{"id":2536,"date":"2018-06-27T15:41:00","date_gmt":"2018-06-27T21:41:00","guid":{"rendered":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/"},"modified":"2018-06-27T15:41:00","modified_gmt":"2018-06-27T21:41:00","slug":"cybersecurity-risks-problems-fixes","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/","title":{"rendered":"Cybersecurity Risks (Problems\/Fixes)"},"content":{"rendered":"

The Top 5 Cybersecurity Risks Your Company Hasn\u2019t Considered<\/h2>\n

Exploring the leading cybersecurity threats facing business professionals today<\/strong><\/p>\n

\"Cybersecurity<\/p>\n

There\u2019s no getting around the prevalence of cybercrime today; it\u2019s happening more and more, all across the globe. Even worse? The identity thieves and malicious attackers lurking behind the scenes are getting better at exploiting weaknesses to get their hands on confidential business data.<\/p>\n

Understandably, business owners are often scrambling to ensure they\u2019re doing enough to keep security tight. Maybe they invest in some \u201ctotal solution\u201d software or perhaps they overload a tech savvy employee with IT security work. Some business owners simply decide to roll the dice and hope for the best. Whether it\u2019s doing too much or too little, business professionals often get caught up in a less-than-ideal approach to cybersecurity.<\/p>\n

So, with all the horror stories in the headlines about companies and government agencies getting breached, what\u2019s a business owner to do? The key is to remain focused and strategic so you can put together a level-headed plan. This involves taking a closer look at some of those gargantuan cyber threats we often forget about.<\/p>\n

Narrowing Down the Doom: 5 Concrete Risks You Can Focus on Fixing Today <\/strong><\/p>\n

In order to develop a realistic and strategic approach to cybersecurity, you have to cut out all the noise. Put the headlines and your own fears to the side and try to stay focused on the things you and your staff can control. Think long and hard about the various ways cyberattacks could occur in your organization and then consider how you can work to close the gaps in each section.<\/p>\n

Check out these Top 5 Security Risks that your organization must be carefully managing: <\/em><\/strong><\/p>\n

\u00a01.\u00a0<\/em><\/strong>Your own team <\/strong><\/p>\n

No one likes to admit that internal risks exist, but the reality is that employees are the weakest link<\/a> in the cybersecurity chain. Sometimes these internal threats are malicious, but most often it\u2019s a matter of ignorance and carelessness. In fact, human error is the catalyst for the vast majority of cyber-attacks on businesses.<\/p>\n

The reality is, an uninformed and unprepared team can have drastic consequences for your organization\u2019s cybersecurity. You may have employees who are more likely to click a malicious link or download a bad file from a phishing scam. Perhaps your team receives fraudulent business email compromise (BEC)<\/a> scams that seem legitimate. No matter the error, your workforce \u2013 when uninformed \u2013 can put your organization at serious risk.<\/p>\n

How to tackle an uneducated team: <\/strong><\/p>\n

The best way to counteract employees who aren\u2019t in the know is to teach them! Yes, this will require some investment of time and resources but in the long run, your organization will be stronger and more secure.<\/p>\n

Find ways to get your team on board and help empower them to be cybersecurity superheroes. Help them determine how to identify threats and create an environment for open and honest communication about suspicious activity of any kind. With an informed and vigilant team, your cybersecurity woes will be reduced significantly.<\/p>\n

Password malpractice <\/strong><\/p>\n

Passwords are supposed to keep your organizational and employee data safe and secure. But when\u2019s the last time your team changed their passwords? Is there a culture of password-sharing or posting in your office that threatens security? For that matter, have you and your team ever had an open conversation about choosing strong passwords? These are questions you must ask yourself in order to get on top of password malpractice.<\/p>\n

How to manage password malpractice: <\/strong><\/p>\n

Like with any other part of your business, best practice for password management is to have standard operating procedures in place to ensure your team knows what is expected.<\/p>\n

Make it a rule that passwords must be kept private and changed on a 30 or 60-day basis. Mark calendars with password change dates and makes it a group activity. Make it a rule that passwords must be unique and not repeats of old passwords or other accounts. Ensure there is a chain of command for access and control \u2013 superiors should never be sharing login credentials with employees \u2013 no matter how convenient. Finally, consider setting up two-factor authentication<\/a> at all endpoints to add an extra layer of verification security.<\/p>\n

2. Patch procrastination <\/strong><\/p>\n

In an increasingly digital workforce, hardware and software updates seem to pop-up daily. However, it is becoming blatantly clear that updated software and hardware are a critical part of maintaining strong cyber security. Why? Because updates very often include patches designed specifically to fix security holes or glitches. Who can forget the massive WannaCry scam<\/a> from 2017? Even though a patch had been released in March, it had not been installed on countless machines who were then infected by the virus in May.<\/p>\n

Even with the high profile WannaCry case, it is still common practice for many business professionals to avoid or put off software updates. Sometimes there is fear of change or increased technical issues once an update is installed \u2013 and this can happen. However, for the most part, updates are designed correctly and will work wonders by patching unseen security flaws. This can make a huge difference in keeping your network secure.<\/p>\n

How to stop patch procrastination: <\/strong><\/p>\n

Again, schedule your updates and mark them on calendars as much as possible. Taking the time to make a physical note will help emphasize the importance of staying on top of patchwork.<\/p>\n

Most importantly, when your machine gives you a reminder to install an update \u2013 install it! Get out of the habit of clicking \u201cRemind Me Later\u201d \u2013 your network will thank you. It\u2019s not just about security either. Staying on top of updates and patches will help your systems run at optimal capacity at all times. Make updates to your new habit and explain this priority to other administrators.<\/p>\n

3. <\/strong>Other organizations <\/strong><\/p>\n

This is perhaps the biggest risk that business professionals often forget. It\u2019s not just your own cybersecurity practices you should be worried about \u2013 it\u2019s the other companies you work with. Vendors, business partners, consultants \u2013 basically any organization that your company deals with can impact the safety of your business data.<\/p>\n

Even if you have the strongest internal cybersecurity plan in place, if a third-party vendor has less than perfect cyber security practices, attacks could find a way to access your network. The recent Petya attack<\/a> is a good example of this. The bottom line is that any company that you transmit data to and from is a potential vulnerability for your own network. The last thing you want is to invest time and money to keep your network secure, only to have it breached thanks to another organization\u2019s lax policies.<\/p>\n

How to counteract the poor cybersecurity practices of others: <\/strong><\/p>\n

First, its critical to make your own standards clear to the partners you\u2019re working with. While you can\u2019t force them to get smarter about their own security, letting them know that you take cybersecurity seriously right off the bat is a great way to be transparent and encourage their vigilance.<\/p>\n

Second, there are technical tools available to help mitigate the risks involved with external vendors. Network segmentation or divided servers can help ensure vendors only access the necessary parts of your network and nothing else. This can be a great safeguard that will help mitigate the risk of vendor weak spots.<\/p>\n

4. Bring Your Own Device (BYOD) chaos <\/strong><\/p>\n

Alright, it\u2019s no secret that pretty much everyone has a computer in their pocket or purse these days. Between smartphones, tablets and laptops, taking your favorite machine on-the-go is now easier than ever. Understandably, this has translated to the workplace with the Bring Your Own Device (BYOD)<\/a> craze. BYOD can be a convenient, cost-effective, and morale-boosting practice for small businesses.<\/p>\n

However, there is a downside to letting endless personal devices through the doors and onto your business network. In fact, the security risks involved can be pretty serious. Simply put, personal devices likely do not have the same security standards and protocols that corporate devices do. This can leave your organization wide open and much more susceptible to hacks and data breaches.<\/p>\n

How to balance BYOD benefits and risks: <\/strong><\/p>\n

Said it once and we\u2019ll say it again: get policies and procedures on paper if your organization allows staff to bring in their own devices. Make sure your employees know the risks involved and come up with some detailed policies that will keep your network as secure as possible.<\/p>\n

Make sure personal devices are only able to access the corporate networks through a virtual private network (VPN)<\/a>. Additionally, ensure that all employees have two-factor authentication set up on their accounts to maintain adequate verification. Just like all the other areas, proactive education is crucial. An informed team will make all the difference.<\/p>\n

5. Putting Your Plan in Action: Consult the Pros if Necessary<\/strong><\/p>\n

Now that some of the basic groundwork has been laid, it\u2019s time to ditch the hopelessness and procrastination and get your plan in action. There\u2019s no denying that business professionals are constantly on-the-go, but making cybersecurity a top priority is a critical way to ensure your IT infrastructure is protected.<\/p>\n

But hey, it can be a tough process to start. If you\u2019re feeling lost or unsure, don\u2019t hesitate to reach out to a local IT partner. A team of experts can help you begin thinking technically and strategically. It\u2019s not just about calling someone in to fix the problem. The right IT partner will help empower you and your team so you\u2019re thinking more like an IT expert.<\/p>\n","protected":false},"excerpt":{"rendered":"

The Top 5 Cybersecurity Risks Your Company Hasn\u2019t Considered Exploring the leading cybersecurity threats facing business professionals today There\u2019s no getting around the prevalence of cybercrime today; it\u2019s happening more and more, […]<\/p>\n","protected":false},"author":1,"featured_media":2537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nCybersecurity Risks (Problems\/Fixes) – KTG<\/title>\n<meta name=\"description\" content=\"Click Here to learn more \ud83c\udf1f Cybersecurity Risks (Problems\/Fixes) - Since 1992 - Nashville's Top IT Services Company\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Risks (Problems\/Fixes)\" \/>\n<meta property=\"og:description\" content=\"Click Here to learn more \ud83c\udf1f Cybersecurity Risks (Problems\/Fixes) - Since 1992 - Nashville's Top IT Services Company\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\" \/>\n<meta property=\"og:site_name\" content=\"KTG\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/krafttechgroup\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-27T21:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"501\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/krafttechgroup\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\"},\"author\":{\"name\":\"Brian Gray\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36\"},\"headline\":\"Cybersecurity Risks (Problems\/Fixes)\",\"datePublished\":\"2018-06-27T21:41:00+00:00\",\"dateModified\":\"2018-06-27T21:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\"},\"wordCount\":1597,\"publisher\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\",\"url\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\",\"name\":\"Cybersecurity Risks (Problems\/Fixes) – KTG\",\"isPartOf\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg\",\"datePublished\":\"2018-06-27T21:41:00+00:00\",\"dateModified\":\"2018-06-27T21:41:00+00:00\",\"description\":\"Click Here to learn more \ud83c\udf1f Cybersecurity Risks (Problems\/Fixes) - Since 1992 - Nashville's Top IT Services Company\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage\",\"url\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg\",\"contentUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg\",\"width\":501,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kraftgrp.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Risks (Problems\/Fixes)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kraftgrp.com\/#website\",\"url\":\"https:\/\/www.kraftgrp.com\/\",\"name\":\"KTG\",\"description\":\"Nashville IT Support & IT Services\",\"publisher\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kraftgrp.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\",\"name\":\"Kraft Technology Group\",\"url\":\"https:\/\/www.kraftgrp.com\/\",\"logo\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-organization-logo\"},\"address\":{\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"36.1941464\",\"longitude\":\"-86.807833\"},\"telephone\":[\"(615) 600-4411\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Sunday\",\"Saturday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}],\"email\":\"info@kraftgrp.com\",\"faxNumber\":\"(615) 600-4411\",\"areaServed\":\"Tennessee\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36\",\"name\":\"Brian Gray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g\",\"caption\":\"Brian Gray\"},\"description\":\"Brian Gray, MCP, is the President at Kraft Technology Group, LLC (KTG), an affiliate of KraftCPAs PLLC. Within his role, Brian is responsible for all aspects of service delivery to our clients. Brian has a decade of experience working for managed service providers. He has worked with clients in a variety of industries, including financial services, accounting, legal, healthcare, manufacturing, and retail.\",\"sameAs\":[\"https:\/\/www.facebook.com\/krafttechgroup\/\",\"https:\/\/www.instagram.com\/kraft.tech.group\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/krafttechgroup\",\"https:\/\/www.youtube.com\/channel\/UCtyhZQ69LpOjdaHg6HxNwQg\/videos\"]},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-place-address\",\"streetAddress\":\"555 Great Circle, Road Nashville\",\"addressLocality\":\"Nashville\",\"postalCode\":\"37228\",\"addressRegion\":\"TN\",\"addressCountry\":\"US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-organization-logo\",\"url\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png\",\"contentUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png\",\"width\":504,\"height\":100,\"caption\":\"Kraft Technology Group\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Nashville\" \/>\n<meta name=\"geo.position\" content=\"36.1941464;-86.807833\" \/>\n<meta name=\"geo.region\" content=\"United States (US)\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Risks (Problems\/Fixes) – KTG","description":"Click Here to learn more \ud83c\udf1f Cybersecurity Risks (Problems\/Fixes) - Since 1992 - Nashville's Top IT Services Company","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Risks (Problems\/Fixes)","og_description":"Click Here to learn more \ud83c\udf1f Cybersecurity Risks (Problems\/Fixes) - Since 1992 - Nashville's Top IT Services Company","og_url":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/","og_site_name":"KTG","article_author":"https:\/\/www.facebook.com\/krafttechgroup\/","article_published_time":"2018-06-27T21:41:00+00:00","og_image":[{"width":501,"height":343,"url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg","type":"image\/jpeg"}],"author":"Brian Gray","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/krafttechgroup","twitter_misc":{"Written by":"Brian Gray","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#article","isPartOf":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/"},"author":{"name":"Brian Gray","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36"},"headline":"Cybersecurity Risks (Problems\/Fixes)","datePublished":"2018-06-27T21:41:00+00:00","dateModified":"2018-06-27T21:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/"},"wordCount":1597,"publisher":{"@id":"https:\/\/www.kraftgrp.com\/#organization"},"image":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/","url":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/","name":"Cybersecurity Risks (Problems\/Fixes) – KTG","isPartOf":{"@id":"https:\/\/www.kraftgrp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage"},"image":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg","datePublished":"2018-06-27T21:41:00+00:00","dateModified":"2018-06-27T21:41:00+00:00","description":"Click Here to learn more \ud83c\udf1f Cybersecurity Risks (Problems\/Fixes) - Since 1992 - Nashville's Top IT Services Company","breadcrumb":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#primaryimage","url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg","contentUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2018\/06\/ThinkstockPhotos-534502836.jpg","width":501,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kraftgrp.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Risks (Problems\/Fixes)"}]},{"@type":"WebSite","@id":"https:\/\/www.kraftgrp.com\/#website","url":"https:\/\/www.kraftgrp.com\/","name":"KTG","description":"Nashville IT Support & IT Services","publisher":{"@id":"https:\/\/www.kraftgrp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kraftgrp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Organization","Place"],"@id":"https:\/\/www.kraftgrp.com\/#organization","name":"Kraft Technology Group","url":"https:\/\/www.kraftgrp.com\/","logo":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-organization-logo"},"address":{"@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"36.1941464","longitude":"-86.807833"},"telephone":["(615) 600-4411"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Sunday","Saturday"],"opens":"00:00","closes":"00:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"17:00"}],"email":"info@kraftgrp.com","faxNumber":"(615) 600-4411","areaServed":"Tennessee"},{"@type":"Person","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36","name":"Brian Gray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g","caption":"Brian Gray"},"description":"Brian Gray, MCP, is the President at Kraft Technology Group, LLC (KTG), an affiliate of KraftCPAs PLLC. Within his role, Brian is responsible for all aspects of service delivery to our clients. Brian has a decade of experience working for managed service providers. He has worked with clients in a variety of industries, including financial services, accounting, legal, healthcare, manufacturing, and retail.","sameAs":["https:\/\/www.facebook.com\/krafttechgroup\/","https:\/\/www.instagram.com\/kraft.tech.group\/","https:\/\/x.com\/https:\/\/twitter.com\/krafttechgroup","https:\/\/www.youtube.com\/channel\/UCtyhZQ69LpOjdaHg6HxNwQg\/videos"]},{"@type":"PostalAddress","@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-place-address","streetAddress":"555 Great Circle, Road Nashville","addressLocality":"Nashville","postalCode":"37228","addressRegion":"TN","addressCountry":"US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/cybersecurity-risks-problems-fixes\/#local-main-organization-logo","url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png","contentUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png","width":504,"height":100,"caption":"Kraft Technology Group"}]},"geo.placename":"Nashville","geo.position":{"lat":"36.1941464","long":"-86.807833"},"geo.region":"United States (US)"},"_links":{"self":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts\/2536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/comments?post=2536"}],"version-history":[{"count":0,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts\/2536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/media\/2537"}],"wp:attachment":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/media?parent=2536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/categories?post=2536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/tags?post=2536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}