{"id":8420,"date":"2013-07-29T14:48:00","date_gmt":"2013-07-29T14:48:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2748445"},"modified":"2013-07-29T14:48:00","modified_gmt":"2013-07-29T14:48:00","slug":"cbeyond-shares-security-basics-for-smbs","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cbeyond-shares-security-basics-for-smbs\/","title":{"rendered":"Cbeyond Shares Security Basics for SMBs"},"content":{"rendered":"<p>&#8220;When it comes to securing business information, taking the proper precautions on the front-end is well worth the time and effort,&#8221; said Cbeyond director of information security Jeff Jenkins, as Cbeyond shared its top five tips to help businesses secure critical information, maintain business continuity and ensure ongoing productivity.<br \/>\nJenkins continued, &#8220;If your business does not have the in-house resources, it&#8217;s critical to consult with a technology ally who can provide the insight and support needed to secure your data and maintain operations.&#8221;<br \/>\nThese guidelines, part of Cbeyond&#8217;s &#8220;Technology Ally&#8221; best practices series, are designed to help SMBs better communicate the benefits of securing information when addressing employees and customers in particular.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2748445\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;When it comes to securing business information, taking the proper precautions on the front-end is well worth the time and effort,&#8221; said Cbeyond director of information security Jeff Jenkins, as Cbeyond shared its top five tips to help businesses secur&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8420","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8420"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8420\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}