SlideShare a Scribd company logo
1 of 2
Small Business Data Breach
Thesis statement:
In this incredibly fast pace world where technology is moving at
the speed of light, it is becoming normal to hear of different
businesses being invaded by cyber attacks. When this happens,
the personal information of consumers and private information
about the company are exposed. This exposure can create a
financial hardship for small businesses and break the trust of
their consumers.
Body
Small Business
How to protect the personal information of their customers.
How to respond to attack
What do they say to customers when there has been a breach
Who are the people trying to breach your business’s information
and what are they after?
Personal information
Money
Business secrets
Conclusion
Being prepared and what it looks like to be prepared
The number of small business effected every year

More Related Content

Similar to Small Business Data BreachThesis statement In this i.docx

Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
David Dubree
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 

Similar to Small Business Data BreachThesis statement In this i.docx (20)

January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Information Security: Protecting Your Assets
Information Security: Protecting Your AssetsInformation Security: Protecting Your Assets
Information Security: Protecting Your Assets
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Cyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid CybercrimeCyber Security Tips to Avoid Cybercrime
Cyber Security Tips to Avoid Cybercrime
 
Pitss
PitssPitss
Pitss
 
L123
L123L123
L123
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 

More from jennifer822

Small Group Research41(5) 621 –651© The Author(s) 2010.docx
Small Group Research41(5) 621 –651© The Author(s) 2010.docxSmall Group Research41(5) 621 –651© The Author(s) 2010.docx
Small Group Research41(5) 621 –651© The Author(s) 2010.docx
jennifer822
 
SMALL GROUP LESSON .docx
SMALL GROUP LESSON                                               .docxSMALL GROUP LESSON                                               .docx
SMALL GROUP LESSON .docx
jennifer822
 
Small Group Discussion Grading RubricParticipation for MSNSmal.docx
Small Group Discussion Grading RubricParticipation for MSNSmal.docxSmall Group Discussion Grading RubricParticipation for MSNSmal.docx
Small Group Discussion Grading RubricParticipation for MSNSmal.docx
jennifer822
 
SM Nonprofit Ad Campaign Term Project InstructionsOverview.docx
SM Nonprofit Ad Campaign Term Project InstructionsOverview.docxSM Nonprofit Ad Campaign Term Project InstructionsOverview.docx
SM Nonprofit Ad Campaign Term Project InstructionsOverview.docx
jennifer822
 
Small Business State of the UnionInterest and involvement in s.docx
Small Business State of the UnionInterest and involvement in s.docxSmall Business State of the UnionInterest and involvement in s.docx
Small Business State of the UnionInterest and involvement in s.docx
jennifer822
 
Small Business and Forms of Business Ownershiphttpwww.wil.docx
Small Business and Forms of Business Ownershiphttpwww.wil.docxSmall Business and Forms of Business Ownershiphttpwww.wil.docx
Small Business and Forms of Business Ownershiphttpwww.wil.docx
jennifer822
 
Small Business Management, 18eLongeneckerPettyPalichH.docx
Small Business Management, 18eLongeneckerPettyPalichH.docxSmall Business Management, 18eLongeneckerPettyPalichH.docx
Small Business Management, 18eLongeneckerPettyPalichH.docx
jennifer822
 
SMALL BUSINESS LAW .docx
SMALL BUSINESS LAW                                              .docxSMALL BUSINESS LAW                                              .docx
SMALL BUSINESS LAW .docx
jennifer822
 
Small Business Consulting Report I. INTRODUCTION In this sma.docx
Small Business Consulting Report I. INTRODUCTION In this sma.docxSmall Business Consulting Report I. INTRODUCTION In this sma.docx
Small Business Consulting Report I. INTRODUCTION In this sma.docx
jennifer822
 
SLP- IT Governance Dashboards, which display data using graphi.docx
SLP- IT Governance Dashboards, which display data using graphi.docxSLP- IT Governance Dashboards, which display data using graphi.docx
SLP- IT Governance Dashboards, which display data using graphi.docx
jennifer822
 
slides10 Crusade and the Twelfth Century.pptx.docx
slides10 Crusade and the Twelfth Century.pptx.docxslides10 Crusade and the Twelfth Century.pptx.docx
slides10 Crusade and the Twelfth Century.pptx.docx
jennifer822
 
Slide concept by Anthony DAscoli FOR EDUCA.docx
Slide concept by Anthony DAscoli FOR EDUCA.docxSlide concept by Anthony DAscoli FOR EDUCA.docx
Slide concept by Anthony DAscoli FOR EDUCA.docx
jennifer822
 

More from jennifer822 (20)

Smallpox has been widely reported as a possible bio-terror weapon..docx
Smallpox has been widely reported as a possible bio-terror weapon..docxSmallpox has been widely reported as a possible bio-terror weapon..docx
Smallpox has been widely reported as a possible bio-terror weapon..docx
 
Small Group Research41(5) 621 –651© The Author(s) 2010.docx
Small Group Research41(5) 621 –651© The Author(s) 2010.docxSmall Group Research41(5) 621 –651© The Author(s) 2010.docx
Small Group Research41(5) 621 –651© The Author(s) 2010.docx
 
Small mistakes are the steppingstones to large failures. How mig.docx
Small mistakes are the steppingstones to large failures. How mig.docxSmall mistakes are the steppingstones to large failures. How mig.docx
Small mistakes are the steppingstones to large failures. How mig.docx
 
SMALL GROUP LESSON .docx
SMALL GROUP LESSON                                               .docxSMALL GROUP LESSON                                               .docx
SMALL GROUP LESSON .docx
 
Small Group Discussion Grading RubricParticipation for MSNSmal.docx
Small Group Discussion Grading RubricParticipation for MSNSmal.docxSmall Group Discussion Grading RubricParticipation for MSNSmal.docx
Small Group Discussion Grading RubricParticipation for MSNSmal.docx
 
SM Nonprofit Ad Campaign Term Project InstructionsOverview.docx
SM Nonprofit Ad Campaign Term Project InstructionsOverview.docxSM Nonprofit Ad Campaign Term Project InstructionsOverview.docx
SM Nonprofit Ad Campaign Term Project InstructionsOverview.docx
 
Small Business State of the UnionInterest and involvement in s.docx
Small Business State of the UnionInterest and involvement in s.docxSmall Business State of the UnionInterest and involvement in s.docx
Small Business State of the UnionInterest and involvement in s.docx
 
Small Business and Forms of Business Ownershiphttpwww.wil.docx
Small Business and Forms of Business Ownershiphttpwww.wil.docxSmall Business and Forms of Business Ownershiphttpwww.wil.docx
Small Business and Forms of Business Ownershiphttpwww.wil.docx
 
Small Business Management, 18eLongeneckerPettyPalichH.docx
Small Business Management, 18eLongeneckerPettyPalichH.docxSmall Business Management, 18eLongeneckerPettyPalichH.docx
Small Business Management, 18eLongeneckerPettyPalichH.docx
 
Small business was considered the future. Is it still amidst ev.docx
Small business was considered the future. Is it still amidst ev.docxSmall business was considered the future. Is it still amidst ev.docx
Small business was considered the future. Is it still amidst ev.docx
 
SMALL BUSINESS LAW .docx
SMALL BUSINESS LAW                                              .docxSMALL BUSINESS LAW                                              .docx
SMALL BUSINESS LAW .docx
 
Small Business Consulting Report I. INTRODUCTION In this sma.docx
Small Business Consulting Report I. INTRODUCTION In this sma.docxSmall Business Consulting Report I. INTRODUCTION In this sma.docx
Small Business Consulting Report I. INTRODUCTION In this sma.docx
 
SlumlordsAssume you are the Chief of Police in a large city..docx
SlumlordsAssume you are the Chief of Police in a large city..docxSlumlordsAssume you are the Chief of Police in a large city..docx
SlumlordsAssume you are the Chief of Police in a large city..docx
 
SLP- IT Governance Dashboards, which display data using graphi.docx
SLP- IT Governance Dashboards, which display data using graphi.docxSLP- IT Governance Dashboards, which display data using graphi.docx
SLP- IT Governance Dashboards, which display data using graphi.docx
 
Slowing Down Global WarmingAs Hite and Seitz (2016) discuss .docx
Slowing Down Global WarmingAs Hite and Seitz (2016) discuss .docxSlowing Down Global WarmingAs Hite and Seitz (2016) discuss .docx
Slowing Down Global WarmingAs Hite and Seitz (2016) discuss .docx
 
SLO 4 - Technology Use the computer for research, computation and.docx
SLO 4 - Technology Use the computer for research, computation and.docxSLO 4 - Technology Use the computer for research, computation and.docx
SLO 4 - Technology Use the computer for research, computation and.docx
 
SLO # 1Apply knowledge of the roles of interdisciplinary team m.docx
SLO # 1Apply knowledge of the roles of interdisciplinary team m.docxSLO # 1Apply knowledge of the roles of interdisciplinary team m.docx
SLO # 1Apply knowledge of the roles of interdisciplinary team m.docx
 
slides10 Crusade and the Twelfth Century.pptx.docx
slides10 Crusade and the Twelfth Century.pptx.docxslides10 Crusade and the Twelfth Century.pptx.docx
slides10 Crusade and the Twelfth Century.pptx.docx
 
Slides should include highlight major points with detailed speaker n.docx
Slides should include highlight major points with detailed speaker n.docxSlides should include highlight major points with detailed speaker n.docx
Slides should include highlight major points with detailed speaker n.docx
 
Slide concept by Anthony DAscoli FOR EDUCA.docx
Slide concept by Anthony DAscoli FOR EDUCA.docxSlide concept by Anthony DAscoli FOR EDUCA.docx
Slide concept by Anthony DAscoli FOR EDUCA.docx
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 

Small Business Data BreachThesis statement In this i.docx

  • 1. Small Business Data Breach Thesis statement: In this incredibly fast pace world where technology is moving at the speed of light, it is becoming normal to hear of different businesses being invaded by cyber attacks. When this happens, the personal information of consumers and private information about the company are exposed. This exposure can create a financial hardship for small businesses and break the trust of their consumers. Body Small Business How to protect the personal information of their customers. How to respond to attack What do they say to customers when there has been a breach Who are the people trying to breach your business’s information and what are they after? Personal information
  • 2. Money Business secrets Conclusion Being prepared and what it looks like to be prepared The number of small business effected every year