{"id":19120,"date":"2024-09-20T08:44:34","date_gmt":"2024-09-20T13:44:34","guid":{"rendered":"https:\/\/bolttech.io\/insight\/%e7%b6%b2%e8%b7%af%e5%ae%89%e5%85%a8%e4%bf%9d%e9%9a%aa%ef%bc%9a%e6%b6%88%e9%99%a4smb%e5%ae%a2%e6%88%b6%e8%a6%86%e8%93%8b%e7%af%84%e5%9c%8d%e4%b8%ad%e7%9a%84%e8%96%84%e5%bc%b1%e7%92%b0%e7%af%80\/"},"modified":"2024-09-20T08:44:35","modified_gmt":"2024-09-20T13:44:35","slug":"%e7%b6%b2%e8%b7%af%e5%ae%89%e5%85%a8%e4%bf%9d%e9%9a%aa%ef%bc%9a%e6%b6%88%e9%99%a4smb%e5%ae%a2%e6%88%b6%e8%a6%86%e8%93%8b%e7%af%84%e5%9c%8d%e4%b8%ad%e7%9a%84%e8%96%84%e5%bc%b1%e7%92%b0%e7%af%80","status":"publish","type":"insight","link":"https:\/\/bolttech.io\/zh-hant\/insights\/%e7%b6%b2%e8%b7%af%e5%ae%89%e5%85%a8%e4%bf%9d%e9%9a%aa%ef%bc%9a%e6%b6%88%e9%99%a4smb%e5%ae%a2%e6%88%b6%e8%a6%86%e8%93%8b%e7%af%84%e5%9c%8d%e4%b8%ad%e7%9a%84%e8%96%84%e5%bc%b1%e7%92%b0%e7%af%80\/","title":{"rendered":"\u7db2\u8def\u5b89\u5168\u4fdd\u96aa\uff1a\u6d88\u9664SMB\u5ba2\u6236\u8986\u84cb\u7bc4\u570d\u4e2d\u7684\u8584\u5f31\u74b0\u7bc0"},"content":{"rendered":"\n<p>\u7db2\u8def\u5b89\u5168\u53ef\u80fd\u4e0d\u662f\u5546\u696d\u5ba2\u6236\u7684\u9996\u8981\u4efb\u52d9\uff0c\u4f46\u5c0d\u65bc\u6bcf\u500b\u904b\u71df\u5546\u3001\u7d93\u7d00\u4eba\u548c\u4ee3\u7406\u5546\u4f86\u8aaa\u90fd\u61c9\u8a72\u5982\u6b64\u3002<\/p>\n\n<p>\u4e2d\u5c0f\u578b\u4f01\u696d\u5f9e\u672a\u50cf\u73fe\u5728\u9019\u6a23\u9762\u81e8\u653b\u64ca\u98a8\u96aa\uff0c\u4f46\u5927\u591a\u6578\u4f01\u696d\u4ecd\u7136\u4e0d\u9858\u8cfc\u8cb7\u8db3\u5920\u7684\u4fdd\u96aa\u4f86\u4fdd\u8b77\u81ea\u5df1\u3002\n\u904b\u71df\u5546\u6709\u8cac\u4efb\u5411\u5ba2\u6236\u77ad\u89e3\u4e2d\u5c0f\u578b\u4f01\u696d \uff08SMB\uff09 \u9762\u81e8\u7684\u5a01\u8105\u5f62\u52e2\uff0c\u4e26\u63a1\u53d6\u63aa\u65bd\u63d0\u4f9b\u53ef\u63d0\u4f9b\u771f\u6b63\u50f9\u503c\u7684\u4fdd\u8b77\u3002 <\/p>\n\n<h2 class=\"wp-block-heading\">\u4e2d\u5c0f\u4f01\u696d\u9762\u81e8\u7684\u7db2\u8def\u5b89\u5168\u5a01\u8105\u771f\u5be6\u5b58\u5728\u4e14\u4e0d\u65b7\u589e\u9577<\/h2>\n\n<p>\u4e2d\u5c0f\u4f01\u696d\u662f\u99ed\u5ba2\u6700\u559c\u6b61\u7684\u76ee\u6a19\uff0cAmTrust Financial Services \u7db2\u8def\u9ad8\u7d1a\u526f\u7e3d\u88c1 <a href=\"https:\/\/riskandinsurance.com\/cyber-risk-for-small-businesses-understanding-your-individual-risks-and-what-you-can-actually-do\/\" target=\"_blank\" rel=\"noreferrer noopener\">Aaron Basilius<\/a> \u8aaa\u3002\n\u653b\u64ca\u5927\u516c\u53f8\u53ef\u80fd\u6703\u5e36\u4f86\u5de8\u984d\u652f\u51fa\uff0c\u4f46\u9019\u4e9b\u7d44\u7e54\u4e5f\u66f4\u6709\u80fd\u529b\u61c9\u5c0d\u7db2\u8def\u653b\u64ca\u3002\nSMB \u7684\u56de\u5831\u53ef\u80fd\u8f03\u5c0f\uff0c\u4f46\u4ed6\u5011\u662f\u4e00\u500b\u66f4\u5bb9\u6613\u7684\u76ee\u6a19\u3002  <\/p>\n\n<p>\u5c0f\u4f01\u696d\u662f\u5426\u50cf\u8de8\u570b\u516c\u53f8\u4e00\u6a23\u64c1\u6709\u9f90\u5927\u7684\u9280\u884c\u5e33\u6236\uff1f\u4e0d\uff0c\u201cBasilius \u8aaa\u3002\n\u201c\u4f46\u7e3d\u7684\u4f86\u8aaa\uff0c\u9032\u5165\u5c0f\u4f01\u696d\u7684\u7cfb\u7d71\u66f4\u5bb9\u6613\u3002\u99ed\u5ba2\u4e0d\u5fc5\u8cbb\u76e1\u5fc3\u601d\u5c31\u80fd\u9032\u5165\u90a3\u88e1\u3002 <\/p>\n\n<p>\u99ed\u5ba2\u4ee5\u6578\u64da\u70ba\u76ee\u6a19\uff0cComcast Business \u7db2\u8def\u5b89\u5168\u7522\u54c1\u526f\u7e3d\u88c1 <a href=\"https:\/\/www.securitymagazine.com\/articles\/91806-as-cyber-attacks-become-more-prevalent-heres-why-your-small-business-is-at-risk\" target=\"_blank\" rel=\"noreferrer noopener\">Shena Tharnish<\/a> \u5beb\u9053\u3002\n\u9019\u53ef\u80fd\u5305\u62ec\u53ef\u4ee5\u5728\u6697\u7db2\u4e0a\u51fa\u552e\u7684\u500b\u4eba\u6578\u64da\uff0c\u4f8b\u5982\u4fe1\u7528\u5361\u8a73\u7d30\u8cc7\u8a0a\u548c\u91ab\u7642\u8a18\u9304\u3002 <\/p>\n\n<p>\u5979\u8aaa\uff0c\u7db2\u8def\u653b\u64ca\u7684\u5176\u4ed6\u52d5\u6a5f\u5305\u62ec\uff1a<\/p>\n\n<ul class=\"wp-block-list\">\n<li>\u7372\u5f97\u57f7\u884c\u5927\u898f\u6a21 DDoS \u653b\u64ca\u7684\u8a08\u7b97\u80fd\u529b\u3002<\/li>\n\n\n\n<li>\u901a\u904e\u5f8c\u9580\u8a2a\u554f\u5927\u516c\u53f8\uff0c\u5f9e\u800c\u7372\u5f97\u66f4\u5927\u7684\u652f\u51fa\u3002<\/li>\n\n\n\n<li>\u8d16\u91d1\u5f62\u5f0f\u7684\u73fe\u91d1\u3002<\/li>\n<\/ul>\n\n<p>\u5927\u6d41\u884c\u5c0d\u99ed\u5ba2\u4f86\u8aaa\u662f\u4e00\u500b\u798f\u97f3\uff0c\u4ed6\u5011\u5f88\u5feb\u5c31\u5229\u7528\u4e86\u9060\u7aef\u5de5\u4f5c\u9020\u6210\u7684\u6f0f\u6d1e\u3002\n\u806f\u90a6\u8abf\u67e5\u5c40\u7db2\u8def\u90e8\u9580\u526f\u52a9\u7406\u4e3b\u4efb\u6258 <a href=\"https:\/\/www.msspalert.com\/cybersecurity-news\/fbi-covid-19-cyberattacks-spike-400-in-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5c3c\u4e9e\u00b7\u70cf\u6208\u96f7\u8328 \uff08Tonya Ugoretz<\/a>\uff09 \u8868\u793a\uff0c\u81ea\u5927\u6d41\u884c\u958b\u59cb\u4ee5\u4f86\uff0c\u8a72\u5c40\u4e92\u806f\u7db2\u72af\u7f6a\u6295\u8a34\u4e2d\u5fc3\u6536\u5230\u7684\u5728\u7dda\u72af\u7f6a\u5831\u544a\u589e\u52a0\u4e86\u7d04 400%\uff0c\u5f9e\u6bcf\u5929 1,000 \u8d77\u98c6\u5347\u81f3 4,000 \u8d77\u7684\u9ad8\u9ede\u3002 <\/p>\n\n<p><a href=\"https:\/\/www.thestar.com\/business\/2021\/02\/04\/small-businesses-pivoting-online-because-of-covid-19-are-vulnerable-to-cyber-attacks-cfib-report.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u64da\u52a0\u62ff\u5927\u7368\u7acb\u4f01\u696d\u806f\u5408\u6703 \uff08Canadian Federation of Independent Business<\/a>\uff09 \u5831\u544a\uff0c2020 \u5e74\uff0c\u52a0\u62ff\u5927\u6709\u6578\u5343\u5bb6\u4f01\u696d\u6210\u70ba\u7db2\u8def\u653b\u64ca\u7684\u53d7\u5bb3\u8005\u3002\n2020 \u5e74 10 \u6708\u5c0d 3,040 \u5bb6\u4e2d\u5c0f\u578b\u4f01\u696d\u9032\u884c\u7684\u4e00\u9805\u8abf\u67e5\u767c\u73fe\uff0c\u81ea\u7576\u5e74 3 \u6708\u4ee5\u4f86\uff0c\u8fd1\u56db\u5206\u4e4b\u4e00\u7684\u4f01\u696d\u906d\u53d7\u904e\u653b\u64ca\u3002\n\u8fd1 5% \u7684\u53d7\u8a2a\u8005\u8868\u793a\u653b\u64ca\u6210\u529f\uff0c\u9019\u610f\u5473\u8457\u5982\u679c\u63a8\u65b7\u5168\u570b\u7bc4\u570d\u5167\u7684\u6578\u4f4d\uff0c\u53ef\u80fd\u6709\u8d85\u904e 60,000 \u5bb6\u4f01\u696d\u6210\u70ba\u53d7\u5bb3\u8005\u3002  <\/p>\n\n<p>\u5118\u7ba1\u98a8\u96aa\u5f88\u660e\u986f\uff0c\u4f46\u7db2\u8def\u5b89\u5168\u4fdd\u96aa\u4ecd\u7136\u4e0d\u662f\u6700\u5bb9\u6613\u92b7\u552e\u7684\u3002\n\u904b\u71df\u5546\u5fc5\u9808\u5c0d\u5546\u696d\u5ba2\u6236\u9032\u884c\u57f9\u8a13\uff0c\u89e3\u6c7a\u76e3\u7ba1\u554f\u984c\uff0c\u63d0\u4f9b\u500b\u4eba\u5316\u4fdd\u96aa\uff0c\u4e26\u63d0\u4f9b\u6574\u5408\u670d\u52d9\uff0c\u4ee5\u4fbf\u5728\u6b64\u554f\u984c\u4e0a\u8207 SMB \u5efa\u7acb\u806f\u7e6b\u3002 <\/p>\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-1024x683.jpg\" alt=\"\" class=\"wp-image-10120\" srcset=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-1024x683.jpg 1024w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-300x200.jpg 300w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding-768x512.jpg 768w, https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/engineer-coding.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<p id=\"gdcalert2\"><\/p>\n\n<h2 class=\"wp-block-heading\">\u6559\u80b2\u5546\u696d\u5ba2\u6236<\/h2>\n\n<p>\u70ba\u4e86\u8207SMB\u5efa\u7acb\u6709\u610f\u7fa9\u7684\u806f\u7e6b\uff0c\u904b\u71df\u5546\u5fc5\u9808\u514b\u670d\u570d\u7e5e\u7db2\u8def\u5b89\u5168\u548c\u4fdd\u96aa\u7684\u77e5\u8b58\u5dee\u8ddd\u3002\n\u4fdd\u96aa\u516c\u53f8 <a href=\"https:\/\/www.sedgwick.com\/assets\/uploads\/documents\/The-SME-Cyber-Insurance-Market_Perception-and-Adoption.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Sedgwick<\/a> \u767c\u73fe\uff0c\u96d6\u7136\u4e2d\u5c0f\u4f01\u696d\u5c0d\u7db2\u8def\u98a8\u96aa\u7684\u610f\u8b58\u6bd4\u7d93\u7d00\u4eba\u8a8d\u70ba\u7684\u8981\u9ad8\uff0c\u4f46\u201c\u53ea\u6709\u4e0d\u5230 20% \u7684\u4f01\u696d\u8cfc\u8cb7\u4e86\u7db2\u7edc\u5c08\u7528\u4fdd\u96aa\u201d\u3002\n\u6b64\u5916\uff0c\u5927\u591a\u6578\u5c0f\u4f01\u696d\u54e1\u5de5\u6c92\u6709\u63a5\u53d7\u904e\u7db2\u8def\u5b89\u5168\u610f\u8b58\u57f9\u8a13\u3002  <\/p>\n\n<p>\u66f4\u7cdf\u7cd5\u7684\u662f\uff0c\u5728 COVID-19 \u5927\u6d41\u884c\u4e4b\u5f8c\uff0c\u4e2d\u5c0f\u4f01\u696d\u958b\u59cb\u5c07\u7db2\u8def\u5b89\u5168\u4fdd\u96aa\u8996\u70ba\u4e00\u7a2e\u5962\u4f88\u54c1\uff0cVerisk \u8ca1\u7522\u7d22\u8ce0\u670d\u52d9\u4e3b\u7ba1 <a href=\"https:\/\/hbr.org\/2021\/01\/cybersecurity-insurance-has-a-big-problem\" target=\"_blank\" rel=\"noreferrer noopener\">Tom Johansmeyer<\/a> \u5beb\u9053\u3002<\/p>\n\n<p>\u7136\u800c\uff0c\u9818\u5148\u7684\u7db2\u8def\u5b89\u5168\u4fdd\u96aa\u63d0\u4f9b\u8005\u5df2\u7d93\u5728\u5c0d\u5ba2\u6236\u9032\u884c\u57f9\u8a13\uff0c\u7db2\u8def\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\u4f9b\u61c9\u5546 Cyberscout \u7684\u9996\u5e2d\u884c\u92b7\u5b98 <a href=\"https:\/\/www.insurancebusinessmag.com\/us\/news\/cyber\/do-your-part-to-help-small-businesses-become-cyber-safe-242367.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Jeremy Barnett<\/a> \u8aaa\u3002<\/p>\n\n<p>\u201c\u56e0\u70ba\u5b83\u662f\u4e00\u7a2e\u76f8\u5c0d\u8f03\u65b0\u7684\u4fdd\u96aa\u7522\u54c1\uff0c\u5c0f\u4f01\u696d\u4e3b\u4e0d\u4e00\u5b9a\u719f\u6089\u6240\u6709\u4e0d\u540c\u7684\u4fdd\u96aa\u7bc4\u570d\uff0c\u6240\u4ee5\u4fdd\u96aa\u516c\u53f8\u70ba\u4ed6\u5011\u63d0\u4f9b\u4e86\u5f88\u597d\u7684\u6559\u80b2\u8cc7\u6e90\uff0c\u201d\u4ed6\u89e3\u91cb\u8aaa\u3002\n\u201c\u60a8\u4e0d\u50c5\u5728\u8cfc\u8cb7\u4fdd\u96aa\uff0c\u800c\u4e14\u9084\u5728\u8cfc\u8cb7\u7db2\u7edc\u652f\u6301\u8cc7\u6e90\u3002\u201d <\/p>\n\n<h2 class=\"wp-block-heading\">\u89e3\u6c7a\u76e3\u7ba1\u554f\u984c<\/h2>\n\n<p>\u9060\u7aef\u5c08\u6848\u7ba1\u7406\u5e73\u81fa Symba \u7684\u9996\u5e2d\u71df\u92b7\u7d93\u7406 <a href=\"https:\/\/www.zeguro.com\/blog\/the-state-of-the-cyber-insurance-market-for-smbs\" target=\"_blank\" rel=\"noreferrer noopener\">Ellen Zhang<\/a> \u8868\u793a\uff0c\u4e2d\u5c0f\u4f01\u696d\u5c0b\u6c42\u8cfc\u8cb7\u7db2\u8def\u5b89\u5168\u4fdd\u96aa\u7684\u4e3b\u8981\u539f\u56e0\u4e4b\u4e00\u662f\u5c65\u884c\u5408\u540c\u7fa9\u52d9\u3002\n\u201c\u8a31\u591a\u4f01\u696d\u5f37\u5236\u8981\u6c42\u8207\u4ed6\u5011\u5408\u4f5c\u7684\u7b2c\u4e09\u65b9\u8cfc\u8cb7\u7db2\u7edc\u4fdd\u96aa\u3002\u201d <\/p>\n\n<p>\u56e0\u6b64\uff0c\u4fdd\u96aa\u516c\u53f8\u89e3\u6c7a\u570d\u7e5e\u8a72\u4fdd\u96aa\u7522\u54c1\u7684\u76e3\u7ba1\u554f\u984c\u662f\u6709\u610f\u7fa9\u7684\u3002<\/p>\n\n<p><a href=\"http:\/\/www.mcneilandcompany.com\/blog\/5-tips-for-selling-cyber-liability-to-small-businesses\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tim Woitach\uff0cMcNeil<\/a> &amp; Co.\u7684\u71df\u92b7\u7d93\u7406\u3002\n\u4fdd\u96aa\u8868\u793a\uff0c\u300c\u5fc5\u9808\u50b3\u9054\u76e3\u63a7\u60a8\u7684\u8cc7\u8a0a\u3001\u9632\u6b62\u6d29\u9732\u3001\u767c\u73fe\u548c\u963b\u6b62\u767c\u751f\u7684\u4efb\u4f55\u6d29\u9732\u3001\u5c07\u72af\u7f6a\u901a\u77e5\u6709\u95dc\u7576\u5c40\u4e26\u6e1b\u8f15\u5f8c\u679c\u6240\u9700\u7684\u5927\u91cf\u5de5\u4f5c\u3002\n\u96d6\u7136\u5927\u516c\u53f8\u6709\u53ef\u4ee5\u8655\u7406\u9019\u4e9b\u554f\u984c\u7684\u90e8\u9580\uff0c\u4f46\u5c0f\u4f01\u696d\u901a\u5e38\u81ea\u5df1\u8655\u7406\u6240\u6709\u4e8b\u60c5\u3002\n\u9019\u4f7f\u5f97\u6db5\u84cb\u9019\u4e9b\u554f\u984c\u7684\u4fdd\u96aa\u8b8a\u5f97\u66f4\u52a0\u91cd\u8981\u3002   <\/p>\n\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/bolttech.io\/wp-content\/uploads\/2024\/09\/businesswomen-meeting-1024x683.jpg\" alt=\"\" class=\"wp-image-10110\"\/><\/figure>\n\n<h2 class=\"wp-block-heading\">\u5c07\u4fdd\u96aa\u8207\u4fdd\u8b77\u76f8\u7d50\u5408<\/h2>\n\n<p>\u7db2\u8def\u5b89\u5168\u52de\u52d5\u529b\u958b\u767c\u5546 Transmosis \u7684\u9996\u5e2d\u57f7\u884c\u5b98 <a href=\"https:\/\/www.securitymagazine.com\/articles\/94746-the-integration-of-small-business-cybersecurity-protection-and-cyber-insurance-an-emerging-trend-in-2021\" target=\"_blank\" rel=\"noreferrer noopener\">Chase Norlin<\/a> \u5beb\u9053\uff0c\u4e00\u4e9b\u7d44\u7e54\u9078\u64c7\u5c07\u7db2\u8def\u5b89\u5168\u4fdd\u8b77\u8207\u4fdd\u96aa\u5408\u4f75\u3002\n\u201c\u5728\u9019\u7a2e\u60c5\u6cc1\u4e0b\uff0c\u96d9\u65b9\u90fd\u662f\u8d0f\u5bb6\uff1a\u4fdd\u96aa\u516c\u53f8\u901a\u904e\u5be9\u67e5\u548c\u5229\u7528\u6700\u65b0\u6280\u8853\u4f86\u964d\u4f4e\u653b\u64ca\u7684\u53ef\u80fd\u6027\uff0c\u5f9e\u800c\u964d\u4f4e\u4e86\u6574\u9ad4\u98a8\u96aa\uff0c\u5c0f\u4f01\u696d\u4e3b\u4e0d\u518d\u9700\u8981\u99d5\u99ad\u9019\u7a2e\u8907\u96dc\u7684\u74b0\u5883\u4f86\u78ba\u5b9a\u5728\u767c\u751f\u9055\u898f\u6642\u5c07\u6db5\u84cb\u4ed6\u5011\u7684\u6b63\u78ba\u6280\u8853\u548c\u653f\u7b56\u3002\u201d <\/p>\n\n<p>\u96d6\u7136\u9019\u4e00\u8da8\u52e2\u4ecd\u8655\u65bc\u8d77\u6b65\u968e\u6bb5\uff0c\u4f46\u300c\u6280\u8853\u548c\u4fdd\u96aa\u7d50\u5408\u5f97\u8d8a\u7dca\u5bc6\uff0c\u5c0d\u96d9\u65b9\u7684\u7d50\u679c\u5c31\u8d8a\u597d\uff0c\u300dNorlin \u88dc\u5145\u9053\u3002\n\u201c\u9019\u610f\u5473\u8457\u66f4\u5c11\u7684\u9055\u898f\u884c\u70ba\u3001\u66f4\u5c11\u7684\u4fdd\u96aa\u7d22\u8ce0\u3001\u5728\u6709\u7d22\u8ce0\u6642\u66f4\u5feb\u3001\u66f4\u5145\u5206\u7684\u8ce0\u4ed8\uff0c\u4ee5\u53ca\u4fdd\u96aa\u516c\u53f8\u5c0d\u627f\u64d4\u6301\u7e8c\u98a8\u96aa\u7684\u66f4\u5065\u5eb7\u7684\u80c3\u53e3\u3002\u201d <\/p>\n\n<p>\u4fdd\u96aa\u516c\u53f8\u5b8c\u5168\u6709\u80fd\u529b\u63d0\u4f9b\u50cf\u9055\u898f\u56de\u61c9\u9019\u6a23\u7684\u670d\u52d9\uff0cTechTarget \u7684\u57f7\u884c\u7de8\u8f2f <a href=\"https:\/\/searchsecurity.techtarget.com\/feature\/The-ins-and-outs-of-cyber-insurance-coverage\" target=\"_blank\" rel=\"noreferrer noopener\">Sharon Shea<\/a> \u8aaa\u3002<\/p>\n\n<p>\u201c\u7576\u6295\u4fdd\u4eba\u5c31\u53ef\u7591\u9055\u898f\u884c\u70ba\u806f\u7e6b\u4fdd\u96aa\u516c\u53f8\u6642\uff0c\u5718\u968a\u6210\u54e1\u6703\u8fc5\u901f\u505a\u51fa\u56de\u61c9\uff0c\u4e26\u6839\u64da\u9700\u8981\u5f15\u5165\u7b2c\u4e09\u65b9\u5c08\u5bb6\uff0c\u4f8b\u5982\u6cd5\u5f8b\u9867\u554f\u6216\u6cd5\u91ab\u8abf\u67e5\u54e1\uff0c\u201d\u5979\u5beb\u9053\u3002\n\u201c\u4fdd\u96aa\u516c\u53f8\u8a2d\u6709\u670d\u52d9\u63d0\u4f9b\u8005\u5c0f\u7d44\uff0c\u5305\u62ec\u6cd5\u91ab\u5206\u6790\u5e2b\u3001\u6578\u64da\u6d29\u9732\u5f8b\u5e2b\u3001\u547c\u53eb\u4e2d\u5fc3\u3001\u516c\u95dc\u516c\u53f8\u548c\u5176\u4ed6\u5c08\u9580\u5f9e\u4e8b\u6d29\u9732\u56de\u61c9\u7684\u4f9b\u61c9\u5546\uff0c\u4ed6\u5011\u53ef\u4ee5\u5728\u77ed\u6642\u9593\u5167\u63d0\u4f9b\u8aac\u660e\u3002\u5c0d\u65bc\u4e2d\u5c0f\u578b\u7d44\u7e54\u6216\u4efb\u4f55\u4e0d\u65e5\u5e38\u7ba1\u7406\u6578\u64da\u6d29\u9732\u5371\u6a5f\u7684\u5be6\u9ad4\u4f86\u8aaa\uff0c\u7d93\u9a57\u8c50\u5bcc\u7684\u7b2c\u4e09\u65b9\u6d29\u9732\u56de\u61c9\u5718\u968a\u7684\u670d\u52d9\u53ef\u4ee5\u8b49\u660e\u662f\u7121\u50f9\u7684\u3002 <\/p>\n\n<h2 class=\"wp-block-heading\">\u500b\u4eba\u5316\u5c01\u9762<\/h2>\n\n<p>\u7121\u8ad6\u54ea\u7a2e\u4fdd\u96aa\u7522\u54c1\uff0c\u6a19\u6e96\u5316\u4fdd\u55ae\u90fd\u4e0d\u9069\u7528\u65bc\u5927\u591a\u6578\u516c\u53f8\u3002\n\u96d6\u7136\u7db2\u8def\u5b89\u5168\u7b56\u7565\u5305\u542b\u4e00\u4e9b\u6a19\u6e96\u5143\u7d20\u7684\u7d44\u5408\uff0c\u4f46\u4fdd\u96aa\u7d93\u7d00\u548c\u8aee\u8a62\u516c\u53f8 Woodruff Sawyer \u7684\u5168\u570b\u7db2\u8def\u5be6\u8e10\u8ca0\u8cac\u4eba <a href=\"https:\/\/woodruffsawyer.com\/cyber-liability\/cyber-101-liability-insurance-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dan Burke<\/a> \u8868\u793a\uff0c\u5305\u542b\u5c08\u5bb6\u88dc\u5145\u7684\u66f4\u7d30\u7dfb\u7684\u65b9\u6cd5\u53ef\u4ee5\u63d0\u4f9b\u66f4\u597d\u7684\u8986\u84cb\u7bc4\u570d\u3002 <\/p>\n\n<p>\u201c\u9664\u975e\u60a8\u77e5\u9053\u8981\u8981\u6c42\u4ec0\u9ebc\uff0c\u5426\u5247\u7db2\u7edc\u4fdd\u96aa\u55ae\u7684\u9019\u4e9b\u589e\u5f37\u529f\u80fd\u4e26\u4e0d\u7e3d\u662f\u53ef\u7528\u7684\uff0c\u800c\u4e14\u5982\u679c\u53ef\u7528\uff0c\u5b83\u5011\u901a\u5e38\u6703\u88ab\u5206\u9805\u9650\u5236\u70ba\u4f4e\u65bc\u5b8c\u6574\u4fdd\u55ae\u9650\u984d\u7684\u91d1\u984d\uff0c\u201dBurke \u89e3\u91cb\u8aaa\u3002<\/p>\n\n<p>\u9019\u5c07\u8981\u6c42\u904b\u71df\u5546\u77ad\u89e3\u4ed6\u5011\u7684\u5546\u696d\u5ba2\u6236\uff0c <a href=\"https:\/\/agencyheight.medium.com\/four-strategies-to-sell-cyber-security-insurance-b220c4b0d516\" target=\"_blank\" rel=\"noreferrer noopener\">Agency Height<\/a> \u7684\u5718\u968a\u8aaa\u3002\n\u6709\u4e9b\u4eba\u53ef\u80fd\u53ea\u6709\u6700\u4f4e\u9650\u5ea6\u7684\u7db2\u8def\u5b89\u5168\u9700\u6c42\uff0c\u53ea\u60f3\u8981\u4e2d\u7b49\u6216\u6709\u9650\u7684\u8986\u84cb\u7bc4\u570d\u3002\u53e6\u4e00\u65b9\u9762\uff0c\u7531\u65bc\u7db2\u8def\u98a8\u96aa\u8f03\u9ad8\uff0c\u4fb5\u6b0a\u8cac\u4efb\u8f03\u56b4\u91cd\uff0c\u6709\u4e9b\u4eba\u53ef\u80fd\u5e0c\u671b\u7372\u5f97\u5168\u9762\u7684\u4fdd\u969c\u3002\n\u4ed6\u5011\u5efa\u8b70\u904b\u71df\u5546\u8a0e\u8ad6\u5ba2\u6236\u7684\u904b\u71df\u548c\u6280\u8853\u4f7f\u7528\uff0c\u4ee5\u66f4\u597d\u5730\u4e86\u89e3\u4ed6\u5011\u7684\u9700\u6c42\u4e26\u500b\u4eba\u5316\u4fdd\u96aa\u3002  <\/p>\n\n<p>\u8607\u9ece\u4e16\u5317\u7f8e\u8077\u696d\u8cac\u4efb\u548c\u7db2\u8def\u4e3b\u7ba1<a href=\"https:\/\/www.pathpoint.com\/blog\/a-guide-to-picking-the-right-cyber-coverage-for-small-businesses\" target=\"_blank\" rel=\"noreferrer noopener\">MichelleChia<\/a>\u5efa\u8b70\u4f01\u696d\u8a55\u4f30\u5176\u98a8\u96aa\u548c\u76f8\u95dc\u6210\u672c\uff0c\u4e26\u9078\u64c7\u91dd\u5c0d\u5176\u201c\u6838\u5fc3\u95dc\u6ce8\u9ede\u201d\u91cf\u8eab\u5b9a\u88fd\u7684\u4fdd\u55ae\u3002<\/p>\n\n<p>\u201c\u5c0d\u65bc\u4e00\u5bb6\u5728\u7dda\u92b7\u552e\u7684\u516c\u53f8\u4f86\u8aaa\uff0c\u6700\u4ee4\u4eba\u64d4\u6182\u7684\u5f71\u97ff\u53ef\u80fd\u662f\u696d\u52d9\u4e2d\u65b7\u6216\u52d2\u7d22\u8edf\u9ad4\uff0c\u201d\u5979\u8aaa\u3002\n\u201c\u53e6\u4e00\u65b9\u9762\uff0c\u91ab\u7642\u8fa6\u516c\u5ba4\u516c\u53f8\u53ef\u80fd\u64d4\u5fc3\u4e1f\u5931\u8cc7\u8a0a\u3001\u9055\u53cd HIPAA\u3001\u696d\u52d9\u4e2d\u65b7\u6216\u52d2\u7d22\u8edf\u9ad4\u4e8b\u4ef6\u3002\u201d <\/p>\n\n<p>\u96d6\u7136SMB\u9762\u81e8\u7db2\u8def\u5b89\u5168\u72af\u7f6a\u5206\u5b50\u7684\u5a01\u8105\uff0c\u4f46\u5982\u679c\u5546\u696d\u904b\u71df\u5546\u6c92\u6709\u6e96\u5099\u597d\u9032\u5165\u9019\u500b\u5feb\u901f\u589e\u9577\u7684\u5e02\u5834\uff0c\u4ed6\u5011\u5c31\u6709\u53ef\u80fd\u5728\u7af6\u722d\u4e2d\u8f38\u6389\u3002\n\u77ad\u89e3\u60a8\u7684\u5546\u696d\u5ba2\u6236\uff0c\u8a55\u4f30\u4ed6\u5011\u7684\u9700\u6c42\uff0c\u7136\u5f8c\u5275\u5efa\u500b\u4eba\u5316\u4fdd\u96aa\uff0c\u63d0\u4f9b\u4ed6\u5011\u6240\u9700\u7684\u4fdd\u8b77\u3002 <\/p>\n\n<p><em>\u5716\u7247\u63d0\u4f9b\uff1a <a href=\"https:\/\/unsplash.com\/@awcreativeut\" target=\"_blank\" rel=\"noreferrer noopener\">Adam Winger<\/a>\uff0c <a href=\"https:\/\/unsplash.com\/@jefflssantos\" target=\"_blank\" rel=\"noreferrer noopener\">Jefferson Santos<\/a>\uff0c <a href=\"https:\/\/unsplash.com\/@amyhirschi\" target=\"_blank\" rel=\"noreferrer noopener\">Amy Hirschi<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7db2\u8def\u5b89\u5168\u53ef\u80fd\u4e0d\u662f\u5546\u696d\u5ba2\u6236\u7684\u9996\u8981\u4efb\u52d9\uff0c\u4f46\u5c0d\u65bc\u6bcf\u500b\u904b\u71df\u5546\u3001\u7d93\u7d00\u4eba\u548c\u4ee3\u7406\u5546\u4f86\u8aaa\u90fd\u61c9\u8a72\u5982\u6b64\u3002 \u4e2d\u5c0f\u578b\u4f01\u696d\u5f9e\u672a\u50cf\u73fe\u5728\u9019\u6a23 [&hellip;]<\/p>\n","protected":false},"featured_media":10132,"template":"","insight-category":[],"class_list":["post-19120","insight","type-insight","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/bolttech.io\/zh-hant\/wp-json\/wp\/v2\/insight\/19120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bolttech.io\/zh-hant\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/bolttech.io\/zh-hant\/wp-json\/wp\/v2\/types\/insight"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bolttech.io\/zh-hant\/wp-json\/wp\/v2\/media\/10132"}],"wp:attachment":[{"href":"https:\/\/bolttech.io\/zh-hant\/wp-json\/wp\/v2\/media?parent=19120"}],"wp:term":[{"taxonomy":"insight-category","embeddable":true,"href":"https:\/\/bolttech.io\/zh-hant\/wp-json\/wp\/v2\/insight-category?post=19120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}