{"id":18336,"date":"2021-12-17T06:50:26","date_gmt":"2021-12-17T06:50:26","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=18336"},"modified":"2021-12-23T08:20:14","modified_gmt":"2021-12-23T08:20:14","slug":"how-can-smes-be-cyber-resilient-in-2022","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022","title":{"rendered":"How can SMEs be cyber-resilient in 2022?"},"content":{"rendered":"\n<p>The cyber threat landscape is constantly&nbsp;evolving,&nbsp;and cyber-resilient SMEs need to be proactive. Cyber-attacks&nbsp;are becoming more&nbsp;sophisticated,&nbsp;and businesses must protect themselves against&nbsp;them. There are some tried and true ideas, such as the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/3-2-1-backup-plan-needs\" target=\"_blank\">3-2-1 backups<\/a>,&nbsp;but becoming genuinely cyber&nbsp;resilient requires a strategic and holistic approach.<\/p>\n\n\n\n<p>To help you sort through the complexity, in this blog post, we\u2019ll take a deep dive into how SMEs can be cyber-resilient&nbsp;in 2022.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A crash course on cyber-resilience<\/h2>\n\n\n\n<p>We explored the topic of \u201c<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\" target=\"_blank\">What is Cyber-Resilience?\u201d in a previous article<\/a>, so I\u2019ll give you the short version here. We define cyber-resilience as \u201can organization\u2019s ability to recover from an adverse cyber-event\u201d. In simple terms, that means cyber-resilience is about how well you can bounce back if something goes wrong.<\/p>\n\n\n\n<p>For modern SMEs, \u201csomething\u201d in this case can be a ransomware attack, a malicious user, account deletion, a natural disaster, or any number of other threats. Lack of cyber-resilience can lead to anything from being forced out of business to paying ransoms to hackers.<\/p>\n\n\n\n<p>That\u2019s the \u201cwhat\u201d of&nbsp;cyber-resilience, but the \u201chow\u201d is really where it gets interesting.<\/p>\n\n\n\n<p>Often, when people think of cyber-resilience, they think it\u2019s all about&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/six-best-practice-backup-tips\" target=\"_blank\">backup<\/a>&nbsp;and&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/planning-for-a-recovery\" target=\"_blank\">recovery<\/a>. While backup and recovery are important, true cyber-resilience requires a comprehensive approach that includes robust infrastructure security, cyber threat assessments, documented security&nbsp;policies, risk detection and management tools, and compliance audits.<\/p>\n\n\n\n<p>To better understand the \u201chow\u201d of cyber-resilience, let\u2019s take a useful model SMEs can use to develop a robust strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A cyber-resilience framework for SMEs<\/h2>\n\n\n\n<p>There have been a variety of approaches to thinking about cyber-resilience over the last decade. For example,<a rel=\"noreferrer noopener\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-160\/vol-2-rev-1\/final\" target=\"_blank\">&nbsp;NIST SP 800-160 Developing Cyber-Resilient Systems:&nbsp;A Systems Security Engineering Approach<\/a>&nbsp;takes a rigorous approach to cyber-resilience. Similarly, the Cybersecurity and Infrastructure Security Agency (CISA) publishes&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisa.gov\/uscert\/resources\/assessments\" target=\"_blank\">Cyber Resilience Review (CRR) resources<\/a>&nbsp;to help organizations assess and improve their cyber-resilience.<\/p>\n\n\n\n<p>However, from the perspective of the modern SME looking for a place to start, the five components of cyber-resilience outlined in Symantec\u2019s&nbsp;&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.slideshare.net\/symantec\/white-paper-45656507\" target=\"_blank\">The Cyber Resilience Blueprint: A New Perspective on Security<\/a>&nbsp;whitepaper provide us with the most pragmatic framework. The five components (prepare\/identify, protect, detect, respond, and recover) are robust enough to account for all the high-level considerations a SME must consider without being prohibitively complex.<\/p>\n\n\n\n<p>Let\u2019s look at each and how they can help you develop a plan for cyber-resilience.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Prepare&nbsp;\/ Identify&nbsp;<\/strong>\u2013&nbsp;The&nbsp;first&nbsp;step&nbsp;is to&nbsp;conduct an infrastructure assessment and&nbsp;ask questions like: \u201cwhat are my&nbsp;most important assets?\u201d,&nbsp;\u201cwhere is my data located?\u201d,&nbsp;\u201cwhat security controls are already in place today?\u201d etc.&nbsp;These&nbsp;will help&nbsp;to determine the different systems and&nbsp;data&nbsp;that need protecting, and identify&nbsp;how much risk your business is willing to take for each.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Protect&nbsp;<\/strong>\u2013&nbsp;Here<strong>&nbsp;<\/strong>you&nbsp;take&nbsp;action&nbsp;to protect&nbsp;your assets and data, according to the risk profiles&nbsp;identified&nbsp;in the first step.&nbsp;Security&nbsp;appliances, endpoint protection, hardening operating systems and applications, and user education are all vital in this stage. Many breaches&nbsp;result from user error, and SMEs must protect against this&nbsp;attack&nbsp;vector.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Detect&nbsp;<\/strong>\u2013&nbsp;Detection&nbsp;is all about rapidly detecting threats in real-time. Technology like anti-malware engines, intrusion detection systems, and network monitoring platforms that alert IT to threats, are standard tools that can help. Early detection is key to limiting the follow on events of a breach, so&nbsp;investment here can pay dividends.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>Respond&nbsp;<\/strong>\u2013&nbsp;Once<strong>&nbsp;<\/strong>you detect a threat, how fast can you respond to it and how effective is that response? There are security solutions that can automate this, but there will always be a human element to incident response. Notifications that get the right people aware of an issue quickly, and training so they know what to do, can support effective response.<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Recover&nbsp;<\/strong>\u2013 SMEs&nbsp;must have contingencies to account for disasters. Even with the best security tooling and planning, failure to have a reliable backup and recovery strategy can be a fatal flaw in a SME&#8217;s security posture. Because recovery is so important to a cyber-resilience strategy, we\u2019ve created the 4 pillars of cyber-recovery to help you get it right.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">The four pillars of cyber-recovery&nbsp;<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-infographic-2a.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-infographic-2a.png\" alt=\"\" class=\"wp-image-18359\" style=\"margin:-50px;border:0px solid transparent;\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-infographic-2a.png 1000w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-infographic-2a-300x300.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-infographic-2a-150x150.png 150w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-infographic-2a-768x768.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>When designing your recovery strategy, there are 4 key pillars SMEs must account for. To make them actionable, we frame them as 4 questions you should ask when developing your recovery strategy. They are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Do you have working backups?&nbsp;<\/strong>This is always the place to start. Having a reliable backup and recovery strategy is critical to being cyber-resilient. In the event of a cyber-attack, you need to be able to restore your systems and data as quickly as possible.<\/li><li><strong>Does your backup contain all the data you need?&nbsp;<\/strong>Backups are only useful when they contain the data you need. This may sound obvious, but it\u2019s easy to get wrong. For example, a common mistake is&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/weapons-of-choice-when-to-use-file-backups-vs-imaging-backups\" target=\"_blank\">using file backups when&nbsp;you need an image backup (or vice versa)<\/a>. Make sure that you\u2019re backing up everything you would need to fully restore business-critical operations in the event of a disaster.<\/li><li><strong>How recent are your backups?&nbsp;<\/strong>This is the classic&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/calculating-rto-rpo-make-bulletproof-business\" target=\"_blank\">RPO<\/a>&nbsp;question. If your existing backups aren\u2019t recent enough to be useful and meet your RPO objectives, you\u2019re not as cyber-resilient.<\/li><li><strong>How fast can you recover?&nbsp;<\/strong>This is the RTO side of backup and recovery. In the event of a cyber-event, how soon can you restore normal operations? And I can\u2019t overstate this point: make sure to test and confirm that your answer to this question is realistic.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How to be cyber-resilient in 2022<\/h2>\n\n\n\n<p>Now, let\u2019s tie what we\u2019ve covered so far together into some tactical steps. Given what we know, we can break what SMEs should do to ensure cyber-resilience into 3 key steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Risk&nbsp;identification and mitigation planning<\/li><li>Implementing the right&nbsp;backup system<\/li><li>Having &#8212;&nbsp;and&nbsp;testing &#8212;&nbsp;a disaster response and recovery plan<\/li><\/ul>\n\n\n\n<p>Let\u2019s take a closer look at each.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Risk identification and mitigation planning<\/h3>\n\n\n\n<p>Risk identification is all about quantifying your attack surface and exposure to threats. In 2022,&nbsp;for most SMEs, this means assessing the security posture of on-prem and cloud-based assets and making an informed decision on how to mitigate risk.<\/p>\n\n\n\n<p>Here, SMEs can use network discovery tools and vulnerability scanners (e.g.&nbsp;Tenable Nessus, nmap,&nbsp;etc.) as&nbsp;well as policy audits to determine their current state, compare that to the risks facing their organization, and quantify mitigations. Here are a few common threats modern SMEs may identify in this process and ways to mitigate them:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;\">\n    <thead>\n      <tr>\n        <th style=\"width:30%;border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>Threat<\/strong><\/th>\n        <th style=\"width:30%;border-collapse:collapse;border:none;border-left:1px solid white;background:#008ECE;color:white;text-align:center;\"><strong>Mitigation<\/strong><\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">User clicks a malicious link<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">URL filtering<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Ransomware infecting backups<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Backup solutions that ensure backup integrity (e.g. <a href=\"https:\/\/www.backupassist.com\/solutions\/cryptosafeguard\">CryptoSafeGuard<\/a>)<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Lateral movement of malware post-breach<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Endpoint protection; micro-segmentation<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Lack of insight to root cause of a breach<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;background:#e4e5e6;color:#282561;text-align:center;border-left:1px solid white;\">Forensics files included in backups (e.g. using <a href=\"https:\/\/www.backupassist.com\/support\/en\/references\/cyber-black-box.htm\">Cyber Black Box<\/a>)<\/td>\n      <\/tr>\n      <tr>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">Phishing<\/td>\n        <td style=\"pading:30px;border-collapse:collapse;border:none;border-left:1px solid white;background:#f2f2f2;color:#282561;text-align:center;\">User training; intelligent spam filtering\/firewalls<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">The right backup system&nbsp;<\/h3>\n\n\n\n<p>Backups are the cornerstone of cyber-resilience and having the&nbsp;right system in place is a must. Of course, there\u2019s no one-size-fits-all best backup solution for SMEs, but there are key questions you can ask to find the right solution for your organization.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Does it allow you to create backups of all critical images&nbsp;and files?<\/li><li>Does it support all&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/understanding-backup-methods\" target=\"_blank\">3 common types of backups<\/a>?<\/li><li>Does it support your cloud and on-prem platforms?<\/li><li>Does it provide automation and scheduling that enables you to meet your RPOs?<\/li><li>Does it provide mitigations against ransomware and malicious deletion?<\/li><li>Does it enable recovery in the cloud or on-prem?<\/li><\/ul>\n\n\n\n<p>For more insights on selecting a specific backup solution, check out our \u201c<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/whats-the-best-backup-software\" target=\"_blank\">What\u2019s the&nbsp;best backup software?<\/a>\u201d article.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Response plan and practice runs<\/h3>\n\n\n\n<p>With your risk profile quantified, mitigations in place, and backup plan rolling, the final step towards cyber-resilience is developing and testing your recovery strategy. Again, there isn\u2019t a one-size-fits-all solution, but an effective response plan should have these characteristics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can recover from a cyber-event in time equal to your RTO (or faster).<\/li><li>You can recover critical systems anywhere; it isn\u2019t tied to a single location or cloud provider.<\/li><li>It accounts for common threats such as&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/blog\/can-ransomware-infect-your-backup\" target=\"_blank\">ransomware-infected backups<\/a>&nbsp;and malicious deletion.<\/li><li>You can selectively perform&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/er\/documentation\/recover\/the-right-recovery.htm\" target=\"_blank\">full or granular system recoveries<\/a>&nbsp;as needed.<\/li><\/ul>\n\n\n\n<p>And,&nbsp;it\u2019s&nbsp;<strong>imperative that you regularly and rigorously test your recovery processes!<\/strong>&nbsp;Make testing your recovery plan part of IT operations and consider the worst-case scenarios. A strategy for cyber-resilience that you\u2019ve never tested is incomplete.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final thoughts: Assess, iterate, and improve<\/h2>\n\n\n\n<p>Cyber-resilience isn\u2019t an all-or-nothing thing, and what works today may not work next year (or even next week!). That\u2019s why it\u2019s imperative for SMEs to continuously test their cyber-resilience and recovery strategies, monitor the threat landscape, and iterate and improve over time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-resilience is the ability of an organization to withstand cyber-attacks and continue operations. It is important for business owners and sys admins to understand the concept of cyber-resilience and how they can make their organization more resilient.<\/p>\n","protected":false},"author":17,"featured_media":18362,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-18336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How can SMEs be cyber-resilient in 2022? - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How can SMEs be cyber-resilient in 2022? - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Cyber-resilience is the ability of an organization to withstand cyber-attacks and continue operations. It is important for business owners and sys admins to understand the concept of cyber-resilience and how they can make their organization more resilient.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-17T06:50:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-23T08:20:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"444\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"How can SMEs be cyber-resilient in 2022?\",\"datePublished\":\"2021-12-17T06:50:26+00:00\",\"dateModified\":\"2021-12-23T08:20:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\"},\"wordCount\":1555,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\",\"url\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\",\"name\":\"How can SMEs be cyber-resilient in 2022? - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg\",\"datePublished\":\"2021-12-17T06:50:26+00:00\",\"dateModified\":\"2021-12-23T08:20:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg\",\"width\":1500,\"height\":444},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How can SMEs be cyber-resilient in 2022?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How can SMEs be cyber-resilient in 2022? - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022","og_locale":"en_US","og_type":"article","og_title":"How can SMEs be cyber-resilient in 2022? - Cyber Resilience Blog","og_description":"Cyber-resilience is the ability of an organization to withstand cyber-attacks and continue operations. It is important for business owners and sys admins to understand the concept of cyber-resilience and how they can make their organization more resilient.","og_url":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022","og_site_name":"Cyber Resilience Blog","article_published_time":"2021-12-17T06:50:26+00:00","article_modified_time":"2021-12-23T08:20:14+00:00","og_image":[{"width":1500,"height":444,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"How can SMEs be cyber-resilient in 2022?","datePublished":"2021-12-17T06:50:26+00:00","dateModified":"2021-12-23T08:20:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022"},"wordCount":1555,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022","url":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022","name":"How can SMEs be cyber-resilient in 2022? - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg","datePublished":"2021-12-17T06:50:26+00:00","dateModified":"2021-12-23T08:20:14+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/12\/rev-715-bg-2.jpg","width":1500,"height":444},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/how-can-smes-be-cyber-resilient-in-2022#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How can SMEs be cyber-resilient in 2022?"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=18336"}],"version-history":[{"count":13,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18336\/revisions"}],"predecessor-version":[{"id":18364,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/18336\/revisions\/18364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/18362"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=18336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=18336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=18336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}