{"id":2282,"date":"2013-05-21T00:00:00","date_gmt":"2013-05-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/21\/cyber-crime-costs-small-companies-800m-a-year\/"},"modified":"2021-12-30T11:40:59","modified_gmt":"2021-12-30T11:40:59","slug":"cyber-crime-costs-small-companies-800m-a-year","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/21\/cyber-crime-costs-small-companies-800m-a-year\/","title":{"rendered":"Cyber crime &#8216;costs small companies \u00a3800m a year\u2019"},"content":{"rendered":"<p>The Federation of Small Businesses (FSB) said issues such as hacking, data security breaches and computer viruses were a \u201cbarrier to growth\u201d that could no longer be ignored. An FSB report found that cyber crime is costing its 200,000 members a combined \u00a3785m a year \u2013 or \u00a33,750 for every small business. Over the past year, 41pc of the group\u2019s members have been a victim of cyber crime, often through frauds carried out by a customer or client, or so-called \u201ccard not present\u201d situations (when purchases are made online, over the phone or by mail order).<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The lobby group is concerned that the cost to the wider economy could be much greater, as small businesses refuse to trade online because they believe the security framework does not give them adequate protection.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\">Mike Cherry, FSB chairman, said: \u201cCyber crime poses a growing threat for small firms and it isn\u2019t something that should be ignored. \u201cWhile we want to see clear action from the Government and the wider public sector, there are clear actions that businesses can take to help themselves.\u201d<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">The FSB issued 10 tips to help businesses protect themselves, including a combination of standard security protection steps (e.g. putting up a firewall and using antivirus and anti-spam software); carrying out regular security updates on all software and devices; and ensuring there is a resilient IT system and email password policy. The Government has urged small companies to spend more on security to address the rise in cyber crime and meet the terms of a tough EU directive.<\/p>\n<p>\nLink: <a href=\"http:\/\/www.telegraph.co.uk\/finance\/yourbusiness\/10069374\/Cyber-crime-costs-small-companies-800m-a-year.html\">http:\/\/www.telegraph.co.uk\/finance\/yourbusiness\/10069374\/Cyber-crime-costs-small-companies-800m-a-year.html<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2282","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2282"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2282\/revisions"}],"predecessor-version":[{"id":4769,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2282\/revisions\/4769"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}