{"id":8637,"date":"2018-05-24T09:30:22","date_gmt":"2018-05-24T07:30:22","guid":{"rendered":"http:\/\/visionarymarketing.com\/en\/blog\/?p=8637"},"modified":"2023-11-15T10:56:23","modified_gmt":"2023-11-15T09:56:23","slug":"how-to-create-a-solid-cyber-security-base-for-your-business","status":"publish","type":"post","link":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/","title":{"rendered":"How to Create a Solid Cyber Security Base for Your Business"},"content":{"rendered":"<p><em>Every business, regardless of its size, needs a cyber security strategy. In fact, cyber security should be a prime concern for everyone from individuals and small business owners to big business and government. Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.<\/em><br \/>\n<em>For business owners, any vulnerability in cyber security has the potential to cripple your business. However, there are ways to guard against attacks and mitigate damages. If you want your business to be secure start with a <a href=\"https:\/\/web.archive.org\/web\/20230326013121\/https:\/\/mssit.com.au\/solutions\/cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">solid foundation in cyber security policies and practices.<\/a><\/em><\/p>\n<h2>How Vulnerable Are You?<\/h2>\n<p>Cyber security is a critical business issue. According to the<a href=\"https:\/\/www.businessinsider.com\/businesses-can-no-longer-think-of-cybersecurity-as-just-a-tech-problem-2017-9?op=1&amp;r=US&amp;IR=T\" target=\"_blank\" rel=\"noopener noreferrer\"> latest research<\/a>, 80% of CEOs in Australia rate cyber security as a top investment priority, placing it in their top five business risks.<br \/>\n<figure id=\"attachment_8645\" aria-describedby=\"caption-attachment-8645\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694.jpg\"><img decoding=\"async\" class=\"wp-image-8645\" src=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694-1024x512.jpg\" alt=\"\" width=\"640\" height=\"320\" srcset=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694-1024x512.jpg 1024w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694-500x250.jpg 500w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694-768x384.jpg 768w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694-1536x768.jpg 1536w, https:\/\/visionarymarketing.com\/wp-content\/uploads\/2018\/05\/new-piktochart-_30571694.jpg 1600w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-8645\" class=\"wp-caption-text\">Credits @miatawile @vismktg<\/figcaption><\/figure><br \/>\nOnline scams, identity theft\/fraud and attacks on your computer systems or websites is a problem that makes all businesses vulnerable. Information at stake include:<\/p>\n<ul>\n<li>Employee records and\/or patient applications.<\/li>\n<li>Customer records and personal information.<\/li>\n<li>Intellectual property.<\/li>\n<li>Financial records.<\/li>\n<li>Business and marketing plans.<\/li>\n<\/ul>\n<p>This can be because of:<\/p>\n<ul>\n<li>Computer hardware and software infected from viruses.<\/li>\n<li>Theft or authorised access of computers, hardware and mobile devices.<\/li>\n<li>Attacks on third party systems and business technology and websites.<\/li>\n<li>Email spam with viruses.<\/li>\n<\/ul>\n<p>Businesses are affected through financial loss, including disruption to operations (the biggest potential consequence) and reputation damage. The costs of getting systems up and running again, downtime and investment loss can be significant.<br \/>\nHere\u2019s how you can survive potential threats and make your business less vulnerable:<\/p>\n<h3>Make Your Business Cloud-Ready<\/h3>\n<p>Cloud computing can make your data more secure.<!--more--><br \/>\nSafety in the Cloud shines light on advanced systems and how they can represent a dynamic approach to cyber security risk. Applications and data maintained in the cloud can be more secure than data held in on-premises corporate systems.<br \/>\nCloud computing benefits businesses with lower costs, improve scalability of business functions and increases accessibility. With 24\/7 advanced monitoring systems and restricted access, data can be better defended against threats.<br \/>\nThis comprehensive monitoring enables you to learn from the behaviour across corporate activities and identify potential risks. Cloud computing can detect vulnerabilities and patch immediately, which is crucial to mitigating security issues.<\/p>\n<h3>Create a Cyber Security Policy<\/h3>\n<p>A cyber security policy is one of the best ways to prepare for a cyber-attack. It outlines the assets you need to protect and informs all employees of their responsibilities.<br \/>\nYour policy should cover potential issues and provide actionable steps for staff. Include guidelines for email standards, passwords requirements and social media and internet access. Ensure there are clear instructions on how sensitive data must be handled and where and what business information can be shared.<br \/>\nInclude a disaster recovery plan and evaluate the likely risks associated with various types of cyber attack. Tailor the disaster recovery plan to different cyber threats, such as data loss or corruption, or malware infections.<br \/>\nWell-devised cyber security polices will help guide employees in the use of technology and information. Consider liaising with your IT company to help formulate policies.<\/p>\n<h3>Invest in the Essentials<\/h3>\n<p>With the Internet of Things (IoT) growing steadily and cyber criminals increasingly targeting trusted third-party service providers, businesses face new cyber security challenges daily.<br \/>\nTo guard against cyber-attack:<\/p>\n<ul>\n<li>Improve password security.<\/li>\n<li>Update software and computers on a regular basis.<\/li>\n<li>Backup data regularly and create have more than one back up copy of important information.<\/li>\n<li>Move your website to HTTPS. Google encourages all businesses to adopt HTTPS to ensure a secure and private online experience through authentication, data integrity and encryption.<\/li>\n<li>Monitor third parties by assigning temporary passwords to see who\u2019s connecting to your network and why.<\/li>\n<li>Use multi-factor identification.<\/li>\n<li>Change default passwords on all devices.<\/li>\n<li>Use a firewall.<\/li>\n<li>Plan for mobile devices through automatic security updates that require a company password to access networks.<\/li>\n<\/ul>\n<h3>Build Awareness<\/h3>\n<p>Employees are the <a href=\"http:\/\/www.information-age.com\/employees-businesses-weakest-link-123470435\/\" target=\"_blank\" rel=\"noopener noreferrer\">weakest link<\/a> in a company\u2019s security. Business owners need to expand their cyber security awareness programs beyond acknowledgements of policies.<br \/>\nTrain employees to build awareness and educate staff on secure behaviours in the workplace. It\u2019s crucial all staff are taught how to use the security available to them and limit activities on non-trusted networks.<br \/>\nA cyber security policy is necessary, but raising awareness and offering education will get staff from reading actionable plans to truly understanding what\u2019s expected of them.<br \/>\nYou can do this by setting up weekly discussions and evaluations for current security initiatives. Keep everyone aware of <a href=\"https:\/\/web.archive.org\/web\/20210413234437\/https:\/\/www.huffingtonpost.com.au\/2017\/04\/05\/three-of-the-biggest-cyber-security-threats-to-australian-busine_a_22027681\/\" target=\"_blank\" rel=\"noopener noreferrer\">social media scams<\/a>, phishing and other hacking campaigns.<\/p>\n<h3>Start Now<\/h3>\n<p>Having a well thought-out and implemented cyber security strategy is crucial to protecting your business.<br \/>\nAssess your security vulnerabilities today and start building awareness, implementing policies and educating staff about cyber security to minimise cyber security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every business, regardless of its size, needs a cyber security strategy. In fact, cyber security should be a prime concern for everyone from individuals and small business owners to big business and government. Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow. &hellip;<\/p>\n","protected":false},"author":2,"featured_media":42501,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4069],"tags":[],"class_list":["post-8637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-marketing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Create a Solid Cyber Security Base for Your Business<\/title>\n<meta name=\"description\" content=\"Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Create a Solid Cyber Security Base for Your Business\" \/>\n<meta property=\"og:description\" content=\"Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Marketing and Innovation\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vismktg\" \/>\n<meta property=\"article:author\" content=\"http:\/\/facebook.com\/ygourven\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-24T07:30:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-15T09:56:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2019\/11\/47977612261_fee5c44091_c-e1578129297480.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"509\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yann Gourvennec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ygourven\" \/>\n<meta name=\"twitter:site\" content=\"@ygourven\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yann Gourvennec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/\"},\"author\":{\"name\":\"Yann Gourvennec\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/#\\\/schema\\\/person\\\/3754fee1e558f47b8deb46f53c37423e\"},\"headline\":\"How to Create a Solid Cyber Security Base for Your Business\",\"datePublished\":\"2018-05-24T07:30:22+00:00\",\"dateModified\":\"2023-11-15T09:56:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/\"},\"wordCount\":819,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/47977612261_fee5c44091_c-e1578129297480.jpg\",\"articleSection\":[\"digital marketing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/\",\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/\",\"name\":\"How to Create a Solid Cyber Security Base for Your Business\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/47977612261_fee5c44091_c-e1578129297480.jpg\",\"datePublished\":\"2018-05-24T07:30:22+00:00\",\"dateModified\":\"2023-11-15T09:56:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/#\\\/schema\\\/person\\\/3754fee1e558f47b8deb46f53c37423e\"},\"description\":\"Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/47977612261_fee5c44091_c-e1578129297480.jpg\",\"contentUrl\":\"https:\\\/\\\/visionarymarketing.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/47977612261_fee5c44091_c-e1578129297480.jpg\",\"width\":509,\"height\":340},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/2018\\\/05\\\/24\\\/how-to-create-a-solid-cyber-security-base-for-your-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Create a Solid Cyber Security Base for Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/\",\"name\":\"Marketing and Innovation\",\"description\":\"Independent News Website, Since 1996\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/#\\\/schema\\\/person\\\/3754fee1e558f47b8deb46f53c37423e\",\"name\":\"Yann Gourvennec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg\",\"caption\":\"Yann Gourvennec\"},\"description\":\"Yann Gourvennec created visionarymarketing.com in 1996. He is a speaker and author of many books. In 2014 he went from intrapreneur to entrepreneur, when he created his digital marketing agency. Yann Gourvennec a cr\u00e9\u00e9 visionarymarketing.com en 1996. Il est conf\u00e9rencier et auteur de plusieurs livres. En 2014, il est pass\u00e9 d'intrapreneur \u00e0 entrepreneur en cr\u00e9ant son agence de marketing num\u00e9rique.\",\"sameAs\":[\"https:\\\/\\\/visionarymarketing.com\",\"http:\\\/\\\/facebook.com\\\/ygourven\",\"http:\\\/\\\/linkedin.com\\\/in\\\/ygourven\",\"https:\\\/\\\/x.com\\\/ygourven\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/visionarymarketingagency\"],\"url\":\"https:\\\/\\\/visionarymarketing.com\\\/en\\\/author\\\/yann-gourvennec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Create a Solid Cyber Security Base for Your Business","description":"Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/","og_locale":"en_US","og_type":"article","og_title":"How to Create a Solid Cyber Security Base for Your Business","og_description":"Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.","og_url":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/","og_site_name":"Marketing and Innovation","article_publisher":"https:\/\/www.facebook.com\/vismktg","article_author":"http:\/\/facebook.com\/ygourven","article_published_time":"2018-05-24T07:30:22+00:00","article_modified_time":"2023-11-15T09:56:23+00:00","og_image":[{"width":509,"height":340,"url":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2019\/11\/47977612261_fee5c44091_c-e1578129297480.jpg","type":"image\/jpeg"}],"author":"Yann Gourvennec","twitter_card":"summary_large_image","twitter_creator":"@ygourven","twitter_site":"@ygourven","twitter_misc":{"Written by":"Yann Gourvennec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#article","isPartOf":{"@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/"},"author":{"name":"Yann Gourvennec","@id":"https:\/\/visionarymarketing.com\/en\/#\/schema\/person\/3754fee1e558f47b8deb46f53c37423e"},"headline":"How to Create a Solid Cyber Security Base for Your Business","datePublished":"2018-05-24T07:30:22+00:00","dateModified":"2023-11-15T09:56:23+00:00","mainEntityOfPage":{"@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/"},"wordCount":819,"commentCount":0,"image":{"@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2019\/11\/47977612261_fee5c44091_c-e1578129297480.jpg","articleSection":["digital marketing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/","url":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/","name":"How to Create a Solid Cyber Security Base for Your Business","isPartOf":{"@id":"https:\/\/visionarymarketing.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#primaryimage"},"image":{"@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2019\/11\/47977612261_fee5c44091_c-e1578129297480.jpg","datePublished":"2018-05-24T07:30:22+00:00","dateModified":"2023-11-15T09:56:23+00:00","author":{"@id":"https:\/\/visionarymarketing.com\/en\/#\/schema\/person\/3754fee1e558f47b8deb46f53c37423e"},"description":"Cyber-attacks, database breaches and other cyber security issues cost Australia more than $1 billion a year, a figure that continues to grow.","breadcrumb":{"@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#primaryimage","url":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2019\/11\/47977612261_fee5c44091_c-e1578129297480.jpg","contentUrl":"https:\/\/visionarymarketing.com\/wp-content\/uploads\/2019\/11\/47977612261_fee5c44091_c-e1578129297480.jpg","width":509,"height":340},{"@type":"BreadcrumbList","@id":"https:\/\/visionarymarketing.com\/en\/2018\/05\/24\/how-to-create-a-solid-cyber-security-base-for-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/visionarymarketing.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to Create a Solid Cyber Security Base for Your Business"}]},{"@type":"WebSite","@id":"https:\/\/visionarymarketing.com\/en\/#website","url":"https:\/\/visionarymarketing.com\/en\/","name":"Marketing and Innovation","description":"Independent News Website, Since 1996","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/visionarymarketing.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/visionarymarketing.com\/en\/#\/schema\/person\/3754fee1e558f47b8deb46f53c37423e","name":"Yann Gourvennec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg","url":"https:\/\/secure.gravatar.com\/avatar\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5972001801e8de5692a3e31224e85769f50a55fb8b679749f9c8d1868cceff14?s=96&d=initials&r=g&initials=yg","caption":"Yann Gourvennec"},"description":"Yann Gourvennec created visionarymarketing.com in 1996. He is a speaker and author of many books. In 2014 he went from intrapreneur to entrepreneur, when he created his digital marketing agency. Yann Gourvennec a cr\u00e9\u00e9 visionarymarketing.com en 1996. Il est conf\u00e9rencier et auteur de plusieurs livres. En 2014, il est pass\u00e9 d'intrapreneur \u00e0 entrepreneur en cr\u00e9ant son agence de marketing num\u00e9rique.","sameAs":["https:\/\/visionarymarketing.com","http:\/\/facebook.com\/ygourven","http:\/\/linkedin.com\/in\/ygourven","https:\/\/x.com\/ygourven","https:\/\/www.youtube.com\/c\/visionarymarketingagency"],"url":"https:\/\/visionarymarketing.com\/en\/author\/yann-gourvennec\/"}]}},"_links":{"self":[{"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/posts\/8637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/comments?post=8637"}],"version-history":[{"count":0,"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/posts\/8637\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/media\/42501"}],"wp:attachment":[{"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/media?parent=8637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/categories?post=8637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/visionarymarketing.com\/en\/wp-json\/wp\/v2\/tags?post=8637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}