{"id":4243,"date":"2022-07-27T09:26:25","date_gmt":"2022-07-27T13:26:25","guid":{"rendered":"https:\/\/b2bcybersecure.com\/?p=4243"},"modified":"2022-07-27T12:01:46","modified_gmt":"2022-07-27T16:01:46","slug":"why-are-small-businesses-vulnerable-to-cyberattacks","status":"publish","type":"post","link":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/","title":{"rendered":"Why are small businesses vulnerable to cyberattacks?"},"content":{"rendered":"<p>While small businesses have accelerated the adoption of new technologies for work during the pandemic, their extensive IT networks created new vulnerabilities to attack. In addition, many small businesses don&#8217;t expect to be targeted by hackers, cyber security is therefore low on their priority list.<\/p>\n<p>Cyberattacks are becoming more common for small businesses. According to Mastercard, hackers attacked SMEs twice as much as large organizations during the pandemic. During 2020 and 2021, data theft at SMESs jumped 152 %, compared to the previous two years , according to RiskRecon, a Mastercard company. When it comes to large companies, breaches increased by only 75 % over the same period.<\/p>\n<h2>Why do SMEs need cyber insurance?<\/h2>\n<p>Some small businesses are aware of the threat, but some are not insured in case of damage. General insurance does not cover legal fees due to a cyber attack, as well as the cost of fixing digital infrastructure and restoring confidential data. It is therefore important from SME to purchase cyber insurance to protect themselves and cover losses caused by cyber attacks and fraud.<\/p>\n<h2>Why do only 50% of SMEs have cyber insurance?<\/h2>\n<p>According to a WSJ Pro Cybersecurity survey, only 52% of SMEs with less than $50 million in annual revenue, have cyber insurance compared to 75% of larger companies.<\/p>\n<h3>The cost of cyber insurance is rising for SMEs<\/h3>\n<p>Getting cyber insurance can be vital for a small business, however, it is becoming increasingly expensive to obtain. The price of cyber insurance for SMEs has increased by 10 to 15%, according to ProWriters, a wholesale insurance company.<\/p>\n<h2>SMEs resist to implant the measures required to obtain cyber insurance<\/h2>\n<p>Price is not the only barrier. More and more small businesses are being turned away because they can&#8217;t meet the strictest underwriting requirements.<\/p>\n<p>For example, companies may now be required to implement multi-factor authentication for all individuals with access to the company&#8217;s network. Multi-factor authentication helps reduce the risk of credentials being stolen and used by cyber criminals to gain access to a network. Insurers may also require SMEs to encrypt their backup data and develop a response plan in the event of a cyberattack.<\/p>\n<p>Small businesses may be able to avoid some requirements by purchasing more a policy from a technology company that sells insurance, known in the industry as Insurtechs. Their insurance policies often have less onerous underwriting requirements initially, but they require small businesses to regularly improve their cyber security as a condition for maintaining coverage.<\/p>\n<h2>How can a small business implement security measures to obtain cyber insurance?<\/h2>\n<p>Reducing your SME&#8217;s risk exposure allows you to obtain insurance coverage at an affordable cost. This is not only a prudent investment, but also a way to reduce the cost of your insurance premiums each year. In some cases, the savings generated are often enough to justify the investments. The key is to do business with a recognized specialist in cyber security that caters to SMEs, such as <a href=\"https:\/\/b2bcybersecure.com\/en\/\">B2B Cyber Secure<\/a>. Their solutions are not only recognized by insurers, but are also adapted to the needs and limited budgets of smaller organizations.<\/p>\n<p><span data-contrast=\"none\">References<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/www.wsj.com\/articles\/small-business-cyberattacks-increase-11654540786?mod=djemfoe\"><span data-contrast=\"none\">WSJ :\u00a0 Small Businesses Struggle With an Increase in Cyberattacks<\/span><\/a><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/www.tibco.com\/reference-center\/what-is-insurtech\"><span data-contrast=\"none\">TIBCO : What is Insurtech?<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/b2bcybersecure.com\/en\/\"><span data-contrast=\"none\">B2B Cyber Secure, builder of secure architectures for SMEs<\/span><\/a><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While small businesses have accelerated the adoption of new technologies for work during the pandemic, their extensive IT networks created new vulnerabilities to attack. In addition, many small businesses don&#8217;t expect to be targeted by hackers, cyber security is therefore low on their priority list. Cyberattacks are becoming more common for small businesses. According to [&#8230;]\n","protected":false},"author":4,"featured_media":4241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-4243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why are small businesses vulnerable to cyberattacks? - B2B Cyber Secure<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why are small businesses vulnerable to cyberattacks? - B2B Cyber Secure\" \/>\n<meta property=\"og:description\" content=\"While small businesses have accelerated the adoption of new technologies for work during the pandemic, their extensive IT networks created new vulnerabilities to attack. In addition, many small businesses don&#8217;t expect to be targeted by hackers, cyber security is therefore low on their priority list. Cyberattacks are becoming more common for small businesses. According to [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"B2B Cyber Secure\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-27T13:26:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-27T16:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2022\/07\/AdobeStock_491587646-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1366\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Martin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/\"},\"author\":{\"name\":\"Martin\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/person\\\/02cbc0bcf788384da1549a83bbb8a349\"},\"headline\":\"Why are small businesses vulnerable to cyberattacks?\",\"datePublished\":\"2022-07-27T13:26:25+00:00\",\"dateModified\":\"2022-07-27T16:01:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/AdobeStock_491587646-1.jpeg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/\",\"name\":\"Why are small businesses vulnerable to cyberattacks? - B2B Cyber Secure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/AdobeStock_491587646-1.jpeg\",\"datePublished\":\"2022-07-27T13:26:25+00:00\",\"dateModified\":\"2022-07-27T16:01:46+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/why-are-small-businesses-vulnerable-to-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/AdobeStock_491587646-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/AdobeStock_491587646-1.jpeg\",\"width\":2048,\"height\":1366,\"caption\":\"Modern entrepreneurs having a discussion while working with a laptop in an office. Focused businesspeople collaborating in a modern workspace. Two young businesspeople sitting together at a table.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"name\":\"B2B Cyber Secure\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#organization\",\"name\":\"B2B Cyber Secure\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Logo-B2B-Cyber-secure.png\",\"width\":67,\"height\":67,\"caption\":\"B2B Cyber Secure\"},\"image\":{\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2bcybersecure\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/#\\\/schema\\\/person\\\/02cbc0bcf788384da1549a83bbb8a349\",\"name\":\"Martin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png\",\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png\",\"contentUrl\":\"https:\\\/\\\/b2bcybersecure.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png\",\"caption\":\"Martin\"},\"sameAs\":[\"https:\\\/\\\/www.b2bcybersecure.ca\"],\"url\":\"https:\\\/\\\/b2bcybersecure.com\\\/en\\\/author\\\/mbureuil\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why are small businesses vulnerable to cyberattacks? - B2B Cyber Secure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Why are small businesses vulnerable to cyberattacks? - B2B Cyber Secure","og_description":"While small businesses have accelerated the adoption of new technologies for work during the pandemic, their extensive IT networks created new vulnerabilities to attack. In addition, many small businesses don&#8217;t expect to be targeted by hackers, cyber security is therefore low on their priority list. Cyberattacks are becoming more common for small businesses. According to [...]","og_url":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/","og_site_name":"B2B Cyber Secure","article_published_time":"2022-07-27T13:26:25+00:00","article_modified_time":"2022-07-27T16:01:46+00:00","og_image":[{"width":2048,"height":1366,"url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2022\/07\/AdobeStock_491587646-1.jpeg","type":"image\/jpeg"}],"author":"Martin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Martin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/"},"author":{"name":"Martin","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/person\/02cbc0bcf788384da1549a83bbb8a349"},"headline":"Why are small businesses vulnerable to cyberattacks?","datePublished":"2022-07-27T13:26:25+00:00","dateModified":"2022-07-27T16:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/"},"wordCount":539,"publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2022\/07\/AdobeStock_491587646-1.jpeg","articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/","url":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/","name":"Why are small businesses vulnerable to cyberattacks? - B2B Cyber Secure","isPartOf":{"@id":"https:\/\/b2bcybersecure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2022\/07\/AdobeStock_491587646-1.jpeg","datePublished":"2022-07-27T13:26:25+00:00","dateModified":"2022-07-27T16:01:46+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/why-are-small-businesses-vulnerable-to-cyberattacks\/#primaryimage","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2022\/07\/AdobeStock_491587646-1.jpeg","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2022\/07\/AdobeStock_491587646-1.jpeg","width":2048,"height":1366,"caption":"Modern entrepreneurs having a discussion while working with a laptop in an office. Focused businesspeople collaborating in a modern workspace. Two young businesspeople sitting together at a table."},{"@type":"WebSite","@id":"https:\/\/b2bcybersecure.com\/en\/#website","url":"https:\/\/b2bcybersecure.com\/en\/","name":"B2B Cyber Secure","description":"","publisher":{"@id":"https:\/\/b2bcybersecure.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2bcybersecure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/b2bcybersecure.com\/en\/#organization","name":"B2B Cyber Secure","url":"https:\/\/b2bcybersecure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/01\/Logo-B2B-Cyber-secure.png","width":67,"height":67,"caption":"B2B Cyber Secure"},"image":{"@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/b2bcybersecure\/"]},{"@type":"Person","@id":"https:\/\/b2bcybersecure.com\/en\/#\/schema\/person\/02cbc0bcf788384da1549a83bbb8a349","name":"Martin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png","url":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png","contentUrl":"https:\/\/b2bcybersecure.com\/wp-content\/uploads\/2021\/03\/Capture-decran-le-2021-03-15-a-16.57.58-96x96.png","caption":"Martin"},"sameAs":["https:\/\/www.b2bcybersecure.ca"],"url":"https:\/\/b2bcybersecure.com\/en\/author\/mbureuil\/"}]}},"_links":{"self":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts\/4243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/comments?post=4243"}],"version-history":[{"count":5,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts\/4243\/revisions"}],"predecessor-version":[{"id":4256,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/posts\/4243\/revisions\/4256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media\/4241"}],"wp:attachment":[{"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/media?parent=4243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/categories?post=4243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2bcybersecure.com\/en\/wp-json\/wp\/v2\/tags?post=4243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}