{"id":156833,"date":"2025-06-02T15:57:24","date_gmt":"2025-06-02T20:57:24","guid":{"rendered":"https:\/\/wpengine.com\/?post_type=resource&#038;p=156833"},"modified":"2025-06-02T15:57:31","modified_gmt":"2025-06-02T20:57:31","slug":"cybersecurity-for-mid-sized-businesses","status":"publish","type":"resource","link":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/","title":{"rendered":"The Most Common Cyber Threats Facing Mid-Sized Businesses"},"content":{"rendered":"\n<p>Cybersecurity threats aren\u2019t just a concern for large enterprises\u2014small and mid-sized businesses are increasingly being targeted. In fact, a recent study by the <a href=\"https:\/\/www.uschamber.com\/sbindex\/2024-Q1\/quarterly-spotlight\" target=\"_blank\" rel=\"noreferrer noopener\">U.S. Chamber of Commerce<\/a> reports that 74% of small-to-mid-sized companies (20\u2013500 employees) see cyber threats as a growing concern.<\/p>\n\n\n\n<p>For mid-sized companies without dedicated security teams, a successful attack can lead to more than just site downtime\u2014it can disrupt business operations, damage customer trust, and rack up devastating costs.&nbsp;<\/p>\n\n\n\n<p>This article explores why WordPress is a prime target for attackers, risks related to cybersecurity for mid-sized businesses, the most common cyber threats facing WordPress sites today, and how a managed hosting provider can help protect your site at a foundational level.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is WordPress a target for cyberattacks?<\/h2>\n\n\n\n<p>WordPress powers more than 40% of all websites globally, making it the most popular content management system (CMS) by far.&nbsp;<\/p>\n\n\n\n<p>This ubiquitousness makes WordPress sites attractive targets for hackers, as a single vulnerability in a plugin or line of code can create the potential for them to gain unauthorized access to millions of sites.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"465\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2018\/06\/security-header-1024x465.png\" alt=\"WordPress Security and Antivirus Plugins. a laptop with a blue lock icon displayed on a black background\" class=\"wp-image-146141\" srcset=\"https:\/\/wpengine.com\/wp-content\/uploads\/2018\/06\/security-header-1024x465.png 1024w, https:\/\/wpengine.com\/wp-content\/uploads\/2018\/06\/security-header-540x245.png 540w, https:\/\/wpengine.com\/wp-content\/uploads\/2018\/06\/security-header-768x349.png 768w, https:\/\/wpengine.com\/wp-content\/uploads\/2018\/06\/security-header.png 1100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The effect of cyberattacks on mid-sized organizations<\/h2>\n\n\n\n<p>After a cyberattack, the immediate effects are obvious: you may be completely locked out of your site\u2019s administrative dashboard, have hackers reach out to you with a ransom to restore access, or maybe the company credit card suddenly starts racking up unexpected expenses.<\/p>\n\n\n\n<p>The impacts of a cyberattack will almost inevitably affect your finances, but more than that, they can also affect your business operations and reputation in the long run.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Financial impacts of a cyberattack<\/h3>\n\n\n\n<p>The financial costs are the first and most obvious effect of a cyberattack on a mid-sized business. When cybercriminals access your site, oftentimes they\u2019ll send a ransom note, offering to restore your site for a hefty price. However, it\u2019s best practice not to engage with these criminals, as they may be tempted to keep raising the restoration price with no intention of reestablishing your site.<\/p>\n\n\n\n<p>The alternative route of working with a cybersecurity firm to reclaim your site, while not a cheaper option, is often the better choice to ensure any money you pay is actually going toward work that may restore your business site.<\/p>\n\n\n\n<p>That said, <a href=\"https:\/\/www.huntress.com\/blog\/neglecting-cybersecurity-can-save-you-money-now\" target=\"_blank\" rel=\"noreferrer noopener\">according to Huntress<\/a>, mid-sized companies can expect to pay around a quarter of a million dollars to restore access to a site that has been compromised. Estimates from <a href=\"https:\/\/www.wasatchpreferred.com\/business-interruption-the-fastest-growing-cyberattack-cost\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wasatch Preferred<\/a> are similar for mid-sized businesses experiencing a cybersecurity breach that does not result in business interruption. That estimate skyrockets, though, if business operations are interrupted, bringing the estimated total cost of a security incident up to nearly $ 1 M.<\/p>\n\n\n\n<p>Additionally, lost customer data can open your business up to the potential for lawsuits, and these legal ramifications can further increase the financial burden on businesses already dealing with the fallout of a cyberattack. Unfortunately, Huntress\u2019 findings also report that 60% of mid-sized companies permanently close within six months of a successful cyberattack due to the financial pressure it places on the business.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Operational impacts of a cyberattack<\/h3>\n\n\n\n<p>In the wake of a cyberattack, your business operations will also likely be affected. Here are a few examples of operational failures businesses may experience after a cyberattack:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Online orders may not be processed, leaving a disconnect between customers who expect to receive products and vendors or warehouse fulfillment experts who are unaware of incoming requests.\u00a0<\/li>\n\n\n\n<li>Your customer support team may receive a massive influx of traffic as confused customers and partners reach out to problem-solve.\u00a0<\/li>\n\n\n\n<li>Interference with online payment processing can delay invoicing or lead to inaccurate financial statements.<\/li>\n\n\n\n<li>Compromised sites can also disrupt communication between scheduling software, internal systems, or payroll, affecting employees and their livelihoods.<\/li>\n<\/ul>\n\n\n\n<p>For example, when <a href=\"https:\/\/www.theguardian.com\/business\/2025\/may\/03\/inside-the-marks-and-spencer-cyber-attack-chaos\" target=\"_blank\" rel=\"noreferrer noopener\">one of the UK\u2019s biggest retailers experienced a cyberattack<\/a>, M&amp;S was forced to stop taking online orders for over a week, resulting in millions in lost revenue. The company experienced issues that caused disruptions to a partner company, Ocado, which facilitated some of their online food deliveries, as well as in-store stocking issues, as shoppers turned away from digital, fulfilling their needs with in-store shopping at a higher-than-normal frequency.<\/p>\n\n\n\n<p>Whether a site\u2019s downtime results in supply chain disruptions, complications in vendor communications, or additional costs as you increase customer support and outreach, one thing is certain: a cyberattack costs more than just money\u2014it costs valuable time and resources that mid-sized businesses simply can\u2019t afford.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reputational impacts of a cyberattack<\/h3>\n\n\n\n<p>Even after restoring full website functionality, your business will still have some damage to repair. Specifically, one of the most challenging hurdles to overcome after experiencing a cybersecurity breach is the <a href=\"https:\/\/www.anapaya.net\/blog\/5-ways-cyberattacks-can-damage-a-companys-reputation\" target=\"_blank\" rel=\"noreferrer noopener\">reputational damage<\/a> that comes with it.<\/p>\n\n\n\n<p>Whether affected by the breach or not, past customers will be less likely to return, and new customers just finding you for the first time may be put off by uncovering a history of digital insecurity. If the attack affects your work with third-party vendors and specialists, they may also have concerns regarding the future of your professional partnership.<\/p>\n\n\n\n<p>In an age where data protection is more difficult than ever, even a single story about a successful cyberattack against your site can deter some customers from working with you.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"535\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2021\/05\/wordpress-security-tips_1200x627-1-1024x535.png\" alt=\"a man implements security best practices on his WordPress site\" class=\"wp-image-151404\" srcset=\"https:\/\/wpengine.com\/wp-content\/uploads\/2021\/05\/wordpress-security-tips_1200x627-1-1024x535.png 1024w, https:\/\/wpengine.com\/wp-content\/uploads\/2021\/05\/wordpress-security-tips_1200x627-1-540x282.png 540w, https:\/\/wpengine.com\/wp-content\/uploads\/2021\/05\/wordpress-security-tips_1200x627-1-768x401.png 768w, https:\/\/wpengine.com\/wp-content\/uploads\/2021\/05\/wordpress-security-tips_1200x627-1.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Most common cyber threats targeting WordPress sites<\/h2>\n\n\n\n<p>The most significant risk to your site is not in the tools you choose or the products you sell: <a href=\"https:\/\/images.forbes.com\/forbesinsights\/StudyPDFs\/IBM_Reputational_IT_Risk_REPORT.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">it\u2019s simple human error<\/a>.\u00a0<\/p>\n\n\n\n<p>By choosing a hosting partner\u2014one with the special skills and technical expertise to manage your site\u2019s security for you\u2014you reduce that human error, and therefore reduce your chances of succumbing to security threats.&nbsp;<\/p>\n\n\n\n<p>Here are a few of the key threats facing WordPress sites that a managed hosting service is uniquely positioned to fight against.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Brute force attacks<\/h3>\n\n\n\n<p>A <a href=\"https:\/\/wpengine.com\/resources\/wordpress-brute-force-attack-prevention\/\" target=\"_blank\" rel=\"noreferrer noopener\">brute force attack<\/a> involves hackers using automated tools to repeatedly guess login credentials until they gain access to a website. WordPress sites are particularly vulnerable because they allow unlimited login attempts by default and often use predictable usernames like &#8220;admin.&#8221;<\/p>\n\n\n\n<p>Managed hosting providers can mitigate these attacks by implementing security measures such as Web Application Firewalls (WAFs) that detect and block malicious login attempts, limiting the number of login retries per IP address, and employing tools to block abusive IPs.&nbsp;<\/p>\n\n\n\n<p>These proactive defenses help protect WordPress sites from unauthorized access and potential downtime.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DDoS attack<\/h3>\n\n\n\n<p>A Distributed Denial-of-Service (DDoS) attack works by bombarding a website with an onslaught of useless traffic meant to overload the targeted site\u2019s server and shut it down. Attackers will use a battery of compromised devices\u2014like software applications run on computers, tablets, and even cell phones\u2014to carry out a barrage of site requests.&nbsp;<\/p>\n\n\n\n<p>The <a href=\"https:\/\/stormwall.network\/resources\/blog\/why-do-ddos-attacks-happen\" target=\"_blank\" rel=\"noreferrer noopener\">intention behind a DDoS attack<\/a> is to bring the targeted site to a functional halt. There are many reasons an attacker may want to bring down a business site, but the effect on small and mid-sized businesses can be immediate, especially if you use your site to sell products or generate leads.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/wpengine.com\/support\/advanced-network\/\" target=\"_blank\" rel=\"noreferrer noopener\">WP Engine&#8217;s advanced network<\/a> includes Cloudflare CDN and layer 3 &amp; 4 DDoS protection for all customers at no additional cost to help mitigate the risks posed by this pervasive cyber threat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Outdated plugins and themes<\/h3>\n\n\n\n<p>Outdated WordPress plugins and themes expose websites to significant cyber threats. Attackers can exploit known vulnerabilities for unauthorized access, data theft, or malware injection when they remain unpatched. Notably, <a href=\"https:\/\/www.pixeljar.com\/website-support\/outdated-plugins-are-the-1-way-hackers-get-into-wordpress-sites\/\" target=\"_blank\" rel=\"noreferrer noopener\">more than half of WordPress security breaches stem from outdated plugins.<\/a><\/p>\n\n\n\n<p>Managed hosting providers can enhance security by automating updates for WordPress core, plugins, and themes, proactively monitoring sites for vulnerabilities, and conducting regular security scans to detect and remove malware promptly.<\/p>\n\n\n\n<p>These proactive measures can help safeguard WordPress sites from threats associated with outdated plugins and themes without extra effort from your team.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SQL injection&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/wpengine.com\/resources\/prevent-sql-injection-attack-wordpress\/\" target=\"_blank\" rel=\"noreferrer noopener\">An SQL injection (SQLi) attack<\/a> occurs when malicious SQL code is inserted into input fields (like a contact form) to manipulate a website&#8217;s database. This can lead to unauthorized access to and theft of data or even complete control over the site database.\u00a0<\/p>\n\n\n\n<p>WordPress sites are particularly vulnerable due to their extensive use of plugins and themes, some of which may not properly sanitize user inputs, leaving entry points that attackers can exploit.<\/p>\n\n\n\n<p>Managed hosting providers enhance WordPress security against SQLi attacks by implementing several protective measures, many of which will be similar to what you\u2019d use for protecting against plugins or themes vulnerabilities, like firewalls or regular automatic updates. Input validation checks the accuracy and quality of source data before processing it.<\/p>\n\n\n\n<p>By combining these strategies, you can work with your managed hosting provider to build a robust defense against SQL injection threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cross-site scripting (XSS)<\/h3>\n\n\n\n<p>Another type of attack by code injection, <a href=\"https:\/\/wpengine.com\/resources\/javascript-security\/#XSS_Attacks\" target=\"_blank\" rel=\"noreferrer noopener\">cross-site scripting<\/a>, also occurs when attackers inject malicious scripts via comments, contact forms, or plugins to steal data.\u00a0<\/p>\n\n\n\n<p>There are two main <a href=\"https:\/\/www.manageengine.com\/log-management\/cyber-security\/sql-injection-web-application-attack-and-cross-site-scripting-the-differences-and-attack-anatomy.html\" target=\"_blank\" rel=\"noreferrer noopener\">differences between XSS and SQLi injection<\/a>. The first is the type of code language under attack. SQL injection attacks primarily attempt to violate sites via SQL, while XSS attacks mainly affect JavaScript.<\/p>\n\n\n\n<p>The second difference is that while an SQLi injection targets your site directly, XSS attacks target your end users. A <a href=\"https:\/\/www.brightsec.com\/blog\/xss-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">successful XSS attack<\/a> can result in a hacker impersonating your business to steal directly from customers who believe they\u2019re making legitimate purchases.<\/p>\n\n\n\n<p>Once again, a managed hosting partner can provide a foundational level of security through WAFs and automatic updates to mitigate the risk of attackers making money from your hard-earned reputation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Squash these security threats and more with WP Engine<\/h2>\n\n\n\n<p>Cybersecurity for mid-sized companies is tricky\u2014you\u2019re working with a lean team to keep your site safe and fast for your users, and finding the right balance is no small task.&nbsp;<\/p>\n\n\n\n<p>WP Engine is designed with <a href=\"https:\/\/wpengine.com\/resources\/security-ebook-prevention-is-better-than-the-cure\/\" target=\"_blank\" rel=\"noreferrer noopener\">WordPress security<\/a> in mind, keeping our customers\u2019 sites safe and scalable. To learn more about our <a href=\"https:\/\/wpengine.com\/managed-wordpress-hosting\/\" target=\"_blank\" rel=\"noreferrer noopener\">managed hosting for WordPress sites<\/a>, check out <a href=\"https:\/\/wpengine.com\/plans\/\" target=\"_blank\" rel=\"noreferrer noopener\">our flexible plans<\/a> to see which is right for your business!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity threats aren\u2019t just a concern for large enterprises\u2014small and mid-sized businesses are increasingly being targeted. In fact, a recent study by the U.S. Chamber of Commerce reports that 74% of small-to-mid-sized companies (20\u2013500 employees) see cyber threats as a growing concern. For mid-sized companies without dedicated security teams, a successful attack can lead to<span class=\"tile__ellipses\">&hellip;<\/span><span class=\"tile__ellipses--animated\"><\/span><\/p>\n","protected":false},"author":318,"featured_media":146974,"template":"","resource-topic":[909],"resource-role":[895,906,899],"resource-type":[916],"class_list":["post-156833","resource","type-resource","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common Cybersecurity Threats Facing Mid-Sized Businesses<\/title>\n<meta name=\"description\" content=\"Learn about risks related to cybersecurity for mid-sized businesses, common threats facing WordPress sites, and how a managed host can provide foundational protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Cybersecurity Threats Facing Mid-Sized Businesses\" \/>\n<meta property=\"og:description\" content=\"Learn about risks related to cybersecurity for mid-sized businesses, common threats facing WordPress sites, and how a managed host can provide foundational protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"WP Engine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wpengine\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T20:57:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wpengine.com\/wp-content\/uploads\/2017\/11\/security-11-header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@wpengine\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/\",\"url\":\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/\",\"name\":\"Common Cybersecurity Threats Facing Mid-Sized Businesses\",\"isPartOf\":{\"@id\":\"https:\/\/wpengine.com\/#website\"},\"datePublished\":\"2025-06-02T20:57:24+00:00\",\"dateModified\":\"2025-06-02T20:57:31+00:00\",\"description\":\"Learn about risks related to cybersecurity for mid-sized businesses, common threats facing WordPress sites, and how a managed host can provide foundational protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wpengine.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/wpengine.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Most Common Cyber Threats Facing Mid-Sized Businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wpengine.com\/#website\",\"url\":\"https:\/\/wpengine.com\/\",\"name\":\"WP Engine\",\"description\":\"Managed Hosting for WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wpengine.com\/#\/schema\/person\/9d296f35344beaa58730c6ba4423ffb8\",\"name\":\"Riley Cullen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea30d05fc6f0519be29943b17a1980c89f9e0897251cf1983191b3f380ed8c74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea30d05fc6f0519be29943b17a1980c89f9e0897251cf1983191b3f380ed8c74?s=96&d=mm&r=g\",\"caption\":\"Riley Cullen\"},\"url\":\"https:\/\/wpengine.com\/blog\/author\/rileyc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Cybersecurity Threats Facing Mid-Sized Businesses","description":"Learn about risks related to cybersecurity for mid-sized businesses, common threats facing WordPress sites, and how a managed host can provide foundational protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Common Cybersecurity Threats Facing Mid-Sized Businesses","og_description":"Learn about risks related to cybersecurity for mid-sized businesses, common threats facing WordPress sites, and how a managed host can provide foundational protection.","og_url":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/","og_site_name":"WP Engine","article_publisher":"https:\/\/www.facebook.com\/wpengine","article_modified_time":"2025-06-02T20:57:31+00:00","og_image":[{"width":1100,"height":500,"url":"https:\/\/wpengine.com\/wp-content\/uploads\/2017\/11\/security-11-header.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@wpengine","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/","url":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/","name":"Common Cybersecurity Threats Facing Mid-Sized Businesses","isPartOf":{"@id":"https:\/\/wpengine.com\/#website"},"datePublished":"2025-06-02T20:57:24+00:00","dateModified":"2025-06-02T20:57:31+00:00","description":"Learn about risks related to cybersecurity for mid-sized businesses, common threats facing WordPress sites, and how a managed host can provide foundational protection.","breadcrumb":{"@id":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wpengine.com\/resources\/cybersecurity-for-mid-sized-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wpengine.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/wpengine.com\/resources\/"},{"@type":"ListItem","position":3,"name":"The Most Common Cyber Threats Facing Mid-Sized Businesses"}]},{"@type":"WebSite","@id":"https:\/\/wpengine.com\/#website","url":"https:\/\/wpengine.com\/","name":"WP Engine","description":"Managed Hosting for WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/wpengine.com\/#\/schema\/person\/9d296f35344beaa58730c6ba4423ffb8","name":"Riley Cullen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea30d05fc6f0519be29943b17a1980c89f9e0897251cf1983191b3f380ed8c74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea30d05fc6f0519be29943b17a1980c89f9e0897251cf1983191b3f380ed8c74?s=96&d=mm&r=g","caption":"Riley Cullen"},"url":"https:\/\/wpengine.com\/blog\/author\/rileyc\/"}]}},"acf":[],"grid_image_url":"https:\/\/wpengine.com\/wp-content\/uploads\/2017\/11\/security-11-grid.png","media-type":{"term_id":916,"name":"Article","slug":"article"},"role":"<strong>Roles:<\/strong> Agency, Entrepreneur, Site Owner","topic":"<strong>Topics:<\/strong> Security","_links":{"self":[{"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/resource\/156833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/users\/318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/media\/146974"}],"wp:attachment":[{"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/media?parent=156833"}],"wp:term":[{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/resource-topic?post=156833"},{"taxonomy":"resource-role","embeddable":true,"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/resource-role?post=156833"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/wpengine.com\/wp-json\/wp\/v2\/resource-type?post=156833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}