{"id":67,"date":"2019-04-24T16:03:42","date_gmt":"2019-04-24T16:03:42","guid":{"rendered":"https:\/\/firwl.qantumthemes.xyz\/installer\/?p=67"},"modified":"2019-04-24T16:03:42","modified_gmt":"2019-04-24T16:03:42","slug":"news-article-11","status":"publish","type":"post","link":"https:\/\/pyramidcyber.com\/?p=67","title":{"rendered":"Mid-Market Businesses, Don\u2019t Think Small about Security"},"content":{"rendered":"<body>\n<p class=\"has-drop-cap\">Whether they are in route sales, pre-order,<strong> delivery or equipment service, <\/strong>many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">All the details<\/h3>\n\n\n\n<p>They want the <strong>data to be collected,<\/strong> shared and accessed across departments. They dream of an operational route accounting ERP software solution that facilitates the streaming and distribution of company-wide information on every <strong>desktop<\/strong> and mobile device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The gallery<\/h3>\n\n\n\n<ul class=\"wp-block-gallery columns-4 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2504-1170x781.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2504-1170x781.jpg\" alt=\"\" data-id=\"914\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-2504\/\" class=\"wp-image-914\" loading=\"lazy\"><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2157-1170x811.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2157-1170x811.jpg\" alt=\"\" data-id=\"913\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-2157\/\" class=\"wp-image-913\" loading=\"lazy\"><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-775-1170x949.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-775-1170x949.jpg\" alt=\"\" data-id=\"912\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-775\/\" class=\"wp-image-912\" loading=\"lazy\"><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-388-1170x658.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-388-1170x658.jpg\" alt=\"\" data-id=\"911\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-388\/\" class=\"wp-image-911\" loading=\"lazy\"><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-384-1170x781.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-384-1170x781.jpg\" alt=\"\" data-id=\"910\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-384\/\" class=\"wp-image-910\" loading=\"lazy\"><\/a><\/figure><\/li><\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.\u00a0 The point of using Lorem Ipsum is that it has a more-or-less normal distribution.<\/p><cite>John Doe<\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Scanning for vulnerabilities<\/h3>\n\n\n\n<p>\u00a0The point of using <strong>Lorem Ipsum <\/strong>is that it has a more-or-less normal distribution of letters, as opposed to using \u2018Content here, content here\u2019, making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for \u2018lorem ipsum\u2019 will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).<\/p>\n<\/body>","protected":false},"excerpt":{"rendered":"<p>Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an ...<\/p>\n","protected":false},"author":1,"featured_media":1350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[4],"tags":[8,9,10,11,12,13],"class_list":["post-67","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-cyber-security-alert","tag-internet","tag-ransomware","tag-security","tag-trojan","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mid-Market Businesses, Don\u2019t Think Small about Security - Pyramid Cyber Security &amp; Forensic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pyramidcyber.com\/?p=67\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mid-Market Businesses, Don\u2019t Think Small about Security - Pyramid Cyber Security &amp; Forensic\" \/>\n<meta property=\"og:description\" content=\"Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pyramidcyber.com\/?p=67\" \/>\n<meta property=\"og:site_name\" content=\"Pyramid Cyber Security &amp; Forensic\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-24T16:03:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/sspl20.com\/pyramid\/wp-content\/uploads\/2019\/04\/mobilenew.jpg?fit=1660%2C1248&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1660\" \/>\n\t<meta property=\"og:image:height\" content=\"1248\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pyramidin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pyramidin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67\"},\"author\":{\"name\":\"pyramidin\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#\\\/schema\\\/person\\\/fcec127e8b10d69baf26b499ff453bbe\"},\"headline\":\"Mid-Market Businesses, Don\u2019t Think Small about Security\",\"datePublished\":\"2019-04-24T16:03:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67\"},\"wordCount\":206,\"commentCount\":4,\"image\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pyramidcyber.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/mobilenew.jpg\",\"keywords\":[\"cyber security alert\",\"internet\",\"ransomware\",\"security\",\"trojan\",\"virus\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67\",\"url\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67\",\"name\":\"Mid-Market Businesses, Don\u2019t Think Small about Security - Pyramid Cyber Security &amp; Forensic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pyramidcyber.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/mobilenew.jpg\",\"datePublished\":\"2019-04-24T16:03:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#\\\/schema\\\/person\\\/fcec127e8b10d69baf26b499ff453bbe\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pyramidcyber.com\\\/?p=67\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#primaryimage\",\"url\":\"https:\\\/\\\/pyramidcyber.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/mobilenew.jpg\",\"contentUrl\":\"https:\\\/\\\/pyramidcyber.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/mobilenew.jpg\",\"width\":1660,\"height\":1248},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/?p=67#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pyramidcyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mid-Market Businesses, Don\u2019t Think Small about Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#website\",\"url\":\"https:\\\/\\\/pyramidcyber.com\\\/\",\"name\":\"Pyramid Cyber Security &amp; Forensic\",\"description\":\"NextGen Cyber Security &amp; Forensic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pyramidcyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pyramidcyber.com\\\/#\\\/schema\\\/person\\\/fcec127e8b10d69baf26b499ff453bbe\",\"name\":\"pyramidin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d5e24f70ca2b807bac1de13340b775fdc89e779104944bb69a2600a308a6289?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d5e24f70ca2b807bac1de13340b775fdc89e779104944bb69a2600a308a6289?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d5e24f70ca2b807bac1de13340b775fdc89e779104944bb69a2600a308a6289?s=96&d=mm&r=g\",\"caption\":\"pyramidin\"},\"sameAs\":[\"https:\\\/\\\/pyramidcyber.com\"],\"url\":\"https:\\\/\\\/pyramidcyber.com\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mid-Market Businesses, Don\u2019t Think Small about Security - Pyramid Cyber Security &amp; Forensic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pyramidcyber.com\/?p=67","og_locale":"en_US","og_type":"article","og_title":"Mid-Market Businesses, Don\u2019t Think Small about Security - Pyramid Cyber Security &amp; Forensic","og_description":"Whether they are in route sales, pre-order, delivery or equipment service, many companies want to consolidate their operational route accounting functions and activities into one seamless and efficient integrated software system. All the details They want the data to be collected, shared and accessed across departments. They dream of an [...]","og_url":"https:\/\/pyramidcyber.com\/?p=67","og_site_name":"Pyramid Cyber Security &amp; Forensic","article_published_time":"2019-04-24T16:03:42+00:00","og_image":[{"width":1660,"height":1248,"url":"https:\/\/i0.wp.com\/sspl20.com\/pyramid\/wp-content\/uploads\/2019\/04\/mobilenew.jpg?fit=1660%2C1248&ssl=1","type":"image\/jpeg"}],"author":"pyramidin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"pyramidin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pyramidcyber.com\/?p=67#article","isPartOf":{"@id":"https:\/\/pyramidcyber.com\/?p=67"},"author":{"name":"pyramidin","@id":"https:\/\/pyramidcyber.com\/#\/schema\/person\/fcec127e8b10d69baf26b499ff453bbe"},"headline":"Mid-Market Businesses, Don\u2019t Think Small about Security","datePublished":"2019-04-24T16:03:42+00:00","mainEntityOfPage":{"@id":"https:\/\/pyramidcyber.com\/?p=67"},"wordCount":206,"commentCount":4,"image":{"@id":"https:\/\/pyramidcyber.com\/?p=67#primaryimage"},"thumbnailUrl":"https:\/\/pyramidcyber.com\/wp-content\/uploads\/2019\/04\/mobilenew.jpg","keywords":["cyber security alert","internet","ransomware","security","trojan","virus"],"articleSection":["Cybercrime"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pyramidcyber.com\/?p=67#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pyramidcyber.com\/?p=67","url":"https:\/\/pyramidcyber.com\/?p=67","name":"Mid-Market Businesses, Don\u2019t Think Small about Security - Pyramid Cyber Security &amp; Forensic","isPartOf":{"@id":"https:\/\/pyramidcyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pyramidcyber.com\/?p=67#primaryimage"},"image":{"@id":"https:\/\/pyramidcyber.com\/?p=67#primaryimage"},"thumbnailUrl":"https:\/\/pyramidcyber.com\/wp-content\/uploads\/2019\/04\/mobilenew.jpg","datePublished":"2019-04-24T16:03:42+00:00","author":{"@id":"https:\/\/pyramidcyber.com\/#\/schema\/person\/fcec127e8b10d69baf26b499ff453bbe"},"breadcrumb":{"@id":"https:\/\/pyramidcyber.com\/?p=67#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pyramidcyber.com\/?p=67"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pyramidcyber.com\/?p=67#primaryimage","url":"https:\/\/pyramidcyber.com\/wp-content\/uploads\/2019\/04\/mobilenew.jpg","contentUrl":"https:\/\/pyramidcyber.com\/wp-content\/uploads\/2019\/04\/mobilenew.jpg","width":1660,"height":1248},{"@type":"BreadcrumbList","@id":"https:\/\/pyramidcyber.com\/?p=67#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pyramidcyber.com\/"},{"@type":"ListItem","position":2,"name":"Mid-Market Businesses, Don\u2019t Think Small about Security"}]},{"@type":"WebSite","@id":"https:\/\/pyramidcyber.com\/#website","url":"https:\/\/pyramidcyber.com\/","name":"Pyramid Cyber Security &amp; Forensic","description":"NextGen Cyber Security &amp; Forensic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pyramidcyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pyramidcyber.com\/#\/schema\/person\/fcec127e8b10d69baf26b499ff453bbe","name":"pyramidin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0d5e24f70ca2b807bac1de13340b775fdc89e779104944bb69a2600a308a6289?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d5e24f70ca2b807bac1de13340b775fdc89e779104944bb69a2600a308a6289?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d5e24f70ca2b807bac1de13340b775fdc89e779104944bb69a2600a308a6289?s=96&d=mm&r=g","caption":"pyramidin"},"sameAs":["https:\/\/pyramidcyber.com"],"url":"https:\/\/pyramidcyber.com\/?author=1"}]}},"jetpack_featured_media_url":"https:\/\/pyramidcyber.com\/wp-content\/uploads\/2019\/04\/mobilenew.jpg","_links":{"self":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67"}],"version-history":[{"count":0,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/67\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=\/wp\/v2\/media\/1350"}],"wp:attachment":[{"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pyramidcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}