fr\/cybersecurite\/quest-ce-quune-cyberattaque\">https:\/\/actualiteinformatique.fr\/cybersecurite\/quest-ce-quune-cyberattaque<\/a>\u00a0<\/p>\n<p><a href=\"https:\/\/www.kaspersky.fr\/resource-center\/threats\/man-in-the-middle-attack\">https:\/\/www.kaspersky.fr\/resource-center\/threats\/man-in-the-middle-attack<\/a>\u00a0\u00a0<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t\n\n<style scope=\"scope\">\n\n<\/style>\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style scope=\"scope\">\n\n#section_300648022 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":1811,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[26,27],"class_list":["post-3322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-en","tag-fraude-en","tag-voip-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Basic primer on computer fraud targeting SMBs - B2B Cyber Secure<\/title>\n<meta name=\"description\" content=\"What are the most common types of computer fraud or cyberattacks? Read on. We will define the three main ones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Basic primer on computer fraud targeting SMBs - B2B Cyber Secure\" \/>\n<meta property=\"og:description\" content=\"What are the most common types of computer fraud or cyberattacks? Read on. We will define the three main ones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/\" \/>\n<meta property=\"og:site_name\" content=\"B2B Cyber Secure\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-09T18:54:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-12T18:32:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Martin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/\"},\"author\":{\"name\":\"Martin\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/person\\\/02cbc0bcf788384da1549a83bbb8a349\"},\"headline\":\"Basic primer on computer fraud targeting SMBs\",\"datePublished\":\"2020-06-09T18:54:49+00:00\",\"dateModified\":\"2021-05-12T18:32:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/\"},\"wordCount\":1122,\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Expertise-en-Securite-TI.jpg\",\"keywords\":[\"Fraude\",\"VoIP\"],\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/\",\"name\":\"Basic primer on computer fraud targeting SMBs - B2B Cyber Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Expertise-en-Securite-TI.jpg\",\"datePublished\":\"2020-06-09T18:54:49+00:00\",\"dateModified\":\"2021-05-12T18:32:08+00:00\",\"description\":\"What are the most common types of computer fraud or cyberattacks? Read on. We will define the three main ones.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Expertise-en-Securite-TI.jpg\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Expertise-en-Securite-TI.jpg\",\"width\":2560,\"height\":1708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/basic-primer-on-computer-fraud-targeting-smbs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"General\",\"item\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/category\\\/general-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic primer on computer fraud targeting SMBs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"name\":\"B2B Cyber Secure\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\",\"name\":\"B2B Cyber Secure\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"width\":67,\"height\":67,\"caption\":\"B2B Cyber Secure\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2bcybersecure\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/person\\\/02cbc0bcf788384da1549a83bbb8a349\",\"name\":\"Martin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png\",\"caption\":\"Martin\"},\"sameAs\":[\"https:\\\/\\\/www.b2bcybersecure.ca\"],\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/author\\\/mbureuil\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Basic primer on computer fraud targeting SMBs - B2B Cyber Secure","description":"What are the most common types of computer fraud or cyberattacks? Read on. We will define the three main ones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/","og_locale":"en_US","og_type":"article","og_title":"Basic primer on computer fraud targeting SMBs - B2B Cyber Secure","og_description":"What are the most common types of computer fraud or cyberattacks? Read on. We will define the three main ones.","og_url":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/","og_site_name":"B2B Cyber Secure","article_published_time":"2020-06-09T18:54:49+00:00","article_modified_time":"2021-05-12T18:32:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/05\/B2B-Cyber-Secure-TI-Securisees-Secure-IT-1200X630.png","type":"image\/png"}],"author":"Martin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Martin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#article","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/"},"author":{"name":"Martin","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/person\/02cbc0bcf788384da1549a83bbb8a349"},"headline":"Basic primer on computer fraud targeting SMBs","datePublished":"2020-06-09T18:54:49+00:00","dateModified":"2021-05-12T18:32:08+00:00","mainEntityOfPage":{"@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/"},"wordCount":1122,"publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#primaryimage"},"thumbnailUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Expertise-en-Securite-TI.jpg","keywords":["Fraude","VoIP"],"articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/","url":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/","name":"Basic primer on computer fraud targeting SMBs - B2B Cyber Secure","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#primaryimage"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#primaryimage"},"thumbnailUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Expertise-en-Securite-TI.jpg","datePublished":"2020-06-09T18:54:49+00:00","dateModified":"2021-05-12T18:32:08+00:00","description":"What are the most common types of computer fraud or cyberattacks? Read on. We will define the three main ones.","breadcrumb":{"@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#primaryimage","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Expertise-en-Securite-TI.jpg","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/02\/Expertise-en-Securite-TI.jpg","width":2560,"height":1708},{"@type":"BreadcrumbList","@id":"https:\/\/b2bcybersecure.com\/en\/basic-primer-on-computer-fraud-targeting-smbs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"General","item":"https:\/\/b2bcybersecure.com\/en\/category\/general-en\/"},{"@type":"ListItem","position":2,"name":"Basic primer on computer fraud targeting SMBs"}]},{"@type":"WebSite","@id":"https:\/\/b2bcybersecure.com\/en\/#website","url":"https:\/\/b2bcybersecure.com\/en\/","name":"B2B Cyber Secure","description":"","publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2bcybersecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/b2bcybersecure.com\/en\/#organization","name":"B2B Cyber Secure","url":"https:\/\/b2bcybersecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","width":67,"height":67,"caption":"B2B Cyber Secure"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/b2bcybersecure\/"]},{"@type":"Person","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/person\/02cbc0bcf788384da1549a83bbb8a349","name":"Martin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png","caption":"Martin"},"sameAs":["https:\/\/www.b2bcybersecure.ca"],"url":"https:\/\/b2bcybersecure.com\/en\/author\/mbureuil\/"}]}},"_links":{"self":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts\/3322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/comments?post=3322"}],"version-history":[{"count":5,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts\/3322\/revisions"}],"predecessor-version":[{"id":3967,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts\/3322\/revisions\/3967"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media\/1811"}],"wp:attachment":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media?parent=3322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/categories?post=3322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/tags?post=3322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}