{"id":19115,"date":"2024-09-20T08:44:25","date_gmt":"2024-09-20T13:44:25","guid":{"rendered":"https:\/\/bolttech.io\/insight\/%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e4%bf%9d%e9%99%a9%ef%bc%9a%e6%b6%88%e9%99%a4-smb-%e5%ae%a2%e6%88%b7%e8%a6%86%e7%9b%96%e8%8c%83%e5%9b%b4%e4%b8%ad%e7%9a%84%e8%96%84%e5%bc%b1%e7%8e%af%e8%8a%82\/"},"modified":"2024-09-20T08:44:28","modified_gmt":"2024-09-20T13:44:28","slug":"%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e4%bf%9d%e9%99%a9%ef%bc%9a%e6%b6%88%e9%99%a4-smb-%e5%ae%a2%e6%88%b7%e8%a6%86%e7%9b%96%e8%8c%83%e5%9b%b4%e4%b8%ad%e7%9a%84%e8%96%84%e5%bc%b1%e7%8e%af%e8%8a%82","status":"publish","type":"insight","link":"https:\/\/bolttech.io\/zh-hans\/insights\/%e7%bd%91%e7%bb%9c%e5%ae%89%e5%85%a8%e4%bf%9d%e9%99%a9%ef%bc%9a%e6%b6%88%e9%99%a4-smb-%e5%ae%a2%e6%88%b7%e8%a6%86%e7%9b%96%e8%8c%83%e5%9b%b4%e4%b8%ad%e7%9a%84%e8%96%84%e5%bc%b1%e7%8e%af%e8%8a%82\/","title":{"rendered":"\u7f51\u7edc\u5b89\u5168\u4fdd\u9669\uff1a\u6d88\u9664 SMB \u5ba2\u6237\u8986\u76d6\u8303\u56f4\u4e2d\u7684\u8584\u5f31\u73af\u8282"},"content":{"rendered":"\n<p>\u7f51\u7edc\u5b89\u5168\u53ef\u80fd\u4e0d\u662f\u5546\u4e1a\u5ba2\u6237\u7684\u9996\u8981\u4efb\u52a1\uff0c\u4f46\u5bf9\u4e8e\u6bcf\u4e2a\u8fd0\u8425\u5546\u3001\u7ecf\u7eaa\u4eba\u548c\u4ee3\u7406\u5546\u6765\u8bf4\u90fd\u5e94\u8be5\u5982\u6b64\u3002<\/p>\n\n<p>\u4e2d\u5c0f\u578b\u4f01\u4e1a\u4ece\u672a\u50cf\u73b0\u5728\u8fd9\u6837\u9762\u4e34\u653b\u51fb\u98ce\u9669\uff0c\u4f46\u5927\u591a\u6570\u4f01\u4e1a\u4ecd\u7136\u4e0d\u613f\u8d2d\u4e70\u8db3\u591f\u7684\u4fdd\u9669\u6765\u4fdd\u62a4\u81ea\u5df1\u3002\n\u8fd0\u8425\u5546\u6709\u8d23\u4efb\u5411\u5ba2\u6237\u4e86\u89e3\u4e2d\u5c0f\u578b\u4f01\u4e1a \uff08SMB\uff09 \u9762\u4e34\u7684\u5a01\u80c1\u5f62\u52bf\uff0c\u5e76\u91c7\u53d6\u63aa\u65bd\u63d0\u4f9b\u53ef\u63d0\u4f9b\u771f\u6b63\u4ef7\u503c\u7684\u4fdd\u62a4\u3002 <\/p>\n\n<h2 class=\"wp-block-heading\">\u4e2d\u5c0f\u4f01\u4e1a\u9762\u4e34\u7684\u7f51\u7edc\u5b89\u5168\u5a01\u80c1\u771f\u5b9e\u5b58\u5728\u4e14\u4e0d\u65ad\u589e\u957f<\/h2>\n\n<p>\u4e2d\u5c0f\u4f01\u4e1a\u662f\u9ed1\u5ba2\u6700\u559c\u6b22\u7684\u76ee\u6807\uff0cAmTrust Financial Services \u7f51\u7edc\u9ad8\u7ea7\u526f\u603b\u88c1 <a href=\"https:\/\/riskandinsurance.com\/cyber-risk-for-small-businesses-understanding-your-individual-risks-and-what-you-can-actually-do\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aaron Basilius<\/a> \u8bf4\u3002\n\u653b\u51fb\u5927\u516c\u53f8\u53ef\u80fd\u4f1a\u5e26\u6765\u5de8\u989d\u652f\u51fa\uff0c\u4f46\u8fd9\u4e9b\u7ec4\u7ec7\u4e5f\u66f4\u6709\u80fd\u529b\u5e94\u5bf9\u7f51\u7edc\u653b\u51fb\u3002\nSMB \u7684\u56de\u62a5\u53ef\u80fd\u8f83\u5c0f\uff0c\u4f46\u4ed6\u4eec\u662f\u4e00\u4e2a\u66f4\u5bb9\u6613\u7684\u76ee\u6807\u3002  <\/p>\n\n<p>\u201c\u5c0f\u4f01\u4e1a\u662f\u5426\u50cf\u8de8\u56fd\u516c\u53f8\u4e00\u6837\u62e5\u6709\u5e9e\u5927\u7684\u94f6\u884c\u8d26\u6237\uff1f\u4e0d\uff0c\u201cBasilius \u8bf4\u3002\n\u201c\u4f46\u603b\u7684\u6765\u8bf4\uff0c\u8fdb\u5165\u5c0f\u4f01\u4e1a\u7684\u7cfb\u7edf\u66f4\u5bb9\u6613\u3002\u9ed1\u5ba2\u4e0d\u5fc5\u8d39\u5c3d\u5fc3\u601d\u5c31\u80fd\u8fdb\u5165\u90a3\u91cc\u3002 <\/p>\n\n<p>\u9ed1\u5ba2\u4ee5\u6570\u636e\u4e3a\u76ee\u6807\uff0cComcast Business \u7f51\u7edc\u5b89\u5168\u4ea7\u54c1\u526f\u603b\u88c1 <a href=\"https:\/\/www.securitymagazine.com\/articles\/91806-as-cyber-attacks-become-more-prevalent-heres-why-your-small-business-is-at-risk\" target=\"_blank\" rel=\"noreferrer noopener\">Shena Tharnish<\/a> \u5199\u9053\u3002\n\u8fd9\u53ef\u80fd\u5305\u62ec\u53ef\u4ee5\u5728\u6697\u7f51\u4e0a\u51fa\u552e\u7684\u4e2a\u4eba\u6570\u636e\uff0c\u4f8b\u5982\u4fe1\u7528\u5361\u8be6\u7ec6\u4fe1\u606f\u548c\u533b\u7597\u8bb0\u5f55\u3002 <\/p>\n\n<p>\u5979\u8bf4\uff0c\u7f51\u7edc\u653b\u51fb\u7684\u5176\u4ed6\u52a8\u673a\u5305\u62ec\uff1a<\/p>\n\n<ul class=\"wp-block-list\">\n<li>\u83b7\u5f97\u6267\u884c\u5927\u89c4\u6a21 DDoS \u653b\u51fb\u7684\u8ba1\u7b97\u80fd\u529b\u3002<\/li>\n\n\n\n<li>\u901a\u8fc7\u540e\u95e8\u8bbf\u95ee\u5927\u516c\u53f8\uff0c\u4ece\u800c\u83b7\u5f97\u66f4\u5927\u7684\u652f\u51fa\u3002<\/li>\n\n\n\n<li>\u8d4e\u91d1\u5f62\u5f0f\u7684\u73b0\u91d1\u3002<\/li>\n<\/ul>\n\n<p>\u5927\u6d41\u884c\u5bf9\u9ed1\u5ba2\u6765\u8bf4\u662f\u4e00\u4e2a\u798f\u97f3\uff0c\u4ed6\u4eec\u5f88\u5feb\u5c31\u5229\u7528\u4e86\u8fdc\u7a0b\u5de5\u4f5c\u9020\u6210\u7684\u6f0f\u6d1e\u3002\n\u8054\u90a6\u8c03\u67e5\u5c40\u7f51\u7edc\u90e8\u95e8\u526f\u52a9\u7406\u4e3b\u4efb\u6258 <a href=\"https:\/\/www.msspalert.com\/cybersecurity-news\/fbi-covid-19-cyberattacks-spike-400-in-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5c3c\u4e9a\u00b7\u4e4c\u6208\u96f7\u8328 \uff08Tonya Ugoretz<\/a>\uff09 \u8868\u793a\uff0c\u81ea\u5927\u6d41\u884c\u5f00\u59cb\u4ee5\u6765\uff0c\u8be5\u5c40\u4e92\u8054\u7f51\u72af\u7f6a\u6295\u8bc9\u4e2d\u5fc3\u6536\u5230\u7684\u5728\u7ebf\u72af\u7f6a\u62a5\u544a\u589e\u52a0\u4e86\u7ea6 400%\uff0c\u4ece\u6bcf\u5929 1,000 \u8d77\u98d9\u5347\u81f3 4,000 \u8d77\u7684\u9ad8\u70b9\u3002 <\/p>\n\n<p><a href=\"https:\/\/www.thestar.com\/business\/2021\/02\/04\/small-businesses-pivoting-online-because-of-covid-19-are-vulnerable-to-cyber-attacks-cfib-report.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u636e\u52a0\u62ff\u5927\u72ec\u7acb\u4f01\u4e1a\u8054\u5408\u4f1a \uff08Canadian Federation of Independent Business<\/a>\uff09 \u62a5\u544a\uff0c2020 \u5e74\uff0c\u52a0\u62ff\u5927\u6709\u6570\u5343\u5bb6\u4f01\u4e1a\u6210\u4e3a\u7f51\u7edc\u653b\u51fb\u7684\u53d7\u5bb3\u8005\u3002\n2020 \u5e74 10 \u6708\u5bf9 3,040 \u5bb6\u4e2d\u5c0f\u578b\u4f01\u4e1a\u8fdb\u884c\u7684\u4e00\u9879\u8c03\u67e5\u53d1\u73b0\uff0c\u81ea\u5f53\u5e74 3 \u6708\u4ee5\u6765\uff0c\u8fd1\u56db\u5206\u4e4b\u4e00\u7684\u4f01\u4e1a\u906d\u53d7\u8fc7\u653b\u51fb\u3002\n\u8fd1 5% \u7684\u53d7\u8bbf\u8005\u8868\u793a\u653b\u51fb\u6210\u529f\uff0c\u8fd9\u610f\u5473\u7740\u5982\u679c\u63a8\u65ad\u5168\u56fd\u8303\u56f4\u5185\u7684\u6570\u5b57\uff0c\u53ef\u80fd\u6709\u8d85\u8fc7 60,000 \u5bb6\u4f01\u4e1a\u6210\u4e3a\u53d7\u5bb3\u8005\u3002  <\/p>\n\n<p>\u5c3d\u7ba1\u98ce\u9669\u5f88\u660e\u663e\uff0c\u4f46\u7f51\u7edc\u5b89\u5168\u4fdd\u9669\u4ecd\u7136\u4e0d\u662f\u6700\u5bb9\u6613\u9500\u552e\u7684\u3002\n\u8fd0\u8425\u5546\u5fc5\u987b\u5bf9\u5546\u4e1a\u5ba2\u6237\u8fdb\u884c\u57f9\u8bad\uff0c\u89e3\u51b3\u76d1\u7ba1\u95ee\u9898\uff0c\u63d0\u4f9b\u4e2a\u6027\u5316\u4fdd\u9669\uff0c\u5e76\u63d0\u4f9b\u96c6\u6210\u670d\u52a1\uff0c\u4ee5\u4fbf\u5728\u6b64\u95ee\u9898\u4e0a\u4e0e SMB \u5efa\u7acb\u8054\u7cfb\u3002 <\/p>\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-1024x683.jpg\" alt=\"\" class=\"wp-image-10120\" srcset=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-1024x683.jpg 1024w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-300x200.jpg 300w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-768x512.jpg 768w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<p id=\"gdcalert2\"><\/p>\n\n<h2 class=\"wp-block-heading\">\u6559\u80b2\u5546\u4e1a\u5ba2\u6237<\/h2>\n\n<p>\u4e3a\u4e86\u4e0e SMB \u5efa\u7acb\u6709\u610f\u4e49\u7684\u8054\u7cfb\uff0c\u8fd0\u8425\u5546\u5fc5\u987b\u514b\u670d\u56f4\u7ed5\u7f51\u7edc\u5b89\u5168\u548c\u4fdd\u9669\u7684\u77e5\u8bc6\u5dee\u8ddd\u3002\n\u4fdd\u9669\u516c\u53f8 <a href=\"https:\/\/www.sedgwick.com\/assets\/uploads\/documents\/The-SME-Cyber-Insurance-Market_Perception-and-Adoption.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Sedgwick<\/a> \u53d1\u73b0\uff0c\u867d\u7136\u4e2d\u5c0f\u4f01\u4e1a\u5bf9\u7f51\u7edc\u98ce\u9669\u7684\u610f\u8bc6\u6bd4\u7ecf\u7eaa\u4eba\u8ba4\u4e3a\u7684\u8981\u9ad8\uff0c\u4f46\u201c\u53ea\u6709\u4e0d\u5230 20% \u7684\u4f01\u4e1a\u8d2d\u4e70\u4e86\u7f51\u7edc\u4e13\u7528\u4fdd\u9669\u201d\u3002\n\u6b64\u5916\uff0c\u5927\u591a\u6570\u5c0f\u4f01\u4e1a\u5458\u5de5\u6ca1\u6709\u63a5\u53d7\u8fc7\u7f51\u7edc\u5b89\u5168\u610f\u8bc6\u57f9\u8bad\u3002  <\/p>\n\n<p>\u66f4\u7cdf\u7cd5\u7684\u662f\uff0c\u5728 COVID-19 \u5927\u6d41\u884c\u4e4b\u540e\uff0c\u4e2d\u5c0f\u4f01\u4e1a\u5f00\u59cb\u5c06\u7f51\u7edc\u5b89\u5168\u4fdd\u9669\u89c6\u4e3a\u4e00\u79cd\u5962\u4f88\u54c1\uff0cVerisk \u8d22\u4ea7\u7d22\u8d54\u670d\u52a1\u4e3b\u7ba1 <a href=\"https:\/\/hbr.org\/2021\/01\/cybersecurity-insurance-has-a-big-problem\" target=\"_blank\" rel=\"noreferrer noopener\">Tom Johansmeyer<\/a> \u5199\u9053\u3002<\/p>\n\n<p>\u7136\u800c\uff0c\u9886\u5148\u7684\u7f51\u7edc\u5b89\u5168\u4fdd\u9669\u63d0\u4f9b\u5546\u5df2\u7ecf\u5728\u5bf9\u5ba2\u6237\u8fdb\u884c\u57f9\u8bad\uff0c\u7f51\u7edc\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\u5546 Cyberscout \u7684\u9996\u5e2d\u8425\u9500\u5b98 <a href=\"https:\/\/www.insurancebusinessmag.com\/us\/news\/cyber\/do-your-part-to-help-small-businesses-become-cyber-safe-242367.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Jeremy Barnett<\/a> \u8bf4\u3002<\/p>\n\n<p>\u201c\u56e0\u4e3a\u5b83\u662f\u4e00\u79cd\u76f8\u5bf9\u8f83\u65b0\u7684\u4fdd\u9669\u4ea7\u54c1\uff0c\u5c0f\u4f01\u4e1a\u4e3b\u4e0d\u4e00\u5b9a\u719f\u6089\u6240\u6709\u4e0d\u540c\u7684\u4fdd\u9669\u8303\u56f4\uff0c\u6240\u4ee5\u4fdd\u9669\u516c\u53f8\u4e3a\u4ed6\u4eec\u63d0\u4f9b\u4e86\u5f88\u597d\u7684\u6559\u80b2\u8d44\u6e90\uff0c\u201d\u4ed6\u89e3\u91ca\u8bf4\u3002\n\u201c\u60a8\u4e0d\u4ec5\u5728\u8d2d\u4e70\u4fdd\u9669\uff0c\u800c\u4e14\u8fd8\u5728\u8d2d\u4e70\u7f51\u7edc\u652f\u6301\u8d44\u6e90\u3002\u201d <\/p>\n\n<h2 class=\"wp-block-heading\">\u89e3\u51b3\u76d1\u7ba1\u95ee\u9898<\/h2>\n\n<p>\u8fdc\u7a0b\u9879\u76ee\u7ba1\u7406\u5e73\u53f0 Symba \u7684\u9996\u5e2d\u8425\u9500\u7ecf\u7406 <a href=\"https:\/\/www.zeguro.com\/blog\/the-state-of-the-cyber-insurance-market-for-smbs\" target=\"_blank\" rel=\"noreferrer noopener\">Ellen Zhang<\/a> \u8868\u793a\uff0c\u4e2d\u5c0f\u4f01\u4e1a\u5bfb\u6c42\u8d2d\u4e70\u7f51\u7edc\u5b89\u5168\u4fdd\u9669\u7684\u4e3b\u8981\u539f\u56e0\u4e4b\u4e00\u662f\u5c65\u884c\u5408\u540c\u4e49\u52a1\u3002\n\u201c\u8bb8\u591a\u4f01\u4e1a\u5f3a\u5236\u8981\u6c42\u4e0e\u4ed6\u4eec\u5408\u4f5c\u7684\u7b2c\u4e09\u65b9\u8d2d\u4e70\u7f51\u7edc\u4fdd\u9669\u3002\u201d <\/p>\n\n<p>\u56e0\u6b64\uff0c\u4fdd\u9669\u516c\u53f8\u89e3\u51b3\u56f4\u7ed5\u8be5\u4fdd\u9669\u4ea7\u54c1\u7684\u76d1\u7ba1\u95ee\u9898\u662f\u6709\u610f\u4e49\u7684\u3002<\/p>\n\n<p><a href=\"http:\/\/www.mcneilandcompany.com\/blog\/5-tips-for-selling-cyber-liability-to-small-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tim Woitach\uff0cMcNeil<\/a> &amp; Co.\u7684\u8425\u9500\u7ecf\u7406\u3002\n\u4fdd\u9669\u8868\u793a\uff0c\u201c\u5fc5\u987b\u4f20\u8fbe\u76d1\u63a7\u60a8\u7684\u4fe1\u606f\u3001\u9632\u6b62\u6cc4\u9732\u3001\u53d1\u73b0\u548c\u963b\u6b62\u53d1\u751f\u7684\u4efb\u4f55\u6cc4\u9732\u3001\u5c06\u72af\u7f6a\u901a\u77e5\u6709\u5173\u5f53\u5c40\u5e76\u51cf\u8f7b\u540e\u679c\u6240\u9700\u7684\u5927\u91cf\u5de5\u4f5c\u3002\n\u867d\u7136\u5927\u516c\u53f8\u6709\u53ef\u4ee5\u5904\u7406\u8fd9\u4e9b\u95ee\u9898\u7684\u90e8\u95e8\uff0c\u4f46\u5c0f\u4f01\u4e1a\u901a\u5e38\u81ea\u5df1\u5904\u7406\u6240\u6709\u4e8b\u60c5\u3002\n\u8fd9\u4f7f\u5f97\u6db5\u76d6\u8fd9\u4e9b\u95ee\u9898\u7684\u4fdd\u9669\u53d8\u5f97\u66f4\u52a0\u91cd\u8981\u3002   <\/p>\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/businesswomen-meeting-1024x683.jpg\" alt=\"\" class=\"wp-image-10110\"\/><\/figure>\n\n<h2 class=\"wp-block-heading\">\u5c06\u4fdd\u9669\u4e0e\u4fdd\u62a4\u76f8\u7ed3\u5408<\/h2>\n\n<p>\u7f51\u7edc\u5b89\u5168\u52b3\u52a8\u529b\u5f00\u53d1\u5546 Transmosis \u7684\u9996\u5e2d\u6267\u884c\u5b98 <a href=\"https:\/\/www.securitymagazine.com\/articles\/94746-the-integration-of-small-business-cybersecurity-protection-and-cyber-insurance-an-emerging-trend-in-2021\" target=\"_blank\" rel=\"noreferrer noopener\">Chase Norlin<\/a> \u5199\u9053\uff0c\u4e00\u4e9b\u7ec4\u7ec7\u9009\u62e9\u5c06\u7f51\u7edc\u5b89\u5168\u4fdd\u62a4\u4e0e\u4fdd\u9669\u5408\u5e76\u3002\n\u201c\u5728\u8fd9\u79cd\u60c5\u51b5\u4e0b\uff0c\u53cc\u65b9\u90fd\u662f\u8d62\u5bb6\uff1a\u4fdd\u9669\u516c\u53f8\u901a\u8fc7\u5ba1\u67e5\u548c\u5229\u7528\u6700\u65b0\u6280\u672f\u6765\u964d\u4f4e\u653b\u51fb\u7684\u53ef\u80fd\u6027\uff0c\u4ece\u800c\u964d\u4f4e\u4e86\u6574\u4f53\u98ce\u9669\uff0c\u5c0f\u4f01\u4e1a\u4e3b\u4e0d\u518d\u9700\u8981\u9a7e\u9a6d\u8fd9\u79cd\u590d\u6742\u7684\u73af\u5883\u6765\u786e\u5b9a\u5728\u53d1\u751f\u8fdd\u89c4\u65f6\u5c06\u6db5\u76d6\u4ed6\u4eec\u7684\u6b63\u786e\u6280\u672f\u548c\u653f\u7b56\u3002\u201d <\/p>\n\n<p>\u867d\u7136\u8fd9\u4e00\u8d8b\u52bf\u4ecd\u5904\u4e8e\u8d77\u6b65\u9636\u6bb5\uff0c\u4f46\u201c\u6280\u672f\u548c\u4fdd\u9669\u7ed3\u5408\u5f97\u8d8a\u7d27\u5bc6\uff0c\u5bf9\u53cc\u65b9\u7684\u7ed3\u679c\u5c31\u8d8a\u597d\uff0c\u201dNorlin \u8865\u5145\u9053\u3002\n\u201c\u8fd9\u610f\u5473\u7740\u66f4\u5c11\u7684\u8fdd\u89c4\u884c\u4e3a\u3001\u66f4\u5c11\u7684\u4fdd\u9669\u7d22\u8d54\u3001\u5728\u6709\u7d22\u8d54\u65f6\u66f4\u5feb\u3001\u66f4\u5145\u5206\u7684\u8d54\u4ed8\uff0c\u4ee5\u53ca\u4fdd\u9669\u516c\u53f8\u5bf9\u627f\u62c5\u6301\u7eed\u98ce\u9669\u7684\u66f4\u5065\u5eb7\u7684\u80c3\u53e3\u3002\u201d <\/p>\n\n<p>\u4fdd\u9669\u516c\u53f8\u5b8c\u5168\u6709\u80fd\u529b\u63d0\u4f9b\u50cf\u8fdd\u89c4\u54cd\u5e94\u8fd9\u6837\u7684\u670d\u52a1\uff0cTechTarget \u7684\u6267\u884c\u7f16\u8f91 <a href=\"https:\/\/searchsecurity.techtarget.com\/feature\/The-ins-and-outs-of-cyber-insurance-coverage\" target=\"_blank\" rel=\"noreferrer noopener\">Sharon Shea<\/a> \u8bf4\u3002<\/p>\n\n<p>\u201c\u5f53\u6295\u4fdd\u4eba\u5c31\u53ef\u7591\u8fdd\u89c4\u884c\u4e3a\u8054\u7cfb\u4fdd\u9669\u516c\u53f8\u65f6\uff0c\u56e2\u961f\u6210\u5458\u4f1a\u8fc5\u901f\u505a\u51fa\u56de\u5e94\uff0c\u5e76\u6839\u636e\u9700\u8981\u5f15\u5165\u7b2c\u4e09\u65b9\u4e13\u5bb6\uff0c\u4f8b\u5982\u6cd5\u5f8b\u987e\u95ee\u6216\u6cd5\u533b\u8c03\u67e5\u5458\uff0c\u201d\u5979\u5199\u9053\u3002\n\u201c\u4fdd\u9669\u516c\u53f8\u8bbe\u6709\u670d\u52a1\u63d0\u4f9b\u5546\u5c0f\u7ec4\uff0c\u5305\u62ec\u6cd5\u533b\u5206\u6790\u5e08\u3001\u6570\u636e\u6cc4\u9732\u5f8b\u5e08\u3001\u547c\u53eb\u4e2d\u5fc3\u3001\u516c\u5173\u516c\u53f8\u548c\u5176\u4ed6\u4e13\u95e8\u4ece\u4e8b\u6cc4\u9732\u54cd\u5e94\u7684\u4f9b\u5e94\u5546\uff0c\u4ed6\u4eec\u53ef\u4ee5\u5728\u77ed\u65f6\u95f4\u5185\u63d0\u4f9b\u5e2e\u52a9\u3002\u5bf9\u4e8e\u4e2d\u5c0f\u578b\u7ec4\u7ec7\u6216\u4efb\u4f55\u4e0d\u65e5\u5e38\u7ba1\u7406\u6570\u636e\u6cc4\u9732\u5371\u673a\u7684\u5b9e\u4f53\u6765\u8bf4\uff0c\u7ecf\u9a8c\u4e30\u5bcc\u7684\u7b2c\u4e09\u65b9\u6cc4\u9732\u54cd\u5e94\u56e2\u961f\u7684\u670d\u52a1\u53ef\u4ee5\u8bc1\u660e\u662f\u65e0\u4ef7\u7684\u3002 <\/p>\n\n<h2 class=\"wp-block-heading\">\u4e2a\u6027\u5316\u5c01\u9762<\/h2>\n\n<p>\u65e0\u8bba\u54ea\u79cd\u4fdd\u9669\u4ea7\u54c1\uff0c\u6807\u51c6\u5316\u4fdd\u5355\u90fd\u4e0d\u9002\u7528\u4e8e\u5927\u591a\u6570\u516c\u53f8\u3002\n\u867d\u7136\u7f51\u7edc\u5b89\u5168\u7b56\u7565\u5305\u542b\u4e00\u4e9b\u6807\u51c6\u5143\u7d20\u7684\u7ec4\u5408\uff0c\u4f46\u4fdd\u9669\u7ecf\u7eaa\u548c\u54a8\u8be2\u516c\u53f8 Woodruff Sawyer \u7684\u5168\u56fd\u7f51\u7edc\u5b9e\u8df5\u8d1f\u8d23\u4eba <a href=\"https:\/\/woodruffsawyer.com\/cyber-liability\/cyber-101-liability-insurance-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dan Burke<\/a> \u8868\u793a\uff0c\u5305\u542b\u4e13\u5bb6\u8865\u5145\u7684\u66f4\u7ec6\u81f4\u7684\u65b9\u6cd5\u53ef\u4ee5\u63d0\u4f9b\u66f4\u597d\u7684\u8986\u76d6\u8303\u56f4\u3002 <\/p>\n\n<p>\u201c\u9664\u975e\u60a8\u77e5\u9053\u8981\u8981\u6c42\u4ec0\u4e48\uff0c\u5426\u5219\u7f51\u7edc\u4fdd\u9669\u5355\u7684\u8fd9\u4e9b\u589e\u5f3a\u529f\u80fd\u5e76\u4e0d\u603b\u662f\u53ef\u7528\u7684\uff0c\u800c\u4e14\u5982\u679c\u53ef\u7528\uff0c\u5b83\u4eec\u901a\u5e38\u4f1a\u88ab\u5206\u9879\u9650\u5236\u4e3a\u4f4e\u4e8e\u5b8c\u6574\u4fdd\u5355\u9650\u989d\u7684\u91d1\u989d\uff0c\u201dBurke \u89e3\u91ca\u8bf4\u3002<\/p>\n\n<p>\u8fd9\u5c06\u8981\u6c42\u8fd0\u8425\u5546\u4e86\u89e3\u4ed6\u4eec\u7684\u5546\u4e1a\u5ba2\u6237\uff0c <a href=\"https:\/\/agencyheight.medium.com\/four-strategies-to-sell-cyber-security-insurance-b220c4b0d516\" target=\"_blank\" rel=\"noreferrer noopener\">Agency Height<\/a> \u7684\u56e2\u961f\u8bf4\u3002\n\u201c\u6709\u4e9b\u4eba\u53ef\u80fd\u53ea\u6709\u6700\u4f4e\u9650\u5ea6\u7684\u7f51\u7edc\u5b89\u5168\u9700\u6c42\uff0c\u53ea\u60f3\u8981\u4e2d\u7b49\u6216\u6709\u9650\u7684\u8986\u76d6\u8303\u56f4\u3002\u53e6\u4e00\u65b9\u9762\uff0c\u7531\u4e8e\u7f51\u7edc\u98ce\u9669\u8f83\u9ad8\uff0c\u4fb5\u6743\u8d23\u4efb\u8f83\u4e25\u91cd\uff0c\u6709\u4e9b\u4eba\u53ef\u80fd\u5e0c\u671b\u83b7\u5f97\u5168\u9762\u7684\u4fdd\u969c\u3002\n\u4ed6\u4eec\u5efa\u8bae\u8fd0\u8425\u5546\u8ba8\u8bba\u5ba2\u6237\u7684\u8fd0\u8425\u548c\u6280\u672f\u4f7f\u7528\uff0c\u4ee5\u66f4\u597d\u5730\u4e86\u89e3\u4ed6\u4eec\u7684\u9700\u6c42\u5e76\u4e2a\u6027\u5316\u4fdd\u9669\u3002  <\/p>\n\n<p>\u82cf\u9ece\u4e16\u5317\u7f8e\u804c\u4e1a\u8d23\u4efb\u548c\u7f51\u7edc\u4e3b\u7ba1 <a href=\"https:\/\/www.pathpoint.com\/blog\/a-guide-to-picking-the-right-cyber-coverage-for-small-businesses\" target=\"_blank\" rel=\"noreferrer noopener\">Michelle Chia<\/a> \u5efa\u8bae\u4f01\u4e1a\u8bc4\u4f30\u5176\u98ce\u9669\u548c\u76f8\u5173\u6210\u672c\uff0c\u5e76\u9009\u62e9\u9488\u5bf9\u5176\u201c\u6838\u5fc3\u5173\u6ce8\u70b9\u201d\u91cf\u8eab\u5b9a\u5236\u7684\u4fdd\u5355\u3002<\/p>\n\n<p>\u201c\u5bf9\u4e8e\u4e00\u5bb6\u5728\u7ebf\u9500\u552e\u7684\u516c\u53f8\u6765\u8bf4\uff0c\u6700\u4ee4\u4eba\u62c5\u5fe7\u7684\u5f71\u54cd\u53ef\u80fd\u662f\u4e1a\u52a1\u4e2d\u65ad\u6216\u52d2\u7d22\u8f6f\u4ef6\uff0c\u201d\u5979\u8bf4\u3002\n\u201c\u53e6\u4e00\u65b9\u9762\uff0c\u533b\u7597\u529e\u516c\u5ba4\u516c\u53f8\u53ef\u80fd\u62c5\u5fc3\u4e22\u5931\u4fe1\u606f\u3001\u8fdd\u53cd HIPAA\u3001\u4e1a\u52a1\u4e2d\u65ad\u6216\u52d2\u7d22\u8f6f\u4ef6\u4e8b\u4ef6\u3002\u201d <\/p>\n\n<p>\u867d\u7136 SMB \u9762\u4e34\u7f51\u7edc\u5b89\u5168\u72af\u7f6a\u5206\u5b50\u7684\u5a01\u80c1\uff0c\u4f46\u5982\u679c\u5546\u4e1a\u8fd0\u8425\u5546\u6ca1\u6709\u51c6\u5907\u597d\u8fdb\u5165\u8fd9\u4e2a\u5feb\u901f\u589e\u957f\u7684\u5e02\u573a\uff0c\u4ed6\u4eec\u5c31\u6709\u53ef\u80fd\u5728\u7ade\u4e89\u4e2d\u8f93\u6389\u3002\n\u4e86\u89e3\u60a8\u7684\u5546\u4e1a\u5ba2\u6237\uff0c\u8bc4\u4f30\u4ed6\u4eec\u7684\u9700\u6c42\uff0c\u7136\u540e\u521b\u5efa\u4e2a\u6027\u5316\u4fdd\u9669\uff0c\u63d0\u4f9b\u4ed6\u4eec\u6240\u9700\u7684\u4fdd\u62a4\u3002 <\/p>\n\n<p><em>\u56fe\u7247\u63d0\u4f9b\uff1a <a href=\"https:\/\/unsplash.com\/@awcreativeut\" target=\"_blank\" rel=\"noreferrer noopener\">Adam Winger<\/a>\uff0c <a href=\"https:\/\/unsplash.com\/@jefflssantos\" target=\"_blank\" rel=\"noreferrer noopener\">Jefferson Santos<\/a>\uff0c <a href=\"https:\/\/unsplash.com\/@amyhirschi\" target=\"_blank\" rel=\"noreferrer noopener\">Amy Hirschi<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7f51\u7edc\u5b89\u5168\u53ef\u80fd\u4e0d\u662f\u5546\u4e1a\u5ba2\u6237\u7684\u9996\u8981\u4efb\u52a1\uff0c\u4f46\u5bf9\u4e8e\u6bcf\u4e2a\u8fd0\u8425\u5546\u3001\u7ecf\u7eaa\u4eba\u548c\u4ee3\u7406\u5546\u6765\u8bf4\u90fd\u5e94\u8be5\u5982\u6b64\u3002 \u4e2d\u5c0f\u578b\u4f01\u4e1a\u4ece\u672a\u50cf\u73b0\u5728\u8fd9\u6837 [&hellip;]<\/p>\n","protected":false},"featured_media":10131,"template":"","insight-category":[],"class_list":["post-19115","insight","type-insight","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/bolttech.io\/zh-hans\/wp-json\/wp\/v2\/insight\/19115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bolttech.io\/zh-hans\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/bolttech.io\/zh-hans\/wp-json\/wp\/v2\/types\/insight"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bolttech.io\/zh-hans\/wp-json\/wp\/v2\/media\/10131"}],"wp:attachment":[{"href":"https:\/\/bolttech.io\/zh-hans\/wp-json\/wp\/v2\/media?parent=19115"}],"wp:term":[{"taxonomy":"insight-category","embeddable":true,"href":"https:\/\/bolttech.io\/zh-hans\/wp-json\/wp\/v2\/insight-category?post=19115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}