{"id":27324,"date":"2020-10-30T20:10:26","date_gmt":"2020-10-30T20:10:26","guid":{"rendered":"https:\/\/www.dvirc.org\/?page_id=27324"},"modified":"2020-10-30T20:10:26","modified_gmt":"2020-10-30T20:10:26","slug":"manufacturers-guide-to-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/","title":{"rendered":"Manufacturers Guide to Cybersecurity"},"content":{"rendered":"

[vc_row full_width=”stretch_row” el_id=”about” css=”.vc_custom_1576537941549{margin-top: 0px !important;padding-top: 0px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}”][vc_column css=”.vc_custom_1576537926076{margin-top: 0px !important;padding-top: 0px !important;}”][vc_column_text css=”.vc_custom_1604088269428{margin-top: 0px !important;padding-top: 0px !important;}”]SMMs often have more to lose than larger manufacturers because a cyber event \u2014 whether due to a hacker, natural disaster or business resource loss \u2014 can have a major impact. SMMs are often less prepared to handle these types of events. But because SMMs often have less complex operational needs and IT infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly. It is vitally important that you consider how to protect your business before an incident occurs.<\/p>\n

Fill out this form to download your copy of the Manufacturers Guide to Cybersecurity for Small and Medium-Sized Manufacturers for free.<\/strong>[\/vc_column_text][vc_raw_js]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[\/vc_raw_js][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"[vc_row full_width=”stretch_row” el_id=”about” css=”.vc_custom_1576537941549{margin-top: 0px !important;padding-top: 0px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}”][vc_column css=”.vc_custom_1576537926076{margin-top: 0px !important;padding-top: 0px !important;}”][vc_column_text css=”.vc_custom_1604088269428{margin-top: 0px !important;padding-top: 0px !important;}”]SMMs often have more to lose than larger manufacturers because a cyber event \u2014 whether due to a hacker, natural disaster or business resource loss \u2014 can have a major impact. SMMs are often […]","protected":false},"author":8,"featured_media":26567,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"page-default-2.php","meta":{"_acf_changed":false,"footnotes":""},"acf":[],"yoast_head":"\nManufacturers Guide to Cybersecurity – DVIRC<\/title>\n<meta name=\"description\" content=\"SMMs often have less complex infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manufacturers Guide to Cybersecurity – DVIRC\" \/>\n<meta property=\"og:description\" content=\"SMMs often have less complex infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"DVIRC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dvirc.sepa\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2386\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/\",\"url\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/\",\"name\":\"Manufacturers Guide to Cybersecurity – DVIRC\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg\",\"datePublished\":\"2020-10-30T20:10:26+00:00\",\"dateModified\":\"2020-10-30T20:10:26+00:00\",\"description\":\"SMMs often have less complex infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg\",\"width\":2386,\"height\":1256,\"caption\":\"Padlock With Keyhole icon in. personal data security Illustrates cyber data or information privacy idea. blue color abstract hi speed internet technology.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dvirc.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Manufacturers Guide to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dvirc.org\/#website\",\"url\":\"https:\/\/www.dvirc.org\/\",\"name\":\"DVIRC\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dvirc.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dvirc.org\/#organization\",\"name\":\"DVIRC\",\"url\":\"https:\/\/www.dvirc.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"width\":2560,\"height\":1671,\"caption\":\"DVIRC\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dvirc.sepa\/\",\"https:\/\/twitter.com\/DVIRC_PA\",\"https:\/\/www.linkedin.com\/company\/dvirc\",\"https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manufacturers Guide to Cybersecurity – DVIRC","description":"SMMs often have less complex infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Manufacturers Guide to Cybersecurity – DVIRC","og_description":"SMMs often have less complex infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly.","og_url":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/","og_site_name":"DVIRC","article_publisher":"https:\/\/www.facebook.com\/dvirc.sepa\/","og_image":[{"width":2386,"height":1256,"url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@DVIRC_PA","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/","url":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/","name":"Manufacturers Guide to Cybersecurity – DVIRC","isPartOf":{"@id":"https:\/\/www.dvirc.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg","datePublished":"2020-10-30T20:10:26+00:00","dateModified":"2020-10-30T20:10:26+00:00","description":"SMMs often have less complex infrastructure, they may be able to take steps to detect and recover from a cybersecurity incident quickly.","breadcrumb":{"@id":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#primaryimage","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/GettyImages-1172944401.jpg","width":2386,"height":1256,"caption":"Padlock With Keyhole icon in. personal data security Illustrates cyber data or information privacy idea. blue color abstract hi speed internet technology."},{"@type":"BreadcrumbList","@id":"https:\/\/www.dvirc.org\/manufacturers-guide-to-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dvirc.org\/"},{"@type":"ListItem","position":2,"name":"Manufacturers Guide to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.dvirc.org\/#website","url":"https:\/\/www.dvirc.org\/","name":"DVIRC","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dvirc.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.dvirc.org\/#organization","name":"DVIRC","url":"https:\/\/www.dvirc.org\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","width":2560,"height":1671,"caption":"DVIRC"},"image":{"@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dvirc.sepa\/","https:\/\/twitter.com\/DVIRC_PA","https:\/\/www.linkedin.com\/company\/dvirc","https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg"]}]}},"_links":{"self":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/pages\/27324"}],"collection":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/comments?post=27324"}],"version-history":[{"count":0,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/pages\/27324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media\/26567"}],"wp:attachment":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media?parent=27324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}