{"id":3978,"date":"2021-04-26T12:47:43","date_gmt":"2021-04-26T12:47:43","guid":{"rendered":"https:\/\/www.dssitservices.com\/?p=3978"},"modified":"2021-04-26T13:18:29","modified_gmt":"2021-04-26T13:18:29","slug":"behind-the-hack-see-how-easily-your-business-can-be-hacked","status":"publish","type":"post","link":"https:\/\/www.dssitservices.com\/sq\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/","title":{"rendered":"Behind the hack: See how easily your business can be hacked"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"text-align: center;\">Watch as a certified ethical hacker breaks into 3 computers in just minutes<\/h3>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>One of the greatest risks to your business these days is hackers trying to break into your IT systems.<\/p>\n<p>Thanks to automated tools, all businesses are being targeted by all hackers, all the time. They want to steal your data, your logins \u2013 or worse, hold your data to ransom.<\/p>\n<p>We asked a certified ethical hacker to break into three computers using different types of attack. He filmed it from both ends \u2013 as the hacker, and what was happening on his victims\u2019 machines.<\/p>\n<p>What you\u2019re about to see is rarely captured on video\u2026<\/p>\n<p>In this first attack, our ethical hacker encrypts all of your data, until you pay a huge ransom to get it back.<\/p>\n<p><script src=https:\/\/fast.wistia.com\/embed\/medias\/9qvcn90xmj.jsonp async><\/script><script src=https:\/\/fast.wistia.com\/assets\/external\/E-v1.js async><\/script><\/p>\n<div class=\"wistia_responsive_padding\" style=\"padding: 56.25% 0 0 0; position: relative;\">\n<div class=\"wistia_responsive_wrapper\" style=\"height: 100%; left: 0; position: absolute; top: 0; width: 100%;\">\n<div class=\"wistia_embed wistia_async_9qvcn90xmj seo=false videoFoam=true\" style=\"height: 100%; position: relative; width: 100%;\">\n<div class=\"wistia_swatch\" style=\"height: 100%; left: 0; opacity: 0; overflow: hidden; position: absolute; top: 0; transition: opacity 200ms; width: 100%;\"><img decoding=\"async\" style=\"filter: blur(5px); height: 100%; object-fit: contain; width: 100%;\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/9qvcn90xmj\/swatch\" alt=\"\" aria-hidden=\"true\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>In this second attack, our ethical hacker uses a fake login portal to get you to give away your login details.<\/p>\n<p><script src=https:\/\/fast.wistia.com\/embed\/medias\/4jmbf2jb7k.jsonp async><\/script><script src=https:\/\/fast.wistia.com\/assets\/external\/E-v1.js async><\/script><\/p>\n<div class=\"wistia_responsive_padding\" style=\"padding: 56.25% 0 0 0; position: relative;\">\n<div class=\"wistia_responsive_wrapper\" style=\"height: 100%; left: 0; position: absolute; top: 0; width: 100%;\">\n<div class=\"wistia_embed wistia_async_4jmbf2jb7k seo=false videoFoam=true\" style=\"height: 100%; position: relative; width: 100%;\">\n<div class=\"wistia_swatch\" style=\"height: 100%; left: 0; opacity: 0; overflow: hidden; position: absolute; top: 0; transition: opacity 200ms; width: 100%;\"><img decoding=\"async\" style=\"filter: blur(5px); height: 100%; object-fit: contain; width: 100%;\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/4jmbf2jb7k\/swatch\" alt=\"\" aria-hidden=\"true\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>And in this final attack, our hacker reveals why it\u2019s so important to always keep your software and operating system fully-up-to-date.<\/p>\n<p><script src=https:\/\/fast.wistia.com\/embed\/medias\/zr658ptgz4.jsonp async><\/script><script src=https:\/\/fast.wistia.com\/assets\/external\/E-v1.js async><\/script><\/p>\n<div class=\"wistia_responsive_padding\" style=\"padding: 56.25% 0 0 0; position: relative;\">\n<div class=\"wistia_responsive_wrapper\" style=\"height: 100%; left: 0; position: absolute; top: 0; width: 100%;\">\n<div class=\"wistia_embed wistia_async_zr658ptgz4 seo=false videoFoam=true\" style=\"height: 100%; position: relative; width: 100%;\">\n<div class=\"wistia_swatch\" style=\"height: 100%; left: 0; opacity: 0; overflow: hidden; position: absolute; top: 0; transition: opacity 200ms; width: 100%;\"><img decoding=\"async\" style=\"filter: blur(5px); height: 100%; object-fit: contain; width: 100%;\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/zr658ptgz4\/swatch\" alt=\"\" aria-hidden=\"true\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2 style=\"text-align: center;\"><strong><span data-originalfontsize=\"18pt\" data-originalcomputedfontsize=\"24\">These videos scared us\u2026 because we see the consequences of these attacks every day<\/span><\/strong><\/h2>\n<p><span data-removefontsize=\"true\" data-originalcomputedfontsize=\"16\">Three questions:<\/span><\/p>\n<ol>\n<li><span data-removefontsize=\"true\" data-originalcomputedfontsize=\"16\">Do you now realize how easy it is for a determined hacker to get into your IT systems?<\/span><\/li>\n<li><span data-removefontsize=\"true\" data-originalcomputedfontsize=\"16\">Does your business have the right blend of software, staff training and processes to protect your IT and data?<\/span><\/li>\n<li><span data-removefontsize=\"true\" data-originalcomputedfontsize=\"16\">Would you like us to review it? The peace of mind you will get from this review will be tremendous.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span data-removefontsize=\"true\" data-originalcomputedfontsize=\"16\">Book a 15 minute call at a time that suits you. There\u2019s no obligation to buy anything, ever.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid popmake-1906 vc_custom_1619442750486\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container  popmake-1906 vc_btn3-center\" ><a class=\"vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-classic vc_btn3-color-blue\" href=\"#\" title=\"Na Kontaktoni\">Na Kontaktoni<\/a><\/div><\/div><\/div><\/div><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home. The work force will likely double this year as more employers see the benefits of remote work.<\/p>","protected":false},"author":3,"featured_media":3995,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"video","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[88,118],"tags":[],"class_list":["post-3978","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-cyber-security","category-cyber-security-horror-stories","post_format-post-format-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Behind the hack: See how easily your business can be hacked | DSS Management Inc.<\/title>\n<meta name=\"description\" content=\"Video calls like Zoom, Microsoft Teams, and Google Meet are here to stay for the long haul. Improve your video calls with these minor tweaks.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"sq_AL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Behind the hack: See how easily your business can be hacked | DSS Management Inc.\" \/>\n<meta property=\"og:description\" content=\"Video calls like Zoom, Microsoft Teams, and Google Meet are here to stay for the long haul. Improve your video calls with these minor tweaks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dssitservices.com\/sq\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"DSS - IT &amp; Cyber Security Management\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DSSIT\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T12:47:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T13:18:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/04\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dashmir\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dashmir\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/\"},\"author\":{\"name\":\"Dashmir\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\"},\"headline\":\"Behind the hack: See how easily your business can be hacked\",\"datePublished\":\"2021-04-26T12:47:43+00:00\",\"dateModified\":\"2021-04-26T13:18:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/\"},\"wordCount\":459,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png\",\"articleSection\":[\"Cyber Security\",\"Cyber Security Horror Stories\"],\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/\",\"name\":\"Behind the hack: See how easily your business can be hacked | DSS Management Inc.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png\",\"datePublished\":\"2021-04-26T12:47:43+00:00\",\"dateModified\":\"2021-04-26T13:18:29+00:00\",\"description\":\"Video calls like Zoom, Microsoft Teams, and Google Meet are here to stay for the long haul. Improve your video calls with these minor tweaks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#breadcrumb\"},\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/behind-the-hack-see-how-easily-your-business-can-be-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dssitservices.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Behind the hack: See how easily your business can be hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"name\":\"DSS - IT & Cyber Security Management\",\"description\":\"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dssitservices.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sq\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\",\"name\":\"DSS Management Inc\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"width\":297,\"height\":100,\"caption\":\"DSS Management Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DSSIT\",\"https:\\\/\\\/www.instagram.com\\\/dssit\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dssitinc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUfIRO4HxMQ2vLpza29n0Vg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\",\"name\":\"Dashmir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"caption\":\"Dashmir\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Behind the hack: See how easily your business can be hacked | DSS Management Inc.","description":"Video calls like Zoom, Microsoft Teams, and Google Meet are here to stay for the long haul. Improve your video calls with these minor tweaks.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"sq_AL","og_type":"article","og_title":"Behind the hack: See how easily your business can be hacked | DSS Management Inc.","og_description":"Video calls like Zoom, Microsoft Teams, and Google Meet are here to stay for the long haul. Improve your video calls with these minor tweaks.","og_url":"https:\/\/www.dssitservices.com\/sq\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/","og_site_name":"DSS - IT &amp; Cyber Security Management","article_publisher":"https:\/\/www.facebook.com\/DSSIT","article_published_time":"2021-04-26T12:47:43+00:00","article_modified_time":"2021-04-26T13:18:29+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/04\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png","type":"image\/png"}],"author":"Dashmir","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dashmir","Est. reading time":"2 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#article","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/"},"author":{"name":"Dashmir","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778"},"headline":"Behind the hack: See how easily your business can be hacked","datePublished":"2021-04-26T12:47:43+00:00","dateModified":"2021-04-26T13:18:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/"},"wordCount":459,"commentCount":0,"publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/04\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png","articleSection":["Cyber Security","Cyber Security Horror Stories"],"inLanguage":"sq","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/","url":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/","name":"Behind the hack: See how easily your business can be hacked | DSS Management Inc.","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/04\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png","datePublished":"2021-04-26T12:47:43+00:00","dateModified":"2021-04-26T13:18:29+00:00","description":"Video calls like Zoom, Microsoft Teams, and Google Meet are here to stay for the long haul. Improve your video calls with these minor tweaks.","breadcrumb":{"@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#breadcrumb"},"inLanguage":"sq","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#primaryimage","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/04\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/04\/4BD8DBE5-6D04-4246-B956-9F2DC6E7725F.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.dssitservices.com\/blog\/behind-the-hack-see-how-easily-your-business-can-be-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dssitservices.com\/"},{"@type":"ListItem","position":2,"name":"Behind the hack: See how easily your business can be hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.dssitservices.com\/#website","url":"https:\/\/www.dssitservices.com\/","name":"DSS - IT & Cyber Security Management","description":"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.","publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dssitservices.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sq"},{"@type":"Organization","@id":"https:\/\/www.dssitservices.com\/#organization","name":"DSS Management Inc","url":"https:\/\/www.dssitservices.com\/","logo":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","width":297,"height":100,"caption":"DSS Management Inc"},"image":{"@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DSSIT","https:\/\/www.instagram.com\/dssit\/","https:\/\/www.linkedin.com\/company\/dssitinc\/","https:\/\/www.youtube.com\/channel\/UCUfIRO4HxMQ2vLpza29n0Vg"]},{"@type":"Person","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778","name":"Dashmir","image":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","caption":"Dashmir"}}]}},"_links":{"self":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/3978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/comments?post=3978"}],"version-history":[{"count":0,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/3978\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media\/3995"}],"wp:attachment":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media?parent=3978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/categories?post=3978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/tags?post=3978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}