{"id":42790,"date":"2022-11-16T09:53:07","date_gmt":"2022-11-16T09:53:07","guid":{"rendered":"https:\/\/www.msmehub.org\/?p=42790"},"modified":"2022-11-16T10:09:57","modified_gmt":"2022-11-16T10:09:57","slug":"how-to-combat-cyber-threats-in-your-business","status":"publish","type":"post","link":"https:\/\/msmehub.org\/staging\/6671\/how-to-combat-cyber-threats-in-your-business\/","title":{"rendered":"How to Combat Cyber Threats in your Business"},"content":{"rendered":"\n<p>Cyber threats in your business must not be overlooked because they can steal your data and destroy the credibility of your business. Although online\u00a0businesses\u00a0may have benefits, there&#8217;s also a greater chance of hoaxes and cyber threats. Therefore, safeguarding your business against cyber-attacks is crucial because, if not prevented, it may require reestablishing your\u00a0business. In extreme scenarios, these attacks can force you out of business permanently because you might be unable to make up lost\u00a0revenue\u00a0and customer loyalty as clients want to feel safe during transactions. The good news is that you can always take preventative actions to combat cyber threats in your business, thus safeguarding your company before it&#8217;s too late.<\/p>\n\n\n\n<p><strong>Preventive Measures to Combat Cyber Threats in your Business<\/strong><\/p>\n\n\n\n<p><strong>1. Install devices and network security software<\/strong><\/p>\n\n\n\n<p>Verify that your operating system and security&nbsp;applications&nbsp;are scheduled to update automatically. Updates might include vital security upgrades for recent malware and threats. Most updates allow you to schedule them at the most convenient time, typically after office hours. It&#8217;s imperative to consistently follow&nbsp;<a href=\"https:\/\/www.abujadataschool.com\/microsoft-project-management-training-in-abuja-nigeria\/\" target=\"_blank\" rel=\"noreferrer noopener\">update<\/a>&nbsp;prompts since they frequently fix serious security issues. Also, install security software to help prevent bugs on your business&#8217;s PCs and mobile devices. The software should have anti-virus, anti-spyware, and anti-spam filters to avoid compromise on your business gadgets. Moreover, setting up a&nbsp;firewall&nbsp;between your devices and the internet prevents your connection from viruses. Always maintain a robust firewall by regularly updating to the newest patches.<\/p>\n\n\n\n<p>\u00a0<strong>2. Use passphrases and<\/strong> <strong>authenticators<\/strong><\/p>\n\n\n\n<p>If possible, take extra precautions to make your&nbsp;security difficult to access. Instead of using passwords, use passphrases to secure networks and devices that host sensitive company data. Passphrases are phrases or collections of words that are used as passwords. Humans find them easy to memorise, but&nbsp;computers&nbsp;find them challenging to decipher. A secure passphrase must be at least 14 characters long and include a mix of capital and lowercase letters, digits, and special characters. For each of your&nbsp;accounts, use a different passphrase. In addition to using passphrases to prevent cyber threats in your business and protect your company data, multi-factor authentication (MFA) can be used to ensure that only legitimate staff are granted access. Before anyone can access their account, two or more forms of&nbsp;identification&nbsp;must be shown. Additional security for your accounts is provided by two-factor or multi-factor authentication.<\/p>\n\n\n\n<p><strong>3. Enable network encryption<\/strong><\/p>\n\n\n\n<p>The&nbsp;data&nbsp;that will be sent into and out of your company system needs to be encrypted after you&#8217;ve configured your authenticators. Before sending your data over the internet, encryption transforms it into a hidden&nbsp;code. Make sure your network encryption is enabled and that all data received and\/or stored online is encrypted. This lowers the danger of theft, destruction, or tampering by limiting data access to parties that possess the encryption key. When utilizing a public network, you can enable network encryption by adjusting the settings on your router or by setting up a virtual private network (VPN) program on your&nbsp;computer.<\/p>\n\n\n\n<p><strong>4.\u00a0 Backup your data<\/strong><\/p>\n\n\n\n<p>Data backup is one of the cheapest ways to guarantee that your&nbsp;information&nbsp;can be retrieved in the event of a cyber-incident or computer issue. Additionally, it is a less demanding technique to prevent future attacks. Although firewalls, antivirus software, and other&nbsp;<a href=\"https:\/\/www.abujadataschool.com\/video-editing-training-in-abuja-nigeria\/\" target=\"_blank\" rel=\"noreferrer noopener\">security<\/a>&nbsp;measures may malfunction, keeping a backup provides you the advantage over attackers. To ensure the protection of your data, use a range of backup techniques, like routine incremental backups to a mobile device or cloud storage. Include weekly, quarterly, and yearly server backups as well. It should be regularly checked to see if this&nbsp;data&nbsp;is functioning properly and can be recovered. Store several copies of your backup offline, if possible.<\/p>\n\n\n\n<p><strong>5. Develop cyber security and data sharing policies<\/strong><\/p>\n\n\n\n<p>Your staff and device operators are responsible for your company&#8217;s security.&nbsp;Businesses&nbsp;should have clear cyber security and data sharing policies that inform staff on what is appropriate while using&nbsp;computers&nbsp;and visiting websites. Your personnel should receive internet safety instructions that inform them of the dangers they can encounter and their responsibilities for keeping your company safe. It is essential to teach them how to recognise, avoid, and handle cyber-attacks as well as use strong passwords and passphrases.<\/p>\n\n\n\n<p>Keep track of all the computing&nbsp;<a href=\"https:\/\/www.abujadataschool.com\/administrative-management-training-in-abuja-nigeria\/\" target=\"_blank\" rel=\"noreferrer noopener\">hardware<\/a>&nbsp;and applications that your company uses. All the hardware and software that your company employs must be documented. Any software and hardware that are no longer in use should be disconnected from the network, and sensitive data should be deleted. Older, inactive hardware and software won&#8217;t likely be updated, and they could be exploited as a &#8220;backdoor&#8221; by thieves to attack companies. In similar vein, you ought to deny access to former workers and people who have switched roles and no longer need it.<\/p>\n\n\n\n<p><strong>6. Build a safe online transacting environment<\/strong><\/p>\n\n\n\n<p>It&#8217;s crucial that you protect clients&#8217; information because your company&#8217;s reputation will suffer if you misplace or compromise their information, and you might face legal repercussions. Ensure your company invests in a safe online transacting environment that protects stored customer data. Find out what your payment gateway provider can do to stop online fraud if you accept&nbsp;payments&nbsp;online. Consider purchasing cyber insurance to safeguard your company. Dealing with a cyber-attack may cost far more than simply replacing computers, enhancing security or repairing databases. Your&nbsp;company&nbsp;may benefit from the cost savings provided by cyber liability insurance coverage for attack recovery.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats in your business must not be overlooked because they can steal your data and destroy the credibility of your business. Although online\u00a0businesses\u00a0may have benefits, there&#8217;s also a greater chance of hoaxes and cyber threats. Therefore, safeguarding your business against cyber-attacks is crucial because, if not prevented, it may require reestablishing your\u00a0business. In extreme scenarios, these attacks can force you out of business permanently because you might be unable to make up lost\u00a0revenue\u00a0and customer loyalty as clients want to feel safe during transactions. The good news is that you can always take preventative actions to combat cyber threats in your business, thus safeguarding your company before it&#8217;s too late. Preventive Measures to Combat Cyber Threats in your Business 1. Install devices and network security software Verify that your operating system and security&nbsp;applications&nbsp;are scheduled to update automatically. Updates might include vital security upgrades for recent malware and threats. Most updates allow you to schedule them at the most convenient time, typically after office hours. It&#8217;s imperative to consistently follow&nbsp;update&nbsp;prompts since they frequently fix serious security issues. Also, install security software to help prevent bugs on your business&#8217;s PCs and mobile devices. The software should have anti-virus, anti-spyware, and anti-spam filters to avoid compromise on your business gadgets. Moreover, setting up a&nbsp;firewall&nbsp;between your devices and the internet prevents your connection from viruses. Always maintain a robust firewall by regularly updating to the newest patches. \u00a02. Use passphrases and authenticators If possible, take extra precautions to make your&nbsp;security difficult to access. Instead of using passwords, use passphrases to secure networks and devices that host sensitive company data. Passphrases are phrases or collections of words that are used as passwords. Humans find them easy to memorise, but&nbsp;computers&nbsp;find them challenging to decipher. A secure passphrase must be at least 14 characters long and include a mix of capital and lowercase letters, digits, and special characters. For each of your&nbsp;accounts, use a different passphrase. In addition to using passphrases to prevent cyber threats in your business and protect your company data, multi-factor authentication (MFA) can be used to ensure that only legitimate staff are granted access. Before anyone can access their account, two or more forms of&nbsp;identification&nbsp;must be shown. Additional security for your accounts is provided by two-factor or multi-factor authentication. 3. Enable network encryption The&nbsp;data&nbsp;that will be sent into and out of your company system needs to be encrypted after you&#8217;ve configured your authenticators. Before sending your data over the internet, encryption transforms it into a hidden&nbsp;code. Make sure your network encryption is enabled and that all data received and\/or stored online is encrypted. This lowers the danger of theft, destruction, or tampering by limiting data access to parties that possess the encryption key. When utilizing a public network, you can enable network encryption by adjusting the settings on your router or by setting up a virtual private network (VPN) program on your&nbsp;computer. 4.\u00a0 Backup your data Data backup is one of the cheapest ways to guarantee that your&nbsp;information&nbsp;can be retrieved in the event of a cyber-incident or computer issue. Additionally, it is a less demanding technique to prevent future attacks. Although firewalls, antivirus software, and other&nbsp;security&nbsp;measures may malfunction, keeping a backup provides you the advantage over attackers. To ensure the protection of your data, use a range of backup techniques, like routine incremental backups to a mobile device or cloud storage. Include weekly, quarterly, and yearly server backups as well. It should be regularly checked to see if this&nbsp;data&nbsp;is functioning properly and can be recovered. Store several copies of your backup offline, if possible. 5. Develop cyber security and data sharing policies Your staff and device operators are responsible for your company&#8217;s security.&nbsp;Businesses&nbsp;should have clear cyber security and data sharing policies that inform staff on what is appropriate while using&nbsp;computers&nbsp;and visiting websites. Your personnel should receive internet safety instructions that inform them of the dangers they can encounter and their responsibilities for keeping your company safe. It is essential to teach them how to recognise, avoid, and handle cyber-attacks as well as use strong passwords and passphrases. Keep track of all the computing&nbsp;hardware&nbsp;and applications that your company uses. All the hardware and software that your company employs must be documented. Any software and hardware that are no longer in use should be disconnected from the network, and sensitive data should be deleted. Older, inactive hardware and software won&#8217;t likely be updated, and they could be exploited as a &#8220;backdoor&#8221; by thieves to attack companies. In similar vein, you ought to deny access to former workers and people who have switched roles and no longer need it. 6. Build a safe online transacting environment It&#8217;s crucial that you protect clients&#8217; information because your company&#8217;s reputation will suffer if you misplace or compromise their information, and you might face legal repercussions. Ensure your company invests in a safe online transacting environment that protects stored customer data. Find out what your payment gateway provider can do to stop online fraud if you accept&nbsp;payments&nbsp;online. Consider purchasing cyber insurance to safeguard your company. Dealing with a cyber-attack may cost far more than simply replacing computers, enhancing security or repairing databases. Your&nbsp;company&nbsp;may benefit from the cost savings provided by cyber liability insurance coverage for attack recovery.<\/p>\n","protected":false},"author":1152,"featured_media":42823,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[327,382],"tags":[390,1496,681,392,550,1497,414,1499,551,600],"class_list":["post-42790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-latest","tag-business","tag-cyber-attacks","tag-employee","tag-entrepreneurs","tag-entrepreneurship","tag-hackers","tag-msme","tag-passphrases","tag-small-businesses","tag-startups"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Combat Cyber Threats in your Business<\/title>\n<meta name=\"description\" content=\"To prevent cyber threats in your business, use passphrases instead of passwords to secure networks and devices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Combat Cyber Threats in your Business\" \/>\n<meta property=\"og:description\" content=\"To prevent cyber threats in your business, use passphrases instead of passwords to secure networks and devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"msmehub2\" \/>\n<meta property=\"article:author\" content=\"https:\/\/web.facebook.com\/otori.emmanuel\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-16T09:53:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T10:09:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.msmehub.org\/wp-content\/uploads\/2022\/11\/How-to-Combat-Cyber-Threats-in-your-Business.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emmanuel Otori\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/emmanuelotori5\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emmanuel Otori\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/\"},\"author\":{\"name\":\"Emmanuel Otori\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/person\\\/96ac704c19478a0bad1cb6e413ff74ed\"},\"headline\":\"How to Combat Cyber Threats in your Business\",\"datePublished\":\"2022-11-16T09:53:07+00:00\",\"dateModified\":\"2022-11-16T10:09:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/\"},\"wordCount\":947,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Business\",\"Cyber Attacks\",\"employee\",\"entrepreneurs\",\"Entrepreneurship\",\"Hackers\",\"MSME\",\"Passphrases\",\"Small Businesses\",\"Startups\"],\"articleSection\":[\"How To\",\"Latest\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/\",\"url\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/\",\"name\":\"How to Combat Cyber Threats in your Business\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2022-11-16T09:53:07+00:00\",\"dateModified\":\"2022-11-16T10:09:57+00:00\",\"description\":\"To prevent cyber threats in your business, use passphrases instead of passwords to secure networks and devices\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/how-to-combat-cyber-threats-in-your-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Combat Cyber Threats in your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#website\",\"url\":\"https:\\\/\\\/www.msmehub.org\\\/\",\"name\":\"msmehub2\",\"description\":\"Enabling Nigerian Businesses\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.msmehub.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#organization\",\"name\":\"msmehub2\",\"url\":\"https:\\\/\\\/www.msmehub.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/cropped-msme_logo-1.png\",\"contentUrl\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/cropped-msme_logo-1.png\",\"width\":885,\"height\":249,\"caption\":\"msmehub2\"},\"image\":{\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.msmehub.org\\\/#\\\/schema\\\/person\\\/96ac704c19478a0bad1cb6e413ff74ed\",\"name\":\"Emmanuel Otori\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f5eb4b9ac1b53116f7991198628baf51c4e5986cf00ce11e05c462d34a50185a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f5eb4b9ac1b53116f7991198628baf51c4e5986cf00ce11e05c462d34a50185a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f5eb4b9ac1b53116f7991198628baf51c4e5986cf00ce11e05c462d34a50185a?s=96&d=mm&r=g\",\"caption\":\"Emmanuel Otori\"},\"description\":\"Emmanuel is a Small Business Consultant, Start-Up Advisor and Consultant For SMEs across Nigeria. He's also the CEO of Abuja data School. He Has Worked With 50 Small Businesses, Including A World Bank And Federal Government Project. He Has Provided Advisory Services, Capacity Building Trainings And Consulting In The Hospitality, Information Technology, Fashion, Agric, Power And Services Sector.\",\"sameAs\":[\"https:\\\/\\\/www.abujadataschool.com\\\/\",\"https:\\\/\\\/web.facebook.com\\\/otori.emmanuel\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/emmanuelotori\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/emmanuelotori5\"],\"url\":\"https:\\\/\\\/msmehub.org\\\/staging\\\/6671\\\/author\\\/emmanuel-otori\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Combat Cyber Threats in your Business","description":"To prevent cyber threats in your business, use passphrases instead of passwords to secure networks and devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/","og_locale":"en_US","og_type":"article","og_title":"How to Combat Cyber Threats in your Business","og_description":"To prevent cyber threats in your business, use passphrases instead of passwords to secure networks and devices","og_url":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/","og_site_name":"msmehub2","article_author":"https:\/\/web.facebook.com\/otori.emmanuel","article_published_time":"2022-11-16T09:53:07+00:00","article_modified_time":"2022-11-16T10:09:57+00:00","og_image":[{"width":1920,"height":1282,"url":"https:\/\/www.msmehub.org\/wp-content\/uploads\/2022\/11\/How-to-Combat-Cyber-Threats-in-your-Business.jpg","type":"image\/jpeg"}],"author":"Emmanuel Otori","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/emmanuelotori5","twitter_misc":{"Written by":"Emmanuel Otori","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#article","isPartOf":{"@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/"},"author":{"name":"Emmanuel Otori","@id":"https:\/\/www.msmehub.org\/#\/schema\/person\/96ac704c19478a0bad1cb6e413ff74ed"},"headline":"How to Combat Cyber Threats in your Business","datePublished":"2022-11-16T09:53:07+00:00","dateModified":"2022-11-16T10:09:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/"},"wordCount":947,"commentCount":0,"publisher":{"@id":"https:\/\/www.msmehub.org\/#organization"},"image":{"@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#primaryimage"},"thumbnailUrl":"","keywords":["Business","Cyber Attacks","employee","entrepreneurs","Entrepreneurship","Hackers","MSME","Passphrases","Small Businesses","Startups"],"articleSection":["How To","Latest"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/","url":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/","name":"How to Combat Cyber Threats in your Business","isPartOf":{"@id":"https:\/\/www.msmehub.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#primaryimage"},"image":{"@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#primaryimage"},"thumbnailUrl":"","datePublished":"2022-11-16T09:53:07+00:00","dateModified":"2022-11-16T10:09:57+00:00","description":"To prevent cyber threats in your business, use passphrases instead of passwords to secure networks and devices","breadcrumb":{"@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.msmehub.org\/how-to-combat-cyber-threats-in-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/msmehub.org\/staging\/6671\/"},{"@type":"ListItem","position":2,"name":"How to Combat Cyber Threats in your Business"}]},{"@type":"WebSite","@id":"https:\/\/www.msmehub.org\/#website","url":"https:\/\/www.msmehub.org\/","name":"msmehub2","description":"Enabling Nigerian Businesses","publisher":{"@id":"https:\/\/www.msmehub.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.msmehub.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.msmehub.org\/#organization","name":"msmehub2","url":"https:\/\/www.msmehub.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.msmehub.org\/#\/schema\/logo\/image\/","url":"https:\/\/msmehub.org\/staging\/6671\/wp-content\/uploads\/2025\/06\/cropped-msme_logo-1.png","contentUrl":"https:\/\/msmehub.org\/staging\/6671\/wp-content\/uploads\/2025\/06\/cropped-msme_logo-1.png","width":885,"height":249,"caption":"msmehub2"},"image":{"@id":"https:\/\/www.msmehub.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.msmehub.org\/#\/schema\/person\/96ac704c19478a0bad1cb6e413ff74ed","name":"Emmanuel Otori","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f5eb4b9ac1b53116f7991198628baf51c4e5986cf00ce11e05c462d34a50185a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f5eb4b9ac1b53116f7991198628baf51c4e5986cf00ce11e05c462d34a50185a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f5eb4b9ac1b53116f7991198628baf51c4e5986cf00ce11e05c462d34a50185a?s=96&d=mm&r=g","caption":"Emmanuel Otori"},"description":"Emmanuel is a Small Business Consultant, Start-Up Advisor and Consultant For SMEs across Nigeria. He's also the CEO of Abuja data School. He Has Worked With 50 Small Businesses, Including A World Bank And Federal Government Project. He Has Provided Advisory Services, Capacity Building Trainings And Consulting In The Hospitality, Information Technology, Fashion, Agric, Power And Services Sector.","sameAs":["https:\/\/www.abujadataschool.com\/","https:\/\/web.facebook.com\/otori.emmanuel","https:\/\/www.linkedin.com\/in\/emmanuelotori\/","https:\/\/x.com\/https:\/\/twitter.com\/emmanuelotori5"],"url":"https:\/\/msmehub.org\/staging\/6671\/author\/emmanuel-otori\/"}]}},"_links":{"self":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts\/42790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/users\/1152"}],"replies":[{"embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/comments?post=42790"}],"version-history":[{"count":4,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts\/42790\/revisions"}],"predecessor-version":[{"id":42829,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/posts\/42790\/revisions\/42829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/media\/42823"}],"wp:attachment":[{"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/media?parent=42790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/categories?post=42790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msmehub.org\/staging\/6671\/wp-json\/wp\/v2\/tags?post=42790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}