{"id":3044,"date":"2023-07-25T09:00:00","date_gmt":"2023-07-25T16:00:00","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/ms-industry\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/"},"modified":"2026-04-09T08:57:15","modified_gmt":"2026-04-09T15:57:15","slug":"4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners","status":"publish","type":"ms-industry","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/","title":{"rendered":"4 simple steps to de-mystifying cyber risk for small business owners"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">No entrepreneur goes into business to learn how to fight off cyberattacks. They go into business to create the best bakery in town, to build beautiful new homes, or to sell things they love.&nbsp;Almost no business, however, can operate in the modern world without a digital footprint, which means that every business is exposed to cyber<s> <\/s>criminals.&nbsp;<\/p>\n\n\n\n<div class=\"alignwide is-style-inline wp-block-bloginabox-theme-promotional\">\n\t\n<div class=\"promotional promotional--has-media promotional--media-right\">\n\t<div class=\"promotional__wrapper\">\n\t\t<div class=\"promotional__content-wrapper\">\n\t\t\t<div class=\"promotional__content\">\n\t\t\t\t<h2 class=\"wp-block-heading\">Empowering intelligent insurance<\/h2><p class=\"wp-block-paragraph\">Manage risk, build trust, and enhance customer experience.<\/p><div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-full-width-on-mobile\"><a data-bi-an=\"Global CTA\" data-bi-ct=\"cta link\" data-bi-id=\"cta-block\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/financial-services\/insurance\">Explore solutions<\/a><\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"promotional__media-wrapper\">\n\t\t\t\t<div class=\"promotional__media\">\n\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/11\/GettyImages-1216889099.jpg\" alt=\"\" loading=\"lazy\" \/>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The ubiquitous nature of cybercrime&nbsp;<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Cyber risk is the risk that businesses face from bad actors\u2014be they rogue operators, criminal enterprises, or even nation-states\u2014who try to break into information systems to steal money, misuse data, take systems hostage for ransom, or otherwise wreak havoc. Unlike the threat of a physical break-in, there is no \u201cmove to a safer neighborhood\u201d option with cybersecurity. The very fact that a company is always online means that attackers have virtually endless access and opportunity.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Making things worse, automation and AI are being used to increase the volume and sophistication of cyberattacks, with ever-growing impact. Ransomware and fraudulent funds transfer attacks on small businesses have increased yearly. According to Microsoft Threat Intelligence, Ransomware as a Service (RaaS) has led to the evolution of a gig economy that lets small cyber criminals increase their reach and scale. Simply put, technology has allowed bad actors to automate and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noreferrer noopener\">scale their cyberattacks<\/a>, making cyber criminality a large global business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber protection essentials for small businesses&nbsp;<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The escalating threat landscape requires proactive measures to safeguard small businesses from cyberattacks. Fortunately, while the risks may be growing, the protections against them are keeping pace with improvements in quality and usability. And that means every business has the option of dramatically improving its security posture.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">You don\u2019t need the security of a giant enterprise to mitigate the risk of your small business getting hacked. You just need to master a few basics. In the Microsoft Digital Defense Report 2022, researchers found that \u201cOver 80 percent of security incidents can be traced to a few missing elements that could be addressed through modern security approaches.\u201d<sup>1<\/sup> I\u2019d recommend that every business owner review this report, and also learn how <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/small-and-medium-business-blog\/big-protection-for-small-businesses-the-latest-in-microsoft\/ba-p\/3776030\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft is innovating on security<\/a>, specifically for small businesses.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the meantime, here is a summary of four of the most important steps every small business leader can take to sleep a little better at night:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Keep up to date<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">To start, you should learn to love those software updates you\u2019re constantly being notified to install from Microsoft and other trusted vendors. One area of increasing cyber threats is through exploited software. Even long-trusted software may have vulnerabilities. Fortunately, software security providers and ethical hackers work directly to identify these vulnerabilities as fast or faster than bad actors so the software provider can craft fixes proactively. Those updates are useless if the technology domain owner doesn\u2019t implement them. Implementing a rapid patching plan is an easy best practice for any small business. Indeed, some cyber insurers have begun to deny coverage for cyberattacks if relevant software is not up to date, while others have put incentives like increasing deductibles in place to encourage timely patching.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Keep score on your security posture<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond tracking updates, it can be hard to understand precisely how vulnerable your business is. So one essential tool is a measurement service like <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender\/microsoft-secure-score?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Secure Score<\/a>, which evaluates your business\u2019s security posture based on your security configurations and provides insights and recommendations regarding security controls. Many businesses now make it a best practice to share their Secure Score with their IT security partner and their insurer, yielding good advice that&#8217;s tailored to their particular business.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Implement essential controls<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">You don\u2019t need to be a cybersecurity expert to secure your online presence. You just need to focus on leveraging a set of key controls. Most cyberattacks on small businesses still come from the least sophisticated sources like social (for example phishing), malware (such as viruses and ransomware), and device and network hacking (like endpoints). Fortunately, there are some basic, proven ways to protect against these kinds of attacks.&nbsp;While no one security measure will stop every attack, there are a set of relatively simple-to-use controls that every small business should put in place.&nbsp;Five security controls really stand out as high impact:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">multifactor authentication (MFA) <\/li>\n\n\n\n<li class=\"wp-block-list-item\">email and web filtering<\/li>\n\n\n\n<li class=\"wp-block-list-item\">data security and backups<\/li>\n\n\n\n<li class=\"wp-block-list-item\">privileged access management (PAM)<\/li>\n\n\n\n<li class=\"wp-block-list-item\">endpoint detection and response (EDR)<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">These critical cyber-hygiene controls create multiple layers of defense, making it harder for cybercriminals to exploit common attack vectors. And they can be implemented without a lot of friction or cost\u2014especially when measured against the pain and disruption that can happen when a business fails to put them in place. &nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Implementing these controls isn\u2019t as hard as it sounds\u2014most modern cloud-based software has multiple players of built-in protection.&nbsp;For example, <a href=\"https:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/53054.office-365-set-up-multi-factor-authentication-for-users.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">implementing MFA in Microsoft Office 365<\/a> is a three-click procedure.&nbsp;Similarly, Microsoft OneDrive has <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/ransomware-detection-and-recovering-your-files-0d90ec50-6bfd-40f4-acc7-b8c12c73637f\" target=\"_blank\" rel=\"noreferrer noopener\">built-in ransomware protection tools<\/a> that automatically detect and guide recovery from ransomware attacks.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Partner with your cyber insurer and your IT provider<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Just as a burglary can happen even when you have all the best door locks, a cyberattack can succeed even when you\u2019ve got the best cybersecurity measures in place. Consequently, preparation and planning are essential. You need to work with your insurer to determine the best security coverage for your specific needs. Cyber insurance offers financial support, incident response coaching, and access to specialized teams that can assist in limiting the damage caused by cyberattacks. You should also work with an IT provider&nbsp;who can build an incident plan that leverages your insurer in case things go wrong. Working together, these partners will make it easier to get you back up and running if an attack should ever succeed.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Keeping cyber-safe as you grow&nbsp;<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Like property protection and professional liability, cyber insurance is now a necessary cost of doing business. By simplifying the essential steps to mitigate cyber<s> <\/s>threats, every small business can enhance its cybersecurity posture, reduce the likelihood and impact of attacks, and keep insurance costs down. Done well, effective cybersecurity can even build confidence in making new investments and driving new innovations.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Staying informed and up to date, implementing basic security controls, and forging partnerships with cyber insurers and IT providers will empower a small business to protect its online presence and digital assets effectively.&nbsp;Remember, cybersecurity is a team sport. By working together, we can create a safer digital environment in which any small business can thrive.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learn More&nbsp;<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Find out more about Microsoft and <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/financial-services\/insurance\">partner solutions for insurers<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup> <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE5bUvv?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft, Microsoft Digital Defense Report 2022<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The escalating threat landscape requires proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability.<\/p>\n","protected":false},"author":0,"featured_media":10640,"template":"","categories":[1156],"tags":[1374,1375],"content-type":[118],"job-function":[],"coauthors":[1501],"class_list":["post-3044","ms-industry","type-ms-industry","status-publish","has-post-thumbnail","hentry","category-financial-services","tag-ai","tag-automation","content-type-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 simple steps to de-mystifying cyber risk for small business owners | The Microsoft Cloud Blog<\/title>\n<meta name=\"description\" content=\"Escalating threats require proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 simple steps to de-mystifying cyber risk for small business owners | The Microsoft Cloud Blog\" \/>\n<meta property=\"og:description\" content=\"Escalating threats require proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/\" \/>\n<meta property=\"og:site_name\" content=\"The Microsoft Cloud Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T15:57:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@MSCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Jim DeMarco\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/\",\"name\":\"4 simple steps to de-mystifying cyber risk for small business owners | The Microsoft Cloud Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/07\/M365CO19_FLW_DellXPSv_328-featured.jpg\",\"datePublished\":\"2023-07-25T16:00:00+00:00\",\"dateModified\":\"2026-04-09T15:57:15+00:00\",\"description\":\"Escalating threats require proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/07\/M365CO19_FLW_DellXPSv_328-featured.jpg\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/07\/M365CO19_FLW_DellXPSv_328-featured.jpg\",\"width\":800,\"height\":534,\"caption\":\"Female\/Male small business employees working with Dell XPSv device; stylus.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industries\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/ms-industry\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"4 simple steps to de-mystifying cyber risk for small business owners\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/\",\"name\":\"The Microsoft Cloud Blog\",\"description\":\"Build the future of your business with AI\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#organization\",\"name\":\"Microsoft Cloud Blog\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp\",\"width\":400,\"height\":400,\"caption\":\"Microsoft Cloud Blog\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/MSCloud\",\"https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/\",\"https:\/\/www.youtube.com\/@MicrosoftCloud\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 simple steps to de-mystifying cyber risk for small business owners | The Microsoft Cloud Blog","description":"Escalating threats require proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/","og_locale":"en_US","og_type":"article","og_title":"4 simple steps to de-mystifying cyber risk for small business owners | The Microsoft Cloud Blog","og_description":"Escalating threats require proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability. Learn more.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/","og_site_name":"The Microsoft Cloud Blog","article_modified_time":"2026-04-09T15:57:15+00:00","twitter_card":"summary_large_image","twitter_site":"@MSCloud","twitter_misc":{"Est. reading time":"5 minutes","Written by":"Jim DeMarco"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/","name":"4 simple steps to de-mystifying cyber risk for small business owners | The Microsoft Cloud Blog","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/07\/M365CO19_FLW_DellXPSv_328-featured.jpg","datePublished":"2023-07-25T16:00:00+00:00","dateModified":"2026-04-09T15:57:15+00:00","description":"Escalating threats require proactive measures to safeguard small businesses from cyberattacks. Fortunately, the protections against them are keeping pace with improvements in quality and usability. Learn more.","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/07\/M365CO19_FLW_DellXPSv_328-featured.jpg","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/07\/M365CO19_FLW_DellXPSv_328-featured.jpg","width":800,"height":534,"caption":"Female\/Male small business employees working with Dell XPSv device; stylus."},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/financial-services\/2023\/07\/25\/4-simple-steps-to-de-mystifying-cyber-risk-for-small-business-owners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/"},{"@type":"ListItem","position":2,"name":"Industries","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/innovation\/blog\/ms-industry\/"},{"@type":"ListItem","position":3,"name":"4 simple steps to de-mystifying cyber risk for small business owners"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/","name":"The Microsoft Cloud Blog","description":"Build the future of your business with AI","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#organization","name":"Microsoft Cloud Blog","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2023\/10\/microsoft_logo.webp","width":400,"height":400,"caption":"Microsoft Cloud Blog"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/MSCloud","https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/","https:\/\/www.youtube.com\/@MicrosoftCloud"]}]}},"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry\/3044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/types\/ms-industry"}],"version-history":[{"count":1,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry\/3044\/revisions"}],"predecessor-version":[{"id":12344,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/ms-industry\/3044\/revisions\/12344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/media\/10640"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/media?parent=3044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/categories?post=3044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/tags?post=3044"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/content-type?post=3044"},{"taxonomy":"job-function","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/job-function?post=3044"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/microsoft-cloud\/blog\/wp-json\/wp\/v2\/coauthors?post=3044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}