{"id":22731,"date":"2025-03-07T10:57:04","date_gmt":"2025-03-07T09:57:04","guid":{"rendered":"https:\/\/www.ng-audit.fr\/blog\/non-categorise\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/"},"modified":"2025-03-07T10:57:04","modified_gmt":"2025-03-07T09:57:04","slug":"survival-guide-for-smes-business-continuity-after-a-cyberattack","status":"publish","type":"post","link":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/","title":{"rendered":"Survival Guide for SMEs: Business Continuity After a Cyberattack"},"content":{"rendered":"<h2><strong>Crucial Support for SMEs<\/strong><\/h2>\n<p>The &#8220;Business Continuity in a Box&#8221; guide, launched by CISA and ASCS, provides vital support to SMEs to maintain their operations after a cyberattack. Designed for companies that do not yet have a business continuity plan, this guide walks them through the step-by-step implementation of basic communication solutions and cloud application hosting. It aims to minimize the impact of cyberattacks on daily business operations by providing practical tools and strategic advice to ensure resilience against digital threats. SMEs, often targeted by cyberattacks due to their limited cybersecurity resources, can thus feel better prepared and protected against IT risks.   <\/p>\n<h2><strong>Recommendations Tailored to SME Needs<\/strong><\/h2>\n<p>The guide is primarily intended for SMEs with 10 to 300 employees, but it can also be useful for large enterprises and government agencies. The recommendations are specifically designed to help companies implement temporary IT solutions to maintain minimal services during crisis periods. By emphasizing simplicity and effectiveness, this guide enables businesses of all sizes to implement business continuity measures quickly and efficiently, even in the absence of specialized cybersecurity resources. Through this guide, SMEs can strengthen their resilience and ability to overcome the challenges posed by cyber threats by equipping themselves with practical strategies and solutions to ensure the continuity of their operations in the event of an IT incident.   <\/p>\n<h2><strong>Practical and Operational Content<\/strong><\/h2>\n<p>The guide provides detailed instructions for establishing minimal communications and maintaining continuity of critical applications such as office suites, accounting, and payroll systems. Based on the Microsoft 365 technology stack, it offers practical advice for configuring catch-all email mailboxes and deploying secure cloud solutions for each required application. By emphasizing pragmatism and feasibility, this guide provides SMEs with the means to overcome cybersecurity challenges and maintain operational activity in a constantly evolving digital environment. With its clear recommendations and concrete steps, it constitutes a valuable tool for SMEs seeking to strengthen their resilience against digital threats and ensure the continuity of their operations under all circumstances.   <\/p>\n<p>&nbsp;<\/p>\n<p>Source: Le Monde informatique<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crucial Support for SMEs The &#8220;Business Continuity in a Box&#8221; guide, launched by CISA and ASCS, provides vital support to SMEs to maintain their operations after a cyberattack. Designed for companies that do not yet have a business continuity plan, this guide walks them through the step-by-step implementation of basic communication solutions and cloud application<\/p>\n","protected":false},"author":2,"featured_media":22732,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[202],"tags":[203,229],"class_list":["post-22731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","tag-it-audit","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Survival Guide for SMEs: Business Continuity After a Cyberattack<\/title>\n<meta name=\"description\" content=\"Would you like to learn more about a survival guide for SMEs developed to enable them to continue their operations after a cyberattack? Discover our article dedicated to this topic!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Survival Guide for SMEs: Business Continuity After a Cyberattack\" \/>\n<meta property=\"og:description\" content=\"Would you like to learn more about a survival guide for SMEs developed to enable them to continue their operations after a cyberattack? Discover our article dedicated to this topic!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"NG\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-07T09:57:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ng-audit.fr\/wp-content\/uploads\/2025\/03\/security-5042249-1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mathilde Caplier\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/\"},\"author\":{\"name\":\"Mathilde Caplier\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/#\\\/schema\\\/person\\\/6310c00106b857836a1e1a4732e57686\"},\"headline\":\"Survival Guide for SMEs: Business Continuity After a Cyberattack\",\"datePublished\":\"2025-03-07T09:57:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/\"},\"wordCount\":339,\"image\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ng-audit.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/security-5042249-1280.jpg\",\"keywords\":[\"IT Audit\",\"Technology\"],\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/\",\"url\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/\",\"name\":\"Survival Guide for SMEs: Business Continuity After a Cyberattack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ng-audit.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/security-5042249-1280.jpg\",\"datePublished\":\"2025-03-07T09:57:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/#\\\/schema\\\/person\\\/6310c00106b857836a1e1a4732e57686\"},\"description\":\"Would you like to learn more about a survival guide for SMEs developed to enable them to continue their operations after a cyberattack? Discover our article dedicated to this topic!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ng-audit.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/security-5042249-1280.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ng-audit.fr\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/security-5042249-1280.jpg\",\"width\":1280,\"height\":853,\"caption\":\"security alert\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/blog\\\/insights\\\/survival-guide-for-smes-business-continuity-after-a-cyberattack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Survival Guide for SMEs: Business Continuity After a Cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/\",\"name\":\"NG\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ng-audit.fr\\\/en\\\/#\\\/schema\\\/person\\\/6310c00106b857836a1e1a4732e57686\",\"name\":\"Mathilde Caplier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1a15a692ba4ee5235b4f924ccfd7243b44c00387832ed44dafdadd74bcb414a5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1a15a692ba4ee5235b4f924ccfd7243b44c00387832ed44dafdadd74bcb414a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1a15a692ba4ee5235b4f924ccfd7243b44c00387832ed44dafdadd74bcb414a5?s=96&d=mm&r=g\",\"caption\":\"Mathilde Caplier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Survival Guide for SMEs: Business Continuity After a Cyberattack","description":"Would you like to learn more about a survival guide for SMEs developed to enable them to continue their operations after a cyberattack? Discover our article dedicated to this topic!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"Survival Guide for SMEs: Business Continuity After a Cyberattack","og_description":"Would you like to learn more about a survival guide for SMEs developed to enable them to continue their operations after a cyberattack? Discover our article dedicated to this topic!","og_url":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/","og_site_name":"NG","article_published_time":"2025-03-07T09:57:04+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.ng-audit.fr\/wp-content\/uploads\/2025\/03\/security-5042249-1280.jpg","type":"image\/jpeg"}],"author":"Mathilde Caplier","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#article","isPartOf":{"@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/"},"author":{"name":"Mathilde Caplier","@id":"https:\/\/www.ng-audit.fr\/en\/#\/schema\/person\/6310c00106b857836a1e1a4732e57686"},"headline":"Survival Guide for SMEs: Business Continuity After a Cyberattack","datePublished":"2025-03-07T09:57:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/"},"wordCount":339,"image":{"@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ng-audit.fr\/wp-content\/uploads\/2025\/03\/security-5042249-1280.jpg","keywords":["IT Audit","Technology"],"articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/","url":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/","name":"Survival Guide for SMEs: Business Continuity After a Cyberattack","isPartOf":{"@id":"https:\/\/www.ng-audit.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ng-audit.fr\/wp-content\/uploads\/2025\/03\/security-5042249-1280.jpg","datePublished":"2025-03-07T09:57:04+00:00","author":{"@id":"https:\/\/www.ng-audit.fr\/en\/#\/schema\/person\/6310c00106b857836a1e1a4732e57686"},"description":"Would you like to learn more about a survival guide for SMEs developed to enable them to continue their operations after a cyberattack? Discover our article dedicated to this topic!","breadcrumb":{"@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#primaryimage","url":"https:\/\/www.ng-audit.fr\/wp-content\/uploads\/2025\/03\/security-5042249-1280.jpg","contentUrl":"https:\/\/www.ng-audit.fr\/wp-content\/uploads\/2025\/03\/security-5042249-1280.jpg","width":1280,"height":853,"caption":"security alert"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ng-audit.fr\/en\/blog\/insights\/survival-guide-for-smes-business-continuity-after-a-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ng-audit.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Survival Guide for SMEs: Business Continuity After a Cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/www.ng-audit.fr\/en\/#website","url":"https:\/\/www.ng-audit.fr\/en\/","name":"NG","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ng-audit.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.ng-audit.fr\/en\/#\/schema\/person\/6310c00106b857836a1e1a4732e57686","name":"Mathilde Caplier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1a15a692ba4ee5235b4f924ccfd7243b44c00387832ed44dafdadd74bcb414a5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1a15a692ba4ee5235b4f924ccfd7243b44c00387832ed44dafdadd74bcb414a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a15a692ba4ee5235b4f924ccfd7243b44c00387832ed44dafdadd74bcb414a5?s=96&d=mm&r=g","caption":"Mathilde Caplier"}}]}},"_links":{"self":[{"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/posts\/22731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/comments?post=22731"}],"version-history":[{"count":0,"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/posts\/22731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/media\/22732"}],"wp:attachment":[{"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/media?parent=22731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/categories?post=22731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ng-audit.fr\/en\/wp-json\/wp\/v2\/tags?post=22731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}