{"id":27324,"date":"2020-10-30T20:10:26","date_gmt":"2020-10-30T20:10:26","guid":{"rendered":"https:\/\/www.dvirc.org\/?page_id=27324"},"modified":"2020-10-30T20:10:26","modified_gmt":"2020-10-30T20:10:26","slug":"manufacturers-guide-to-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/","title":{"rendered":"Manufacturers Guide to Cybersecurity"},"content":{"rendered":"
[vc_row full_width=”stretch_row” el_id=”about” css=”.vc_custom_1576537941549{margin-top: 0px !important;padding-top: 0px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}”][vc_column css=”.vc_custom_1576537926076{margin-top: 0px !important;padding-top: 0px !important;}”][vc_column_text css=”.vc_custom_1604088269428{margin-top: 0px !important;padding-top: 0px !important;}”]SMMs often have more to lose than larger manufacturers because a cyber event \u2014 whether due to a hacker, natural disaster or business resource loss \u2014 can have a major impact. SMMs are often less prepared to handle these types of events. But because SMMs often have less complex operational needs and IT infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly. It is vitally important that you consider how to protect your business before an incident occurs.<\/p>\n
Fill out this form to download your copy of the Manufacturers Guide to Cybersecurity for Small and Medium-Sized Manufacturers for free.<\/strong>[\/vc_column_text][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"[vc_row full_width=”stretch_row” el_id=”about” css=”.vc_custom_1576537941549{margin-top: 0px !important;padding-top: 0px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}”][vc_column css=”.vc_custom_1576537926076{margin-top: 0px !important;padding-top: 0px !important;}”][vc_column_text css=”.vc_custom_1604088269428{margin-top: 0px !important;padding-top: 0px !important;}”]SMMs often have more to lose than larger manufacturers because a cyber event \u2014 whether due to a hacker, natural disaster or business resource loss \u2014 can have a major impact. SMMs are often […]","protected":false},"author":8,"featured_media":26567,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"page-default-2.php","meta":{"_acf_changed":false,"footnotes":""},"acf":[],"yoast_head":"\n