{"id":6455,"date":"2020-10-01T10:33:05","date_gmt":"2020-10-01T10:33:05","guid":{"rendered":"https:\/\/cybersmart.com\/?p=6455"},"modified":"2021-09-28T10:59:44","modified_gmt":"2021-09-28T10:59:44","slug":"does-5g-pose-a-cybersecurity-threat-to-smes","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/","title":{"rendered":"Does 5G pose a cybersecurity threat to SMEs?"},"content":{"rendered":"

The fifth generation of wireless technology, or 5G, promises many things. But beyond grandiose pledges of hyper-connected living, <\/span>truly scalable virtual reality<\/span><\/a>, and a new golden age for business, 5G\u2019s rollout has been far from smooth. <\/span>
\n<\/span>
\n<\/span>Unless you\u2019ve (wisely) been consciously ignoring the news, it\u2019s hard to miss the furore surrounding 5G. First, came <\/span>
British 5G towers being pulled down and set on fire<\/span><\/a> due to COVID-19 conspiracy theories. Next, the <\/span>UK\u2019s decision to ban Chinese firm Huawei <\/span><\/a>from its 5G network. Then, <\/span>a backlash from environmental activists<\/span><\/a> lamenting 5G\u2019s potential footprint.\u00a0<\/span><\/p>\n

But away from the big headline stories, there\u2019s another side to 5G. It\u2019s a potential gamechanger for small businesses.\u00a0<\/span><\/p>\n

What benefits does 5G offer to small businesses?\u00a0<\/b><\/h3>\n

5G provides a host of benefits to small businesses, ranging from the simple to the fantastical.\u00a0<\/span><\/p>\n

Speed<\/b><\/h4>\n

5G networks are engineered to be fast. Really fast. The most transformative part of 5G is its ability to reduce the time (or \u2018latency\u2019 if you prefer the techy term) it takes for data to get from one point to another. 5G promises speeds <\/span>up to seven times faster <\/span><\/a>than the fastest 4G browsing experience.\u00a0<\/span><\/p>\n

For small businesses, this could improve everything from communication with customers to remote working to video conferencing.\u00a0<\/span><\/p>\n

Smart offices<\/b><\/h4>\n

The term \u2018smart office\u2019 was all the rage a couple of years ago. We were promised a world of self-booking meeting rooms, automated energy controls and desk-monitoring software. The theory went that this would usher in a new era of happy, engaged employees, optimised office spaces,\u00a0 and reduced real estate costs.\u00a0<\/span><\/p>\n

However, at the time, the technology to truly automate the office environment wasn\u2019t quite there. With 5G, that\u2019s all about to change. The availability of superfast internet could finally make smart offices available, for very little cost, even to small businesses.\u00a0<\/span><\/p>\n

Looking to improve cybersecurity in your business? Start by getting Cyber Essentials certified.\u00a0<\/a><\/h3>\n

Real-time communication<\/b><\/h4>\n

5G\u2019s low latency could transform the way businesses communicate. Imagine a world in which your interactions with customers, staff and employees took place instantly, wherever they are in the world.\u00a0<\/span><\/p>\n

No more waiting for emails to come through. Files uploaded to shared drives in seconds. And, video conferencing that doesn\u2019t freeze every five minutes. That\u2019s the future 5G promises.\u00a0<\/span><\/p>\n

Remote working\u00a0<\/b><\/h4>\n

Unless you live in Sweden or have been extremely lucky, chances are you\u2019re reading this at home. Most businesses have had to learn how to work remotely in the last six months. And, for the most part, we\u2019ve all adapted well.\u00a0<\/span><\/p>\n

However, we\u2019re all familiar with the problems working from home presents. How well you\u2019re able to work remotely largely depends on the quality of your internet connection. The additional capacity and speeds 5G offers could change this. Instead of playing the postcode lottery, employees will be able to access high speeds and low latency in even the worst internet black spots.\u00a0<\/span><\/p>\n

IoT<\/b><\/h4>\n

The internet of things (IoT) is another term you\u2019ll have heard a lot in the last few years. But beyond many of us using voice-controlled devices in our homes, it\u2019s yet to really take off.\u00a0<\/span><\/p>\n

5G\u2019s improved connectivity will allow businesses to link up everything from printers and smartphones to office monitoring software. <\/span>
\n<\/span><\/p>\n

The bottom line<\/b><\/h4>\n

In short, 5G will make small businesses more efficient, extending their ability to do more with fewer resources and in less time. And this won\u2019t just save costs, it\u2019ll also improve customer experience and boost revenue as a result.\u00a0<\/span><\/p>\n

What risks does bring 5G bring for SMEs?\u00a0<\/b><\/h3>\n

Unfortunately, the benefits of 5G apply to cybercriminals as much as they do businesses.\u00a0<\/span><\/p>\n

More attacks\u00a0<\/b><\/h4>\n

Although stronger, faster connections are a boon for small businesses, the same is true for cybercriminals. As businesses use 5G as a platform to innovate, so will the bad guys. 5G provides a better tool to launch sophisticated cyberattacks faster, more efficiently, and in greater numbers.\u00a0<\/span><\/p>\n

More opportunities for cybercriminals\u00a0<\/b><\/h4>\n

5G enables greater use of IoT devices. And this will have huge benefits for small businesses. <\/span><\/p>\n

Gartner predicts<\/span><\/a> that there will be 20.4 billion IoT devices in use globally by the end of this year \u2013 just in time for the widespread launch of 5G.\u00a0<\/span><\/p><\/blockquote>\n

However, with more connected devices, comes more opportunities for the bad guys to break in. It only takes one poorly secured device for cybercriminals to find their way in. And, while it\u2019s always been the case that one weak link is enough, IoT devices increase the risk simply because there are so many of them.<\/span><\/p>\n

Decentralisation could lead to disruption<\/b>\u00a0<\/span><\/h4>\n

This risk is a little more complex, so bear with us while we run through a short history lesson on network security.\u00a0<\/span><\/p>\n

Traditionally, networks were hub and spoke designs. Essentially, everything flowing through a network eventually came back to the central hub, usually a data centre. This made practising good cyber hygiene pretty simple, as you could protect everything from this central point.<\/span><\/p>\n

With 5G, these \u2018hubs\u2019 are decentralised to a web of digital routers throughout the network. This means that there isn\u2019t a central point where everything can be checked and cybersecurity protocols put in place. Instead, this needs to be done throughout the network, upping the chances security will be overlooked and cybercriminals given a route in.\u00a0<\/span><\/p>\n

What should you do to protect your business?\u00a0<\/b><\/h3>\n

Although some of the risks we\u2019ve outlined above are the responsibility of internet service providers, you should never rely on secondhand security alone. There are plenty of things you can do to ensure your business reaps the rewards of switching to 5G, without exposing it to greater risks.\u00a0<\/span><\/p>\n

Check the right security is in place\u00a0<\/b><\/h4>\n

Run regular checks to ensure every device used in your business is equipped with the best security capabilities. This includes any IoT devices you\u2019re using such as voice assistants or smart printers. Tools like <\/span>CyberSmart Active Protect<\/span><\/a>\u00a0can help automate this process, by running a scan of all devices every 15 mins.\u00a0<\/span><\/p>\n

Make sure software is up to date<\/b><\/h4>\n

No one likes running software or operating system updates, but it is important. Often software providers will include patches to fix known vulnerabilities in updates, protecting you against new cyber threats. Ensure all software is configured to update automatically across all company devices or perform regular checks.\u00a0<\/span><\/p>\n

Get Cyber Essentials certified\u00a0<\/b><\/h4>\n

According to a <\/span>report from Lancaster University<\/span>, the measures laid out by the UK government\u2019s Cyber Essentials (CE) scheme can mitigate 98.5% of cybersecurity risks. If you\u2019re not already CE certified, following the process will help you build a great base level of security before you make the jump to 5G.\u00a0<\/span><\/p>\n

Maintain good password hygiene<\/b><\/h4>\n

We say it a lot, but setting up a password policy and ensuring everyone follows is a vital step. Always use complex passwords, change them regularly, and set up two-factor authentication,\u00a0<\/span><\/p>\n

Clear security policies\u00a0<\/b><\/h4>\n

If you don\u2019t have a security policy in place for 5G and the use of IoT, now\u2019s the time. But it\u2019s not enough just to have a security policy in place, your people also need to understand it. Check all security policies for workers are clear, easy to follow and stored in a central location everyone can access.\u00a0<\/span><\/p>\n

5G is here. In less than four years time <\/span>one billion devices will rely on it<\/span><\/a>, and your business will very likely contain some of them. Of course, this brings risks. But the bad shouldn\u2019t outweigh the good. By adopting a policy for 5G early and establishing simple, but effective security protocols you can make sure your business is primed to ride the next great wave of connectivity.\u00a0<\/span><\/p>\n

 <\/p>\n

Looking to improve your cybersecurity but not sure where to begin? Start by getting certified in <\/span>Cyber Essentials<\/span><\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/span><\/p>\n

\"CTA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The fifth generation of wireless technology, or 5G, promises many things. But beyond grandiose pledges of hyper-connected living, truly scalable virtual reality, and a new golden age for business, 5G\u2019s…<\/p>\n","protected":false},"author":8,"featured_media":6456,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,88,11],"tags":[186,9,83,12,171,32,101,16],"yoast_head":"\nDoes 5G pose a cybersecurity threat to SMEs? - CyberSmart<\/title>\n<meta name=\"description\" content=\"Beyond the headlines, there's a real conversation to be had about 5G. What are the benefits it offers SMEs? And what are the risks?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does 5G pose a cybersecurity threat to SMEs? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"Beyond the headlines, there's a real conversation to be had about 5G. What are the benefits it offers SMEs? And what are the risks?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-01T10:33:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-28T10:59:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"885\" \/>\n\t<meta property=\"og:image:height\" content=\"397\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob S\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob S\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\"},\"author\":{\"name\":\"Rob S\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\"},\"headline\":\"Does 5G pose a cybersecurity threat to SMEs?\",\"datePublished\":\"2020-10-01T10:33:05+00:00\",\"dateModified\":\"2021-09-28T10:59:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\"},\"wordCount\":1328,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg\",\"keywords\":[\"5G\",\"Cyber Essentials\",\"cybersecurity\",\"CyberSmart\",\"security policy\",\"Security Tips\",\"small business\",\"SMEs\"],\"articleSection\":[\"Blog\",\"Business resilience\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\",\"name\":\"Does 5G pose a cybersecurity threat to SMEs? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg\",\"datePublished\":\"2020-10-01T10:33:05+00:00\",\"dateModified\":\"2021-09-28T10:59:44+00:00\",\"description\":\"Beyond the headlines, there's a real conversation to be had about 5G. What are the benefits it offers SMEs? And what are the risks?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg\",\"width\":885,\"height\":397,\"caption\":\"5G cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Does 5G pose a cybersecurity threat to SMEs?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff\",\"name\":\"Rob S\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g\",\"caption\":\"Rob S\"},\"url\":\"https:\/\/cybersmart.com\/author\/rob-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Does 5G pose a cybersecurity threat to SMEs? - CyberSmart","description":"Beyond the headlines, there's a real conversation to be had about 5G. What are the benefits it offers SMEs? And what are the risks?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/","og_locale":"en_US","og_type":"article","og_title":"Does 5G pose a cybersecurity threat to SMEs? - CyberSmart","og_description":"Beyond the headlines, there's a real conversation to be had about 5G. What are the benefits it offers SMEs? And what are the risks?","og_url":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2020-10-01T10:33:05+00:00","article_modified_time":"2021-09-28T10:59:44+00:00","og_image":[{"width":885,"height":397,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg","type":"image\/jpeg"}],"author":"Rob S","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Rob S","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/"},"author":{"name":"Rob S","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff"},"headline":"Does 5G pose a cybersecurity threat to SMEs?","datePublished":"2020-10-01T10:33:05+00:00","dateModified":"2021-09-28T10:59:44+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/"},"wordCount":1328,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg","keywords":["5G","Cyber Essentials","cybersecurity","CyberSmart","security policy","Security Tips","small business","SMEs"],"articleSection":["Blog","Business resilience","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/","url":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/","name":"Does 5G pose a cybersecurity threat to SMEs? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg","datePublished":"2020-10-01T10:33:05+00:00","dateModified":"2021-09-28T10:59:44+00:00","description":"Beyond the headlines, there's a real conversation to be had about 5G. What are the benefits it offers SMEs? And what are the risks?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/10\/Untitled-design-8.jpg","width":885,"height":397,"caption":"5G cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/does-5g-pose-a-cybersecurity-threat-to-smes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"Does 5G pose a cybersecurity threat to SMEs?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/594c076c19735505b2d038cab92930ff","name":"Rob S","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcfa8d7cae21a4ce57da35527b5aed80?s=96&d=mm&r=g","caption":"Rob S"},"url":"https:\/\/cybersmart.com\/author\/rob-s\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6455"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=6455"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6456"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=6455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=6455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=6455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}