{"type":"document","data":{"id":"4a78b88a-aec9-43d3-a57b-e3b402e667ad","localeString":"en-GB","publishDate":"2023-09-07T15:12:34.713+02:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Keep your business data under lock and key away from cybercriminals."},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"Data protection","subtitle":"Keep your business data under lock and key away from cybercriminals."},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"Secure business"}},"date":"2023-08-16","readingTime":5},"flexZone":{"flexComponents":[{"componentType":"paragraph","richBody":{"value":"<p></p>"},"alignedImage":{"position":"top","transformBaseUrl":"https://assets.ing.com/transform/fc9603fa-80b2-4d1b-9354-9c1992ff3eb9/Teenage-girl-playfully-opens-locked-door-and-hides-behind-it","altTextEN":"\"","altTextNL":"\"","altTextFR":"\"","altTextDE":"\"","original":"https://assets.ing.com/m/68957aad44d2466e/original/Teenage-girl-playfully-opens-locked-door-and-hides-behind-it.jpg","extension":"jpg"}},{"componentType":"sectionTitle","title":"Secure your LinkedIn account"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span><span>LinkedIn is a fantastic social network for professional use. However, it is also a source of information for cybercriminals and a means of getting in touch with you without drawing your attention to the fraudulent nature of the conversation. Keep in mind that LinkedIn is the most common source of information used by hackers to prepare an attack on a company.</span></span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/protect-your-linkedin","text":"Tips for protecting access to your LinkedIn account"}]},{"componentType":"sectionTitle","title":"E-mailing without regrets"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span>Know the risks to your confidential data when sending e-mails. Stay level-headed!</span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/email-and-security","text":"Tips for ensuring confidentiality"}]},{"componentType":"sectionTitle","title":"A strong password and two-factor authentication"},{"componentType":"paragraph","richBody":{"value":"<p>Passwords are every company&apos;s first line of defence against cyber-attacks. However, weak or poorly chosen passwords can be easily compromised by cyber criminals. Two-factor authentication (2FA) is an additional security measure that adds a layer of protection to your online accounts. </p>"},"textLinks":[{"url":"/en/business/news/secure-business/passwords-and-mfa-for-business","text":"How to put these security measures in place"}]},{"componentType":"sectionTitle","title":"Use the cloud safely"},{"componentType":"paragraph","richBody":{"value":"<p><span><span><span><span><span><span><span>The cloud is a service that allows you to easily store and manage information. This saves you a lot of time, but its use is not entirely without risk. So, it’s essential to choose your cloud storage service well and to secure your use.</span></span></span></span></span></span></span></p>"},"textLinks":[{"url":"/en/business/news/secure-business/cloud-and-security","text":"4 tips to protect yourself"}]}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting!"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Learn how to keep your business safe","body":"Don’t get taken hostage by cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/29a371fd-c819-403d-a7ae-3bac05a29854/Large_MS-PPT_Web-Dusk-shot-of-railway-tracks-and-signals-leading-off-into-the-distance","type":"image","width":1920,"original":"https://assets.ing.com/m/1f344e19bf9a57ce/original/Large_MS-PPT_Web-Dusk-shot-of-railway-tracks-and-signals-leading-off-into-the-distance.jpg","extension":"jpg"},"date":"2023-05-10","link":{"url":"/en/business/news/secure-business/i-protect-my-business"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Financial fraud","body":"Our experts’ advice on protecting your company's funds","image":{"transformBaseUrl":"https://assets.ing.com/transform/216e65cf-c100-4d8d-849b-b7752ebe75d3/Female-nurse-inputing-medical-data-into-computer","type":"image","width":5700,"altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/7fc7c6c460b89a3d/original/Female-nurse-inputing-medical-data-into-computer.jpg","extension":"jpg"},"date":"2023-08-09","link":{"url":"/en/business/news/secure-business/financial-fraud-business"}}]}]}}}