{"id":469,"date":"2019-04-16T11:43:02","date_gmt":"2019-04-16T11:43:02","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/nist-cybersecurity-resources-for-smaller-businesses\/"},"modified":"2019-06-18T10:46:35","modified_gmt":"2019-06-18T07:46:35","slug":"nist-cybersecurity-resources-for-smaller-businesses","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/","title":{"rendered":"NIST cybersecurity resources for smaller businesses"},"content":{"rendered":"\n<p>How can smaller businesses address their cybersecurity risks without the resources of large organizations?<\/p>\n\n\n\n<p>There are a lot of challenges to being a small-business owner, including safely managing technology. Every risk can have an outsized effect on your ability to stay in business. And resources for protecting your business are often geared towards much larger organizations. The National Institute of Standards and Technology (NIST) aims to change that, with the release of their <a href=\"https:\/\/www.nist.gov\/itl\/smallbusinesscyber\" target=\"_blank\" rel=\"noreferrer noopener\">Small Business Cybersecurity Corner<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How is protecting a smaller business different?<\/strong><\/h2>\n\n\n\n<p>On a fundamental level, the techniques needed to protect a small business aren\u2019t all that different from those needed to protect a very large organization. The biggest differences boil down to complexity, expertise, and resilience.<\/p>\n\n\n\n<p>A small network will necessarily be a lot less complex, which means it can be easier to protect. But if you don\u2019t have the expertise to know whether you\u2019ve adequately protected your data and devices, that simplicity is largely irrelevant. And while the cost of a security incident may be lower because of a small number of records or machines affected, if it\u2019s a huge percentage of a small amount of profit, it can be very <a href=\"https:\/\/www.csoonline.com\/article\/3267715\/4-main-reasons-why-smes-and-smbs-fail-after-a-major-cyberattack.html\" target=\"_blank\" rel=\"noreferrer noopener\">difficult for businesses to bounce back<\/a>.<\/p>\n\n\n\n<p>Existing advice for assessing and protecting against cybersecurity risks can often seem overwhelming to those who aren\u2019t computer experts. But now, there\u2019s a specific <a href=\"https:\/\/www.nist.gov\/itl\/smallbusinesscyber\" target=\"_blank\" rel=\"noreferrer noopener\">resource that speaks to smaller businesses<\/a>. And it uses more approachable language, to help smaller companies understand their specific risks as well as the measures used to mitigate them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>NIST resources for small businesses<\/strong><\/h2>\n\n\n<p>The \u201cFor Managers\u201d section covers security from a management perspective. This includes Board-level discussions of security and risk, topics of discussion for CEOs considering their company\u2019s security posture, improving security culture at all levels of the organization, and how to hire new security staff.<\/p>\n<p><!-- \/wp:post-content --><\/p>\n<p><!-- wp:paragraph --><br>\nThe Glossary is just what you\u2019d expect, and it covers several dozen terms describing security concepts that are used throughout the site.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The \u201cCybersecurity Basics\u201d section is a good place to start for those who are very new to the topic of security, and may be a good review for people who are more familiar. The myths document is likely to be particularly helpful for those who are coming in with some level of security preconceptions.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>Planning Guides<\/strong><\/li>\n<\/ul>\n<p>This section has the sort of content that NIST has become well known for, as well as additional articles covering these resources in clearer, less technical language.<\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><br>\nThe \u201cCybersecurity Resources Roadmap\u201d is a good place to start when navigating this section. It is an infographic to help you determine how to get started, or where you need to go if you are further along on your journey towards protecting your environment. Each tier will point you to the specific resources that will be most helpful.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>Responding to a Cyber Incident<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>This section is where to go if you\u2019ve been the victim of a security event and need to know what to do next. The data breach guide even includes a sample template for a breach response notification, so you can ensure that you\u2019ve covered the necessary bases as efficiently and professionally as possible, even in a very stressful situation.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>Training<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><br>\nThis section was created with the NIST Manufacturing Extension Partnership, and is geared primarily towards small manufacturers. This goes into more detail about the <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/hb\/2017\/nist.hb.162.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171 Handbook<\/a> to assist those who supply products for the Department of Defense.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>Contributor Directory<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><br>\nThis section is a list of resources and other government organizations helping to improve cybersecurity. I\u2019d like to draw particular attention to the National Initiative for&nbsp;Cybersecurity<br>\nEducation (NICE)&nbsp;<a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/workforce-management-guidebook\" target=\"_blank\" rel=\"noreferrer noopener\">Workforce Management Guidebook<\/a>, which can be particularly helpful if you\u2019re at a point of wanting to hire people to help <a href=\"https:\/\/www.welivesecurity.com\/2017\/01\/26\/desperately-seeking-cybersecurity-skills\/\" target=\"_blank\" rel=\"noreferrer noopener\">improve your security capability<\/a>.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>FAQ<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><br>\nThe FAQ section answers frequently asked questions about the NIST Small Business Cybersecurity site itself, such as why small to medium-sized businesses need to be concerned about security.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li><strong>Blog<\/strong><\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><br>\nOnce you\u2019ve gotten up to speed on the basics, you may wish to revisit the site regularly, to see what the newest topics of interest are. The Blog section is periodically updated with things that NIST is doing, as well as current events of interest.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>I hope NIST\u2019s efforts are only the beginning of a major trend towards educating small-business owners about security topics. There\u2019s a tremendous need that must be filled, especially around making regulatory compliance understandable by mere mortals. If you own a small business, do you think this level of information is useful? If so, why? Or if not, what would you like to see done differently?<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/04\/04\/nist-cybersecurity-resources-smaller-businesses\/\">Welivesecurity<\/a><\/p>\n<p><!-- \/wp:paragraph --><\/p>","protected":false},"excerpt":{"rendered":"<p>How can smaller businesses address their cybersecurity risks without the resources of large organizations? There are a lot of challenges to being a small-business owner, including safely managing technology. Every risk can have an outsized effect on your ability to stay in business. And resources for protecting your business are often geared towards much larger<\/p>\n","protected":false},"author":5,"featured_media":1749,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NIST cybersecurity resources for smaller businesses - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST cybersecurity resources for smaller businesses\" \/>\n<meta property=\"og:description\" content=\"How can smaller businesses address their cybersecurity risks without the resources of large organizations? There are a lot of challenges to being a small-business owner, including safely managing technology. Every risk can have an outsized effect on your ability to stay in business. And resources for protecting your business are often geared towards much larger\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-16T11:43:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-18T07:46:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/hacking-is-legal-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"NIST cybersecurity resources for smaller businesses\",\"datePublished\":\"2019-04-16T11:43:02+00:00\",\"dateModified\":\"2019-06-18T07:46:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/\"},\"wordCount\":789,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacking-is-legal-623x410.jpg\",\"articleSection\":[\"uncategorized\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/\",\"name\":\"NIST cybersecurity resources for smaller businesses - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacking-is-legal-623x410.jpg\",\"datePublished\":\"2019-04-16T11:43:02+00:00\",\"dateModified\":\"2019-06-18T07:46:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacking-is-legal-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacking-is-legal-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST cybersecurity resources for smaller businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/04\\\/16\\\/nist-cybersecurity-resources-for-smaller-businesses\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST cybersecurity resources for smaller businesses - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/","og_locale":"en_US","og_type":"article","og_title":"NIST cybersecurity resources for smaller businesses","og_description":"How can smaller businesses address their cybersecurity risks without the resources of large organizations? There are a lot of challenges to being a small-business owner, including safely managing technology. Every risk can have an outsized effect on your ability to stay in business. And resources for protecting your business are often geared towards much larger","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-04-16T11:43:02+00:00","article_modified_time":"2019-06-18T07:46:35+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/hacking-is-legal-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"NIST cybersecurity resources for smaller businesses","datePublished":"2019-04-16T11:43:02+00:00","dateModified":"2019-06-18T07:46:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/"},"wordCount":789,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/hacking-is-legal-623x410.jpg","articleSection":["uncategorized"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/","name":"NIST cybersecurity resources for smaller businesses - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/hacking-is-legal-623x410.jpg","datePublished":"2019-04-16T11:43:02+00:00","dateModified":"2019-06-18T07:46:35+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/hacking-is-legal-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/hacking-is-legal-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"NIST cybersecurity resources for smaller businesses"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/04\/16\/nist-cybersecurity-resources-for-smaller-businesses\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=469"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1749"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}