{"id":50479,"date":"2024-07-19T11:15:43","date_gmt":"2024-07-19T15:15:43","guid":{"rendered":"https:\/\/www.arffinancial.com\/development\/?p=50479"},"modified":"2024-07-31T13:23:28","modified_gmt":"2024-07-31T17:23:28","slug":"the-att-data-breach-and-what-small-businesses-can-learn","status":"publish","type":"post","link":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/","title":{"rendered":"The AT&#038;T Data Breach and What Small Businesses Can Learn"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_single_image image=&#8221;50480&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Data breaches have become an unfortunate reality in today&#8217;s digital world, and no one is immune\u2014not even giants like AT&amp;T. In April 2024, AT&amp;T learned of a significant data breach that impacted more than 100 million current and former customers. For small business owners, this incident provides invaluable lessons on the importance of robust cybersecurity measures.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">In this blog post, we&#8217;ll examine how the AT&amp;T data breach happened, its aftermath, and, most importantly, what small businesses can do to protect themselves from similar threats. By the end, you&#8217;ll understand why cybersecurity isn&#8217;t just a concern for large corporations but a necessity for businesses of all sizes.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Understanding the AT&amp;T Cybersecurity Breach<\/h2>\n<div>\n<div class=\"b68a3856 a1497183\">\n<div class=\"f21e64f1 b5823c44 cdde21c0\">\n<p>AT&amp;T was made aware that hackers had breached a third party cloud platform they used to store data. Their <a href=\"https:\/\/about.att.com\/story\/2024\/addressing-illegal-download.html\">press release<\/a> noted the stolen data included files containing AT&amp;T records of calls and texts of nearly all of AT&amp;T\u2019s cellular customers, customers of mobile virtual network operators (MVNOs) using AT&amp;T\u2019s wireless network, as well as AT&amp;T\u2019s landline customers who interacted with those cellular numbers between May 1, 2022 &#8211; October 31, 2022. The compromised data also includes records from January 2, 2023, for a very small number of customers. The records identify the telephone numbers an AT&amp;T or MVNO cellular number interacted with during these periods. For a subset of records, one or more cell site identification number(s) associated with the interactions are also included.<\/p>\n<p>The company also noted this data did not include any personally identifiable information such as social security numbers, birth dates, addresses and customer names. AT&amp;T confirmed they paid $370,000 to the hacker to delete the data who provided video proof of their deleting the data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">AT&amp;T has since closed off the illegal access point on their third party cloud platform. They also reset all customer passwords and offered credit monitoring subscriptions to affected customers. However, the fallout of this breach has triggered class-action lawsuits against the company for failing to adequately protect customer data.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">The Importance of Cybersecurity for Small Businesses<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">You might think your small business isn&#8217;t a target for cybercriminals, but that&#8217;s a dangerous misconception. Small businesses are particularly vulnerable because they often lack the resources and robust security measures that larger companies have. Cybercriminals see small businesses as easy targets, making it crucial to invest in cybersecurity.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">A data breach can have devastating effects on a small business, including financial losses, legal repercussions, and a damaged reputation. Unlike large corporations, small businesses may find it challenging to recover from such incidents. Therefore, understanding and implementing solid cybersecurity practices is not just advisable but necessary.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Proactive Monitoring and Threat Detection<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">One of the key lessons from the AT&amp;T breach is the importance of proactive monitoring and threat detection. <a href=\"https:\/\/www.arffinancial.com\/development\/interest-only-bankroll-revolving\/?utm_source=SocialMedia&amp;utm_medium=LinkedIn&amp;utm_term=Blog&amp;utm_content=ATTDataBreach07192024&amp;utm_campaign=ATTDataBreach07192024\">Investing<\/a> in advanced monitoring tools that can continuously scan your network for potential threats, will allow you to detect and respond to incidents before they escalate. This can make a significant difference in preventing a minor issue from becoming a major catastrophe.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Proactive monitoring involves employing automated systems that use machine learning and artificial intelligence to identify unusual activities within your network. By catching these anomalies early, you can take immediate action to mitigate potential risks.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Data Encryption and Secure Communication<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Data encryption is another critical aspect of cybersecurity. Encryption ensures that sensitive data is protected both in transit and at rest, making it much more difficult for cybercriminals to access. Secure communication channels also play a vital role in safeguarding information exchanged between your business and its clients.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Implementing strong encryption protocols can help protect your data from being intercepted or stolen during transmission. This is especially important for small businesses that handle customer information, financial transactions, or proprietary data.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Employee Training and Awareness<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Cybersecurity isn&#8217;t just about technology; it&#8217;s also about people. One of the most effective ways to protect your business is through employee training and awareness programs. Educating your staff about common cyber threats and how to recognize them can go a long way in preventing breaches.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Employees should be trained on best practices for password management, recognizing phishing emails, and safely handling sensitive information. Regular training sessions can help keep cybersecurity top of mind and reduce the risk of human error compromising your defenses.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Regular Security Audits and Assessments<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Conducting regular security audits and assessments can help identify vulnerabilities in your systems and provide actionable recommendations to mitigate risks. These audits can uncover weaknesses that you may not be aware of, allowing you to address them before they can be exploited by cybercriminals.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Security audits should be thorough and cover all aspects of your IT infrastructure, including software, hardware, and network configurations. Regular assessments can help ensure that your security measures are up to date and effective.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Incident Response and Recovery<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Even with the best security measures in place, breaches can still occur. That&#8217;s why having an incident response plan is critical. An incident response team can act swiftly to contain the threat and minimize damage. They can also assist with recovery and restoration of affected systems.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Your incident response plan should outline the steps to take in the event of a breach, including how to identify the source of the attack, contain it, and recover lost data. Having a well-defined plan can help your business respond quickly and effectively to minimize the impact of a breach.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Compliance and Regulatory Support<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Ensuring your business complies with relevant cybersecurity regulations and standards can reduce the risk of legal issues and penalties. Regulatory compliance is not only a legal requirement but also a best practice for maintaining a secure environment.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Different industries have specific regulations that govern data protection and cybersecurity practices. Staying informed about these requirements and ensuring compliance can help protect your business from potential fines and legal actions.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Lessons Learned from AT&amp;T<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">The AT&amp;T breach serves as a wake-up call for businesses of all sizes. It highlights the importance of taking proactive measures to protect data and systems. Small businesses must recognize that they are not immune to cyber threats and take steps to safeguard their operations.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">By implementing the lessons learned from the AT&amp;T breach, you can significantly improve your business&#8217;s cybersecurity posture. From proactive monitoring and data encryption to employee training and incident response planning, there are several strategies you can use to protect your business.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Partnering with Cybersecurity Experts<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Partnering with cybersecurity experts can provide your business with the knowledge and resources needed to defend against cyber threats. Experts can help assess your current security measures, identify vulnerabilities, and develop a comprehensive cybersecurity strategy.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Cybersecurity experts can also provide ongoing support and monitoring to ensure your systems remain secure. Their expertise can help your business stay ahead of evolving threats and maintain a strong defense against cyberattacks.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Building a Culture of Security<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Creating a culture of security within your organization is essential for maintaining a strong cybersecurity posture. This involves promoting awareness and accountability at all levels of the business. Encourage employees to take an active role in protecting your business&#8217;s data and systems.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">A culture of security can be fostered through regular training, clear communication of security policies, and recognition of employees who demonstrate good cybersecurity practices. By making security a priority, you can create an environment where everyone is invested in protecting your business.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">The Future of Cybersecurity for Small Businesses<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">As cyber threats continue to evolve, small businesses must stay vigilant and proactive in their approach to cybersecurity. Investing in advanced technologies, staying informed about emerging threats, and continuously improving security measures will be key to staying protected.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">The future of cybersecurity will likely involve greater integration of artificial intelligence and machine learning to detect and respond to threats more effectively. Small businesses that adopt these technologies will be better positioned to defend against sophisticated cyberattacks.<\/p>\n<h2 class=\"font-bold text-h3 leading-[36px] pt-[21px] pb-[2px] [&amp;_a]:underline-offset-[6px] [&amp;_.underline]:underline-offset-[6px]\" dir=\"ltr\">Conclusion<\/h2>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">The AT&amp;T data breach serves as a crucial lesson for small businesses on the importance of cybersecurity. By understanding the risks and implementing robust security measures, you can protect your business from the growing threat of cyberattacks.<\/p>\n<p class=\"text-body font-regular leading-[24px] pt-[9px] pb-[2px]\" dir=\"ltr\">Take action today to safeguard your business&#8217;s data, reputation, and financial stability. By <a href=\"https:\/\/www.arffinancial.com\/development\/interest-only-bankroll-revolving\/?utm_source=SocialMedia&amp;utm_medium=LinkedIn&amp;utm_term=Blog&amp;utm_content=ATTDataBreach07192024&amp;utm_campaign=ATTDataBreach07192024\">investing<\/a> in cybersecurity, you can ensure that your business remains resilient in the face of evolving threats.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<span style=\"font-size: 13px; line-height: 15px;\">Your privacy is important to us. ARF Financial will never sell or rent your information to any third party.\u00a0<a href=\"https:\/\/www.arffinancial.com\/development\/privacy\/?utm_source=Outbrain&amp;utm_medium=OutbrainBlog&amp;utm_term=Outbrain&amp;utm_content=GoingGreen&amp;utm_campaign=GoingGreen\">Click here<\/a> for more information about our privacy policy. <a href=\"https:\/\/www.freepik.com\/free-photo\/security-breach-hacker-cyber-crime-privacy-policy-concept_16441845.htm#fromView=search&amp;page=1&amp;position=26&amp;uuid=d14f7c9d-9926-47fa-a3bb-871def3cae3b\" class=\"broken_link\">Image by rawpixel.com on Freepik<\/a><\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_single_image image=&#8221;50480&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Data breaches have become an unfortunate&#8230;<\/p>\n","protected":false},"author":5,"featured_media":50480,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[698],"tags":[398,402,400,399,443,386,535,220,213,401,224,222,172,226,307,1178,1296,142],"class_list":{"0":"post-50479","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-small-business-financing","8":"tag-affordable-business-loans","9":"tag-affordable-small-business-growth","10":"tag-business-expansion","11":"tag-business-growth","12":"tag-business-line-of-credit","13":"tag-business-loans","14":"tag-equipment-leasing","15":"tag-flex-pay-loans","16":"tag-line-of-credit","17":"tag-small-business-expansion","18":"tag-small-business-financing","19":"tag-small-business-funding","20":"tag-small-business-growth","21":"tag-small-business-loans","22":"tag-small-business-operations","23":"tag-small-business-owners","24":"tag-the-att-data-breach-and-what-small-businesses-can-learn","25":"tag-working-capital"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The AT&amp;T Data Breach and What Small Businesses Can Learn - ARF Financial<\/title>\n<meta name=\"description\" content=\"The AT&amp;T Data Breach and What Small Businesses Can Learn\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The AT&amp;T Data Breach and What Small Businesses Can Learn - ARF Financial\" \/>\n<meta property=\"og:description\" content=\"The AT&amp;T Data Breach and What Small Businesses Can Learn\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\" \/>\n<meta property=\"og:site_name\" content=\"ARF Financial\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-19T15:15:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-31T17:23:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Whited\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Whited\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\"},\"author\":{\"name\":\"Robert Whited\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/#\/schema\/person\/ab727372fcd4ff548d759472b7c7fecc\"},\"headline\":\"The AT&#038;T Data Breach and What Small Businesses Can Learn\",\"datePublished\":\"2024-07-19T15:15:43+00:00\",\"dateModified\":\"2024-07-31T17:23:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\"},\"wordCount\":1482,\"publisher\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg\",\"keywords\":[\"affordable business loans\",\"affordable small business growth\",\"business expansion\",\"business growth\",\"business line of credit\",\"business loans\",\"equipment leasing\",\"flex pay loans\",\"line of credit\",\"small business expansion\",\"small business financing\",\"small business funding\",\"small business growth\",\"small business loans\",\"small business operations\",\"small business owners\",\"The AT&amp;T Data Breach and What Small Businesses Can Learn\",\"working capital\"],\"articleSection\":[\"Small Business Financing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\",\"url\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\",\"name\":\"The AT&T Data Breach and What Small Businesses Can Learn - ARF Financial\",\"isPartOf\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg\",\"datePublished\":\"2024-07-19T15:15:43+00:00\",\"dateModified\":\"2024-07-31T17:23:28+00:00\",\"description\":\"The AT&T Data Breach and What Small Businesses Can Learn\",\"breadcrumb\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage\",\"url\":\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg\",\"contentUrl\":\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg\",\"width\":920,\"height\":420,\"caption\":\"The AT&T Data Breach and What Small Businesses Can Learn\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.arffinancial.com\/development\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The AT&#038;T Data Breach and What Small Businesses Can Learn\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/#website\",\"url\":\"https:\/\/www.arffinancial.com\/development\/\",\"name\":\"ARF Financial\",\"description\":\"Businesses Bank on Us\",\"publisher\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arffinancial.com\/development\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/#organization\",\"name\":\"ARF Financial LLC\",\"url\":\"https:\/\/www.arffinancial.com\/development\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2018\/06\/ARFFinancialHorizontal.png\",\"contentUrl\":\"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2018\/06\/ARFFinancialHorizontal.png\",\"width\":792,\"height\":612,\"caption\":\"ARF Financial LLC\"},\"image\":{\"@id\":\"https:\/\/www.arffinancial.com\/development\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/#\/schema\/person\/ab727372fcd4ff548d759472b7c7fecc\",\"name\":\"Robert Whited\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arffinancial.com\/development\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c48be6a0ddfcae4b85fd444fdab27d247b8fef19292a5249b0340af7e31ea9a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c48be6a0ddfcae4b85fd444fdab27d247b8fef19292a5249b0340af7e31ea9a5?s=96&d=mm&r=g\",\"caption\":\"Robert Whited\"},\"url\":\"https:\/\/www.arffinancial.com\/development\/author\/robert\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The AT&T Data Breach and What Small Businesses Can Learn - ARF Financial","description":"The AT&T Data Breach and What Small Businesses Can Learn","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/","og_locale":"en_US","og_type":"article","og_title":"The AT&T Data Breach and What Small Businesses Can Learn - ARF Financial","og_description":"The AT&T Data Breach and What Small Businesses Can Learn","og_url":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/","og_site_name":"ARF Financial","article_published_time":"2024-07-19T15:15:43+00:00","article_modified_time":"2024-07-31T17:23:28+00:00","og_image":[{"width":920,"height":420,"url":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg","type":"image\/jpeg"}],"author":"Robert Whited","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Robert Whited","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#article","isPartOf":{"@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/"},"author":{"name":"Robert Whited","@id":"https:\/\/www.arffinancial.com\/development\/#\/schema\/person\/ab727372fcd4ff548d759472b7c7fecc"},"headline":"The AT&#038;T Data Breach and What Small Businesses Can Learn","datePublished":"2024-07-19T15:15:43+00:00","dateModified":"2024-07-31T17:23:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/"},"wordCount":1482,"publisher":{"@id":"https:\/\/www.arffinancial.com\/development\/#organization"},"image":{"@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg","keywords":["affordable business loans","affordable small business growth","business expansion","business growth","business line of credit","business loans","equipment leasing","flex pay loans","line of credit","small business expansion","small business financing","small business funding","small business growth","small business loans","small business operations","small business owners","The AT&amp;T Data Breach and What Small Businesses Can Learn","working capital"],"articleSection":["Small Business Financing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/","url":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/","name":"The AT&T Data Breach and What Small Businesses Can Learn - ARF Financial","isPartOf":{"@id":"https:\/\/www.arffinancial.com\/development\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage"},"image":{"@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg","datePublished":"2024-07-19T15:15:43+00:00","dateModified":"2024-07-31T17:23:28+00:00","description":"The AT&T Data Breach and What Small Businesses Can Learn","breadcrumb":{"@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#primaryimage","url":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg","contentUrl":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2024\/07\/ARF-Blog-07192024.jpg","width":920,"height":420,"caption":"The AT&T Data Breach and What Small Businesses Can Learn"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arffinancial.com\/development\/the-att-data-breach-and-what-small-businesses-can-learn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.arffinancial.com\/development\/"},{"@type":"ListItem","position":2,"name":"The AT&#038;T Data Breach and What Small Businesses Can Learn"}]},{"@type":"WebSite","@id":"https:\/\/www.arffinancial.com\/development\/#website","url":"https:\/\/www.arffinancial.com\/development\/","name":"ARF Financial","description":"Businesses Bank on Us","publisher":{"@id":"https:\/\/www.arffinancial.com\/development\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arffinancial.com\/development\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arffinancial.com\/development\/#organization","name":"ARF Financial LLC","url":"https:\/\/www.arffinancial.com\/development\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arffinancial.com\/development\/#\/schema\/logo\/image\/","url":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2018\/06\/ARFFinancialHorizontal.png","contentUrl":"https:\/\/www.arffinancial.com\/development\/wp-content\/uploads\/2018\/06\/ARFFinancialHorizontal.png","width":792,"height":612,"caption":"ARF Financial LLC"},"image":{"@id":"https:\/\/www.arffinancial.com\/development\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.arffinancial.com\/development\/#\/schema\/person\/ab727372fcd4ff548d759472b7c7fecc","name":"Robert Whited","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arffinancial.com\/development\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c48be6a0ddfcae4b85fd444fdab27d247b8fef19292a5249b0340af7e31ea9a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c48be6a0ddfcae4b85fd444fdab27d247b8fef19292a5249b0340af7e31ea9a5?s=96&d=mm&r=g","caption":"Robert Whited"},"url":"https:\/\/www.arffinancial.com\/development\/author\/robert\/"}]}},"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/posts\/50479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/comments?post=50479"}],"version-history":[{"count":4,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/posts\/50479\/revisions"}],"predecessor-version":[{"id":50596,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/posts\/50479\/revisions\/50596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/media\/50480"}],"wp:attachment":[{"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/media?parent=50479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/categories?post=50479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arffinancial.com\/development\/wp-json\/wp\/v2\/tags?post=50479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}