{"id":9261,"date":"2023-06-20T02:25:35","date_gmt":"2023-06-20T02:25:35","guid":{"rendered":"https:\/\/intelliworx.wpenginepowered.com\/uk\/?p=9261"},"modified":"2025-08-06T03:12:03","modified_gmt":"2025-08-06T03:12:03","slug":"5-essential-cybersecurity-practices-for-smbs","status":"publish","type":"post","link":"https:\/\/intelliworx.co\/uk\/blog\/5-essential-cybersecurity-practices-for-smbs\/","title":{"rendered":"5 Essential Cybersecurity Practices for SMBs"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9261\" class=\"elementor elementor-9261\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bdb0027 e-flex e-con-boxed e-con e-parent\" data-id=\"bdb0027\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f84683 elementor-widget elementor-widget-text-editor\" data-id=\"0f84683\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.hiscoxgroup.com\/news\/press-releases\/2018\/18-10-18\" target=\"_blank\" rel=\"noopener\">Every day in the UK<\/a>, approximately 65,000 hacking attempts target small- to medium-sized businesses (SMBs). Shockingly, about 4,500 of these attempts succeed, resulting in significant security breaches. This means that over a year, roughly 1.6 million out of the 5.7 million SMBs in the UK fall victim to successful hacking incidents. These staggering statistics highlight the urgent need for robust cybersecurity measures to protect SMBs from the ever-present and evolving threat landscape.<\/p><p>This article will outline five essential <a href=\"https:\/\/intelliworx.co\/uk\/cyber-security\/\">cybersecurity<\/a> practices that SMBs should implement to safeguard their digital assets and mitigate potential risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e0bbd0 elementor-widget elementor-widget-heading\" data-id=\"3e0bbd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1.\tEmployee education and awareness<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-900892b elementor-widget elementor-widget-text-editor\" data-id=\"900892b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the most critical aspects of cybersecurity for SMBs is educating and raising awareness among employees. <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Human error remains one of the leading causes of security breaches<\/a>. By providing comprehensive cybersecurity training, businesses can empower their employees to recognize and respond effectively to potential threats.<\/p><p><strong>Key areas to cover in employee education include:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28e15b4 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"28e15b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"feather icon-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Phishing awareness: <\/strong> Teach employees how to identify phishing emails and suspicious links to prevent falling victim to social engineering attacks.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"feather icon-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Password security: <\/strong>Emphasise the importance of strong, unique passwords and regular password updates to minimise the risk of unauthorised access.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"feather icon-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Data handling: <\/strong>Educate employees on best practices for handling sensitive data, including secure file sharing, data encryption, and secure disposal of physical documents.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9709b08 elementor-widget elementor-widget-heading\" data-id=\"9709b08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2.\tRegular software updates and patch management<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30f1b3a elementor-widget elementor-widget-text-editor\" data-id=\"30f1b3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Small to medium-sized businesses often overlook the significance of software updates and patch management. Cybercriminals frequently exploit vulnerabilities in outdated software versions to gain unauthorised access to systems and networks.<\/p><p>To mitigate this risk, businesses should invest in cybersecurity solutions that ensure that operating systems, applications, and security software are set to receive automatic updates to protect against known vulnerabilities. Additionally, implement patch management: Establish a proactive approach to patch management by regularly monitoring software vendors&#8217; release notes and promptly applying patches to fix security vulnerabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9db28a5 elementor-widget elementor-widget-heading\" data-id=\"9db28a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3.\tSecure network infrastructure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a985392 elementor-widget elementor-widget-text-editor\" data-id=\"a985392\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A robust network infrastructure is essential for safeguarding business data and preventing unauthorised access. To enhance network security, deploy a firewall solution to filter incoming and outgoing network traffic, blocking unauthorised access attempts and malicious connections. Encourage employees to use a virtual private network (VPN) when accessing sensitive business data remotely, ensuring secure encrypted connections. Additionally, secure Wi-Fi networks with strong passwords, disable network name (SSID) broadcasting and use encryption protocols like WPA2 or WPA3 to prevent unauthorised access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-594861f elementor-widget elementor-widget-heading\" data-id=\"594861f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4.\tRegular data backup and recovery<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5aa4688 elementor-widget elementor-widget-text-editor\" data-id=\"5aa4688\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data loss can be catastrophic for small to medium-sized businesses. Ransomware attacks and hardware failures are just a few examples of incidents that can result in data loss. Implementing a robust data backup and recovery strategy can minimise the impact of such incidents:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ebf4c3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9ebf4c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"feather icon-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Automated backup solutions:<\/strong> Utilise cloud-based backup solutions to automatically back up critical data in real time, ensuring redundancy and data availability.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"feather icon-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Offsite data backups:<\/strong> Store data backups in offsite locations or use cloud storage services to prevent data loss due to physical disasters or theft.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"feather icon-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Regular recovery testing: <\/strong> Test the effectiveness of your backup and recovery process regularly to ensure data integrity and minimise downtime in case of a breach or disaster.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7806e8 elementor-widget elementor-widget-heading\" data-id=\"c7806e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5.\tIncident response planning and testing<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22f57fc elementor-widget elementor-widget-text-editor\" data-id=\"22f57fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite implementing preventive measures, no business can be completely immune to cyber threats. Establishing an incident response plan (IRP) and conducting regular testing is crucial to minimising the impact of a security incident and quickly restoring business operations. Create a detailed incident response plan that includes roles and responsibilities, escalation procedures, communication protocols, and a step-by-step guide for handling security incidents. Regularly simulate security incidents through tabletop exercises to test the effectiveness of your IRP, identify areas for improvement, and familiarise employees with their roles and responsibilities during an incident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6aa236 elementor-widget elementor-widget-heading\" data-id=\"e6aa236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Protect your SMB now and into the future<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b96cf79 elementor-widget elementor-widget-text-editor\" data-id=\"b96cf79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In today&#8217;s rapidly evolving threat landscape, the importance of prioritising cybersecurity measures cannot be overstated for small and medium enterprises. At Intelliworx, our team of experienced managed security experts understands the unique challenges faced by SMEs in protecting their digital assets. Remember, cybersecurity is not a one-time endeavour but an ongoing process. <a href=\"https:\/\/intelliworx.co\/uk\/contact\/\">By partnering with Intelliworx<\/a>, you gain access to a trusted cybersecurity partner who will continually assess and enhance your security posture, allowing you to focus on growing your business with confidence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What are the five essential cybersecurity practices SMBs should implement to safeguard their digital assets and mitigate potential risks?<\/p>\n","protected":false},"author":7,"featured_media":9263,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[204,29],"tags":[36],"class_list":["post-9261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-security","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do data breaches occur? - Intelliworx<\/title>\n<meta name=\"description\" content=\"What are the five essential cybersecurity practices SMBs should implement to safeguard their digital assets and mitigate potential risks?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do data breaches occur? - Intelliworx\" \/>\n<meta property=\"og:description\" content=\"What are the five essential cybersecurity practices SMBs should implement to safeguard their digital assets and mitigate potential risks?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelliworx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntelliworxGlobal\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-20T02:25:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T03:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/06\/5Essential-Cybersecurity-Practices-for-SMBs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"660\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shane Maher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shane Maher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do data breaches occur? - Intelliworx","description":"What are the five essential cybersecurity practices SMBs should implement to safeguard their digital assets and mitigate potential risks?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/","og_locale":"en_US","og_type":"article","og_title":"How do data breaches occur? - Intelliworx","og_description":"What are the five essential cybersecurity practices SMBs should implement to safeguard their digital assets and mitigate potential risks?","og_url":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/","og_site_name":"Intelliworx","article_publisher":"https:\/\/www.facebook.com\/IntelliworxGlobal","article_published_time":"2023-06-20T02:25:35+00:00","article_modified_time":"2025-08-06T03:12:03+00:00","og_image":[{"width":1000,"height":660,"url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/06\/5Essential-Cybersecurity-Practices-for-SMBs.jpg","type":"image\/jpeg"}],"author":"Shane Maher","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Shane Maher","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#article","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/"},"author":{"name":"Shane Maher","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/person\/fcdcafd2949da93c85db26bfe5ea13bb"},"headline":"5 Essential Cybersecurity Practices for SMBs","datePublished":"2023-06-20T02:25:35+00:00","dateModified":"2025-08-06T03:12:03+00:00","mainEntityOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/"},"wordCount":696,"commentCount":0,"publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/06\/5Essential-Cybersecurity-Practices-for-SMBs.jpg","keywords":["Security"],"articleSection":["Blog","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/","url":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/","name":"How do data breaches occur? - Intelliworx","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#primaryimage"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/06\/5Essential-Cybersecurity-Practices-for-SMBs.jpg","datePublished":"2023-06-20T02:25:35+00:00","dateModified":"2025-08-06T03:12:03+00:00","description":"What are the five essential cybersecurity practices SMBs should implement to safeguard their digital assets and mitigate potential risks?","breadcrumb":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#primaryimage","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/06\/5Essential-Cybersecurity-Practices-for-SMBs.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/06\/5Essential-Cybersecurity-Practices-for-SMBs.jpg","width":1000,"height":660},{"@type":"BreadcrumbList","@id":"https:\/\/intelliworx.co\/uk\/blog\/security\/5-essential-cybersecurity-practices-for-smbs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intelliworx.co\/uk\/"},{"@type":"ListItem","position":2,"name":"5 Essential Cybersecurity Practices for SMBs"}]},{"@type":"WebSite","@id":"https:\/\/intelliworx.co\/uk\/#website","url":"https:\/\/intelliworx.co\/uk\/","name":"Intelliworx","description":"Managed IT Services","publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelliworx.co\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intelliworx.co\/uk\/#organization","name":"Intelliworx","alternateName":"INTELLIWORX","url":"https:\/\/intelliworx.co\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","width":600,"height":90,"caption":"Intelliworx"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntelliworxGlobal","https:\/\/www.linkedin.com\/company\/intelliworx\/"]},{"@type":"Person","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/person\/fcdcafd2949da93c85db26bfe5ea13bb","name":"Shane Maher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/12\/Maher_Shane_901-02229_Web-Retouched-96x96.jpg","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/12\/Maher_Shane_901-02229_Web-Retouched-96x96.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/12\/Maher_Shane_901-02229_Web-Retouched-96x96.jpg","caption":"Shane Maher"},"description":"Shane Maher is the Managing Director at Intelliworx, responsible for providing overall business direction and supporting businesses in their digital transformation journey. Shane specialises in empowering businesses by providing comprehensive IT support and developing cutting-edge infrastructure solutions. His expertise lies in guiding MSPs through the transition to cloud services, leveraging the power of cloud technologies to enhance business operations. Shane's passion for supporting businesses' IT infrastructure and his extensive knowledge in cloud computing make him a valuable asset in driving successful digital transformations. With his wealth of knowledge and experience, he is committed to driving IT success for clients and helping them navigate the evolving technological landscape.","sameAs":["https:\/\/www.linkedin.com\/in\/shane-maher-ab92ba23\/"],"url":"https:\/\/intelliworx.co\/uk\/author\/shaneinx\/"}]}},"_links":{"self":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/9261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/comments?post=9261"}],"version-history":[{"count":0,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/9261\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media\/9263"}],"wp:attachment":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media?parent=9261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/categories?post=9261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/tags?post=9261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}