{"id":2331,"date":"2020-05-12T08:10:59","date_gmt":"2020-05-12T16:10:59","guid":{"rendered":"https:\/\/internetsafety.trendmicro.com\/?page_id=2331"},"modified":"2021-11-03T00:53:06","modified_gmt":"2021-11-03T08:53:06","slug":"resources","status":"publish","type":"page","link":"https:\/\/www.trendmicro.com\/internet-safety\/business\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.9.9&#8243; custom_margin=&#8221;||||false|false&#8221; locked=&#8221;off&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; disabled_on=&#8221;off|off|off&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#f7f9f9&#8243; background_color_gradient_end=&#8221;#e5e5e5&#8243; parallax=&#8221;on&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_tablet=&#8221;40px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; width_last_edited=&#8221;on|desktop&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.10.6&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.10.6&#8243; custom_padding=&#8221;||||false|false&#8221; custom_padding_tablet=&#8221;0px||&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; padding_tablet=&#8221;0px||&#8221; padding_last_edited=&#8221;on|tablet&#8221; custom_padding__hover=&#8221;|||&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_text _builder_version=&#8221;4.10.6&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Open Sans|600|||||||&#8221; header_text_color=&#8221;#333333&#8243; header_font_size=&#8221;40px&#8221; header_line_height=&#8221;1.3em&#8221; header_font_size_tablet=&#8221;30px&#8221; header_font_size_phone=&#8221;25px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; inline_fonts=&#8221;Bubblegum Sans&#8221; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221;]<\/p>\n<h1><span style=\"font-family: Open Sans; color: #333333; --darkreader-inline-color: #c8c3bc;\" data-darkreader-inline-color=\"\">Resources<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.9&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;Faustina||||||||&#8221; header_text_color=&#8221;#0e7162&#8243; header_font_size=&#8221;60px&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||40px||false|false&#8221; custom_margin_tablet=&#8221;||40px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"font-size: large;\">Download our free PDF resources for your home and small businesses.<\/span><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/banner-business-tablet.jpg&#8221; alt=&#8221;Trend Micro Cybersecurity Education for Universities&#8221; title_text=&#8221;banner-business-tablet&#8221; show_bottom_space=&#8221;off&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.10.6&#8243; max_height=&#8221;515px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;|0vw||&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_intensity_slide=&#8221;2%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px|||||&#8221; custom_padding=&#8221;70px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"text-center\"><!-- [et_pb_line_break_holder] -->   Trend Micro\u2019s Internet Safety for Home &#038; Small Businesses Newsletters<!-- [et_pb_line_break_holder] -->  <\/h2>\n<p><!-- [et_pb_line_break_holder] --><pee class=\"text-center\"><!-- [et_pb_line_break_holder] -->  Get business advice from our tech experts and researchers. Download your free PDF today.<!-- [et_pb_line_break_holder] --><\/pee>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Are Employees the Weakest Link in Your Security Strategy&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Are-Employees-the-Weakest-Link-in-Your-Security-Strategy-Trend-Micro-October-2020-Newsletter.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-employees.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Are-Employees-the-Weakest-Link-in-Your-Security-Strategy-Trend-Micro-October-2020-Newsletter.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Choosing and Securing Your Video Conferencing Apps&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Choosing-and-Securing-Your-Video-Conferencing-Apps-SCORE-Trend-Micro-July-2020-Newsletter.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-men-laptop.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Choosing-and-Securing-Your-Video-Conferencing-Apps-SCORE-Trend-Micro-July-2020-Newsletter.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Working from Home in Response to the Ongoing Coronavirus (COVID-19) Outbreak&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Working-from-Home-in-Response-to-the-Ongoing-Coronavirus-COVID-19-Outbreak-SCORE-Trend-Micro-April-2020-Newsletter.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-woman-laptop.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Working-from-Home-in-Response-to-the-Ongoing-Coronavirus-COVID-19-Outbreak-SCORE-Trend-Micro-April-2020-Newsletter.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Four Things to Do If Your Email Gets Hacked&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Four-Things-to-Do-If-Your-Email-Account-Gets-Hacked-SCORE-January-2020-Newsletter.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-man-laptop.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Four-Things-to-Do-If-Your-Email-Account-Gets-Hacked-SCORE-January-2020-Newsletter.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Small and Midsize Businesses Face Greater Cybersecurity Risks and Challenges&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Small-and-Midsize-Businesses-Face-Greater-Cybersecurity-Risks-and-Challenges-SCORE-Trend-Micro-October-2019-Newsletter.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-mobile-collaboration.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Small-and-Midsize-Businesses-Face-Greater-Cybersecurity-Risks-and-Challenges-SCORE-Trend-Micro-October-2019-Newsletter.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Securing Social Media for Small Businesses&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Securing-Social-Media-for-Small-Businesses-SCORE-Trend-Miro-July-2019-Newsletter.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-meeting.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Securing-Social-Media-for-Small-Businesses-SCORE-Trend-Miro-July-2019-Newsletter.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#eeeeee&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"text-center\">Home and Small Business Security Blog<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; include_categories=&#8221;196&#8243; show_more=&#8221;on&#8221; show_categories=&#8221;off&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; read_more_font=&#8221;|600||on|||||&#8221; border_width_all_image=&#8221;1px&#8221; border_color_all_image=&#8221;#dddddd&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px|||||&#8221; custom_padding=&#8221;70px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"text-center\"><!-- [et_pb_line_break_holder] -->   Tip Sheets\u00a0 \u00a0<\/h2>\n<p><!-- [et_pb_line_break_holder] --><pee class=\"text-center\">\u00a0Get free safety tips and best practices in PDF.\u00a0<\/pee>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Smart Devices Need Smart Security \u2013 NCSA Webinar&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Smart-Devices-Need-Smart-Security.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-mobile-collaboration.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Smart-Devices-Need-Smart-Security.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;The Small Business Guide to Cybersecurity&#8221; url=&#8221;https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/initiative-education\/internet-safety-small-businesses\/guide_score-trend-micro-small-business-cybersecurity.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_SCORE-Trend-Micro-Small-Business-eGuide.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/initiative-education\/internet-safety-small-businesses\/guide_score-trend-micro-small-business-cybersecurity.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Top Online Threats to Small Businesses (Infographic)&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/SCORE-Trend-Micro-Top-Online-Threats-to-Small-Businesses.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_top-online-threats-to-smb.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/SCORE-Trend-Micro-Top-Online-Threats-to-Small-Businesses.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Trend Micro Initiative for Education Program Fact Sheet&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Initiative-for-Education-Program-Factsheet.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_Trend-Micro-Initiative-for-Education.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Initiative-for-Education-Program-Factsheet.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Trend Micro Internet Safety for Small Businesses (ISSB) Handout&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Internet-Safety-for-Small-Businesses-Handout.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smallbiz_handout.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Internet-Safety-for-Small-Businesses-Handout.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;SMB Tips: The Internet of Things (IoT)&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Internet-of-things.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smb-tips-IOT.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Internet-of-things.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Best Practices: Creating a Secure Password&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Creating-a-Secure-Password.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smb-tips-secure-passwords.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Creating-a-Secure-Password.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Best Practices: Securing Your Mobile Devices&#8221; url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Securing-Your-Mobile-Device.pdf&#8221; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smb-tips-secure-mobile-device.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; link_option_url=&#8221;\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Securing-Your-Mobile-Device.pdf&#8221; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Video&#8221; _builder_version=&#8221;4.9.9&#8243; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#eeeeee&#8221; background_color_gradient_end=&#8221;#ffffff&#8221; custom_padding=&#8221;0|1px|0|0px|false|false&#8221; collapsed=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"text-center\"><!-- [et_pb_line_break_holder] -->   Additional Resources\u00a0 \u00a0<\/h2>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1200px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f9f9&#8243; custom_padding=&#8221;10px|10px|10px|10px|true|true&#8221; border_radii=&#8221;on|4px|4px|4px|4px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#dddddd&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><!-- [et_pb_line_break_holder] -->  <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/\" target=\"_blank\" rel=\"noopener\">Security News<\/a><!-- [et_pb_line_break_holder] --><\/h3>\n<p><!-- [et_pb_line_break_holder] --><pee><!-- [et_pb_line_break_holder] -->  For corporate news and research papers<!-- [et_pb_line_break_holder] --><\/pee>[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f9f9&#8243; custom_padding=&#8221;10px|10px|10px|10px|true|true&#8221; border_radii=&#8221;on|4px|4px|4px|4px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#dddddd&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><!-- [et_pb_line_break_holder] -->  <a href=\"https:\/\/blog.trendmicro.com\/?_ga=2.211064214.2032333849.1590310990-783246245.1589991924\" target=\"_blank\" rel=\"noopener\">Simply Security Blog<\/a><!-- [et_pb_line_break_holder] --><\/h3>\n<p><!-- [et_pb_line_break_holder] --><pee><!-- [et_pb_line_break_holder] -->  For our in-house experts\u2019 adivce<!-- [et_pb_line_break_holder] --><\/pee>[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f9f9&#8243; custom_padding=&#8221;10px|10px|10px|10px|true|true&#8221; border_radii=&#8221;on|4px|4px|4px|4px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#dddddd&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><!-- [et_pb_line_break_holder] -->  <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/\" target=\"_blank\" rel=\"noopener\">Security Intelligence Blog<\/a><!-- [et_pb_line_break_holder] --><\/h3>\n<p><!-- [et_pb_line_break_holder] --><pee><!-- [et_pb_line_break_holder] --> For tech analyses on threat incidents<!-- [et_pb_line_break_holder] --><\/pee>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"text-center\"><!-- [et_pb_line_break_holder] -->   Small Business Webinars \u00a0<\/h2>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;534px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Trend Micro Webinar: Cybersecurity for Small Businesses (2019-2020)&#8221; url=&#8221;https:\/\/resources.trendmicro.com\/2019-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.179620396.946970260.1588599653-99398900.1587364581&#8243; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-global.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;360px&#8221; module_alignment=&#8221;center&#8221; link_option_url=&#8221;https:\/\/resources.trendmicro.com\/2019-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.179620396.946970260.1588599653-99398900.1587364581&#8243; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Trend Micro Webinar: Internet Security for Small Businesses (2018)&#8221; url=&#8221;https:\/\/resources.trendmicro.com\/2018-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.247979268.2032333849.1590310990-783246245.1589991924&#8243; url_new_window=&#8221;on&#8221; image=&#8221;\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_Internet-Security-for-Small-Businesses.jpg&#8221; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;360px&#8221; module_alignment=&#8221;center&#8221; link_option_url=&#8221;https:\/\/resources.trendmicro.com\/2018-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.247979268.2032333849.1590310990-783246245.1589991924&#8243; link_option_url_new_window=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#eeeeee&#8221; background_color_gradient_end=&#8221;#f7f9f9&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.9.9&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"sb-section sb-contact\">\r\n    <div class=\"row\">\r\n        <div class=\"col-12 col-md-12 col-lg-8 offset-lg-2\">\r\n            <h3 class=\"text-center\">Contact Us<\/h3>\r\n            <p class=\"text-center\">For inquiries about <strong>Internet Safety for Home & Small Businesses<\/strong> \u2013 whether you are interested in partnering with us, or belong to a school or an organization that would benefit from cybersecurity enablement workshops \u2013 contact us at <a href=\"mailto:csr_education@trendmicro.com?Subject=IHSB\">csr_education@trendmicro.com<\/a>.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n<hr style=\"margin:40px 0;\">\r\n<div class=\"sb-footer\">\r\n    <div class=\"row\">\r\n        <div class=\"issb col-12 col-md-12 col-lg-6 offset-lg-2\">\r\n            <h5>Internet Safety for Home & Small Businesses<\/h5>\r\n            <ul class=\"footer-ul\">\r\n                <li><a href=\"\/internet-safety\/business\/events\">Events<\/a><\/li>\r\n                <li><a href=\"\/internet-safety\/business\/resources\">Resources<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n        <div class=\"tm co-12 col-md-12 col-lg-3\">\r\n            <h5><a href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" title=\"Go to TrendMicro.com\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/2020\/05\/trend-micro-logo.png?v=2\" alt=\"Trend Micro logo\" width=\"150\" style=\"max-width: 150px !important;\"><\/a><\/h5>\r\n            <ul class=\"footer-ul\">\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/\">TrendMicro.com<\/a><\/li>\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/TMIE\" target=\"_blank\">Trend Micro Initiative for Education<\/a><\/li>\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/en_gb\/about\/legal.html\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policy<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n    <\/div>  \r\n<\/div>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;#f7f9f9&#8243; global_colors_info=&#8221;{}&#8221; use_background_color_gradient__hover=&#8221;off&#8221; use_background_color_gradient__hover_enabled=&#8221;off&#8221; background_color_gradient_start__hover=&#8221;#2b87da&#8221; background_color_gradient_start__hover_enabled=&#8221;#2b87da&#8221; background_color_gradient_end__hover=&#8221;#29c4a9&#8243; background_color_gradient_end__hover_enabled=&#8221;#29c4a9&#8243; background_color_gradient_type__hover=&#8221;linear&#8221; background_color_gradient_type__hover_enabled=&#8221;linear&#8221; background_color_gradient_direction__hover=&#8221;180deg&#8221; background_color_gradient_direction__hover_enabled=&#8221;180deg&#8221; background_color_gradient_direction_radial__hover=&#8221;center&#8221; background_color_gradient_direction_radial__hover_enabled=&#8221;center&#8221; background_color_gradient_start_position__hover=&#8221;0%&#8221; background_color_gradient_start_position__hover_enabled=&#8221;0%&#8221; background_color_gradient_end_position__hover=&#8221;100%&#8221; background_color_gradient_end_position__hover_enabled=&#8221;100%&#8221; background_color_gradient_overlays_image__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover_enabled=&#8221;off&#8221; parallax__hover=&#8221;off&#8221; parallax__hover_enabled=&#8221;off&#8221; parallax_method__hover=&#8221;on&#8221; parallax_method__hover_enabled=&#8221;on&#8221; background_size__hover=&#8221;cover&#8221; background_size__hover_enabled=&#8221;cover&#8221; background_position__hover=&#8221;center&#8221; background_position__hover_enabled=&#8221;center&#8221; background_repeat__hover=&#8221;no-repeat&#8221; background_repeat__hover_enabled=&#8221;no-repeat&#8221; background_blend__hover=&#8221;normal&#8221; background_blend__hover_enabled=&#8221;normal&#8221; allow_player_pause__hover=&#8221;off&#8221; allow_player_pause__hover_enabled=&#8221;off&#8221; background_video_pause_outside_viewport__hover=&#8221;on&#8221; background_video_pause_outside_viewport__hover_enabled=&#8221;on&#8221;][et_pb_fullwidth_image src=&#8221;\/internet-safety\/wp-content\/uploads\/2021\/05\/charity-23.png&#8221; _builder_version=&#8221;3.17.6&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_slide=&#8221;4%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_image][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ResourcesDownload our free PDF resources for your home and small businesses.Home and Small Business Security Blog<div class=\"sb-section sb-contact\">\r\n    <div class=\"row\">\r\n        <div class=\"col-12 col-md-12 col-lg-8 offset-lg-2\">\r\n            <h3 class=\"text-center\">Contact Us<\/h3>\r\n            <p class=\"text-center\">For inquiries about <strong>Internet Safety for Home & Small Businesses<\/strong> \u2013 whether you are interested in partnering with us, or belong to a school or an organization that would benefit from cybersecurity enablement workshops \u2013 contact us at <a href=\"mailto:csr_education@trendmicro.com?Subject=IHSB\">csr_education@trendmicro.com<\/a>.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n<hr style=\"margin:40px 0;\">\r\n<div class=\"sb-footer\">\r\n    <div class=\"row\">\r\n        <div class=\"issb col-12 col-md-12 col-lg-6 offset-lg-2\">\r\n            <h5>Internet Safety for Home & Small Businesses<\/h5>\r\n            <ul class=\"footer-ul\">\r\n                <li><a href=\"\/internet-safety\/business\/events\">Events<\/a><\/li>\r\n                <li><a href=\"\/internet-safety\/business\/resources\">Resources<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n        <div class=\"tm co-12 col-md-12 col-lg-3\">\r\n            <h5><a href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" title=\"Go to TrendMicro.com\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/internet-safety\/wp-content\/uploads\/2020\/05\/trend-micro-logo.png?v=2\" alt=\"Trend Micro logo\" width=\"150\" style=\"max-width: 150px !important;\"><\/a><\/h5>\r\n            <ul class=\"footer-ul\">\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/\">TrendMicro.com<\/a><\/li>\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/TMIE\" target=\"_blank\">Trend Micro Initiative for Education<\/a><\/li>\r\n                <li><a href=\"https:\/\/www.trendmicro.com\/en_gb\/about\/legal.html\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policy<\/a><\/li>\r\n            <\/ul>\r\n        <\/div>\r\n    <\/div>  \r\n<\/div><\/p>\n","protected":false},"author":19,"featured_media":0,"parent":2263,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<div class=\"sb-section sb-resources sb-newsletters\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-12\">\r\n<h3 class=\"text-center\">Trend Micro Small Business Newsletters<\/h3>\r\n<p style=\"text-align: center;\">Get business advice from our tech experts and researchers. Download your free PDF today.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n\r\n   <div class=\"row\">\r\n        <div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\r\n            <div class=\"row\">\r\n                <div class=\"col-xs-6 col-sm-6 col-md-6 col-lg-6\">\r\n                    <div class=\"card new\">\r\n                        <p><a title=\"Are Employees the Weakest Link in Your Security Strategy\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Are-Employees-the-Weakest-Link-in-Your-Security-Strategy-Trend-Micro-October-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-employees.jpg\" alt=\"Small business employees\"><\/a><\/p>\r\n                        <div class=\"card-body\">\r\n                        <h5 class=\"card-title\"><a title=\"Are Employees the Weakest Link in Your Security Strategy\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Are-Employees-the-Weakest-Link-in-Your-Security-Strategy-Trend-Micro-October-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Are Employees the Weakest Link in Your Security Strategy<\/a><\/h5>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"col-xs-6 col-sm-6 col-md-6 col-lg-6\">\r\n                    <div class=\"card\">\r\n                        <p><a title=\"Choosing and Securing Your Video Conferencing Apps\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Choosing-and-Securing-Your-Video-Conferencing-Apps-SCORE-Trend-Micro-July-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-men-laptop.jpg\" alt=\"Businessmen in their laptop\"><\/a><\/p>\r\n                        <div class=\"card-body\">\r\n                        <h5 class=\"card-title\"><a title=\"Choosing and Securing Your Video Conferencing Apps\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Choosing-and-Securing-Your-Video-Conferencing-Apps-SCORE-Trend-Micro-July-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Choosing and Securing Your Video Conferencing Apps<\/a><\/h5>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n        <div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\r\n            <div class=\"row\">\r\n                <div class=\"col-xs-6 col-sm-6 col-md-6 col-lg-6\">\r\n                    <div class=\"card\">\r\n                        <p><a title=\"Working from Home in Response to the Ongoing Coronavirus (COVID-19) Outbreak\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Working-from-Home-in-Response-to-the-Ongoing-Coronavirus-COVID-19-Outbreak-SCORE-Trend-Micro-April-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-woman-laptop.jpg\" alt=\"Small business woman in her laptop\"><\/a><\/p>\r\n                        <div class=\"card-body\">\r\n                        <h5 class=\"card-title\"><a title=\"Working from Home in Response to the Ongoing Coronavirus (COVID-19) Outbreak\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Working-from-Home-in-Response-to-the-Ongoing-Coronavirus-COVID-19-Outbreak-SCORE-Trend-Micro-April-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Working from Home in Response to the Ongoing Coronavirus (COVID-19) Outbreak<\/a><\/h5>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"col-xs-6 col-sm-6 col-md-6 col-lg-6\">\r\n                    <div class=\"card\">\r\n                        <p><a title=\"Four Things to Do If Your Email Gets Hacked\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Four-Things-to-Do-If-Your-Email-Account-Gets-Hacked-SCORE-January-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-man-laptop.jpg\" alt=\"Small business man in his laptop\"><\/a><\/p>\r\n                        <div class=\"card-body\">\r\n                        <h5 class=\"card-title\"><a title=\"Four Things to Do If Your Email Gets Hacked\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Four-Things-to-Do-If-Your-Email-Account-Gets-Hacked-SCORE-January-2020-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Four Things to Do If Your Email Gets Hacked<\/a><\/h5>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n        <div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\r\n            <div class=\"row\">\r\n                <div class=\"col-xs-6 col-sm-6 col-md-6 col-lg-6\">\r\n                    <div class=\"card\">\r\n                        <p><a title=\"Small and Midsize Businesses Face Greater Cybersecurity Risks and Challenges\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Small-and-Midsize-Businesses-Face-Greater-Cybersecurity-Risks-and-Challenges-SCORE-Trend-Micro-October-2019-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-mobile-collaboration.jpg\" alt=\"Small business mobile collaboration\"><\/a><\/p>\r\n                        <div class=\"card-body\">\r\n                        <h5 class=\"card-title\"><a title=\"Small and Midsize Businesses Face Greater Cybersecurity Risks and Challenges\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Small-and-Midsize-Businesses-Face-Greater-Cybersecurity-Risks-and-Challenges-SCORE-Trend-Micro-October-2019-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Small and Midsize Businesses Face Greater Cybersecurity Risks and Challenges<\/a><\/h5>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"col-xs-6 col-sm-6 col-md-6 col-lg-6\">\r\n                    <div class=\"card\">\r\n                        <p><a title=\"Securing Social Media for Small Businesses\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Securing-Social-Media-for-Small-Businesses-SCORE-Trend-Miro-July-2019-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-meeting.jpg\" alt=\"\"><\/a><\/p>\r\n                        <div class=\"card-body\">\r\n                        <h5 class=\"card-title\"><a title=\"Securing Social Media for Small Businesses\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Securing-Social-Media-for-Small-Businesses-SCORE-Trend-Miro-July-2019-Newsletter.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Securing Social Media for Small Businesses<\/a><\/h5>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n<!--\/.sb-newsletters -->\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-resources sb-tipsheets\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-12\">\r\n<h3 class=\"text-center\">Tip Sheets<\/h3>\r\n<p style=\"text-align: center;\">Get free safety tips and best practices in PDF.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Smart Devices Need Smart Security - NCSA Webinar\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Smart-Devices-Need-Smart-Security.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-mobile-collaboration.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Smart Devices Need Smart Security - NCSA Webinar\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Smart-Devices-Need-Smart-Security.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Smart Devices Need Smart Security - NCSA Webinar<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"The Small Business Guide to Cybersecurity\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/initiative-education\/internet-safety-small-businesses\/guide_score-trend-micro-small-business-cybersecurity.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_SCORE-Trend-Micro-Small-Business-eGuide.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"The Small Business Guide to Cybersecurity\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/initiative-education\/internet-safety-small-businesses\/guide_score-trend-micro-small-business-cybersecurity.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The Small Business Guide to Cybersecurity<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Top Online Threats to Small Businesses (Infographic)\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/SCORE-Trend-Micro-Top-Online-Threats-to-Small-Businesses.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_top-online-threats-to-smb.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Protect Your Small Business Assets Agaisnt Cyber Threats (2019)\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/SCORE-Trend-Micro-Top-Online-Threats-to-Small-Businesses.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Top Online Threats to Small Businesses (Infographic)<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Trend Micro Initiative for Education Program Fact Sheet\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Initiative-for-Education-Program-Factsheet.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_Trend-Micro-Initiative-for-Education.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Trend Micro Initiative for Education Program Fact Sheet\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Initiative-for-Education-Program-Factsheet.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Initiative for Education Program Fact Sheet<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Trend Micro Internet Safety for Small Businesses (ISSB) Handout\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Internet-Safety-for-Small-Businesses-Handout.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smallbiz_handout.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Trend Micro Internet Safety for Small Businesses (ISSB) Handout\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Internet-Safety-for-Small-Businesses-Handout.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Internet Safety for Small Businesses (ISSB) Handout<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"SMB Tips: The Internet of Things (IoT\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Internet-of-things.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smb-tips-IOT.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Trend Micro Webinar: Internet Security for Small Businesses (2018)\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Internet-of-things.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SMB Tips: The Internet of Things (IoT)<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Best Practices: Creating a Secure Password\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Creating-a-Secure-Password.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smb-tips-secure-passwords.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Best Practices: Creating a Secure Password\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Creating-a-Secure-Password.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices: Creating a Secure Password<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-3 col-lg-3\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Best Practices: Securing Your Mobile Devices\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Securing-Your-Mobile-Device.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_smb-tips-secure-mobile-device.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Best Practices: Securing Your Mobile Devices\" href=\"\/internet-safety\/wp-content\/uploads\/business\/resources\/Trend-Micro-Tip-sheet-Best-Practices-Securing-Your-Mobile-Device.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Best Practices: Securing Your Mobile Devices<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-resources sb-additional\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-sm-12 col-md-8 col-md-offset-2 col-lg-8 col-lg-offset-2\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-12\">\r\n<h3 class=\"text-center\">Additional Resources<\/h3>\r\n<\/div>\r\n<\/div>\r\n<div class=\"row\">\r\n<div class=\"col-xs-6 col-sm-6 col-md-4 col-lg-4\">\r\n<div class=\"card blogsite\">\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Security News\" href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security News<\/a><\/h5>\r\n<p class=\"card-text\" style=\"font-size: 12px;\">For corporate news and research papers<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-4 col-lg-4\">\r\n<div class=\"card blogsite\">\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Simply Security Blog\" href=\"https:\/\/blog.trendmicro.com\/?_ga=2.211064214.2032333849.1590310990-783246245.1589991924\" target=\"_blank\" rel=\"noopener noreferrer\">Simply Security Blog<\/a><\/h5>\r\n<p class=\"card-text\" style=\"font-size: 12px;\">For our in-house experts' adivce<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-4 col-lg-4\">\r\n<div class=\"card blogsite\">\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Security Intelligence Blog\" href=\"https:\/\/resources.trendmicro.com\/2018-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.247979268.2032333849.1590310990-783246245.1589991924\" target=\"_blank\" rel=\"noopener noreferrer\">Security Intelligence Blog<\/a><\/h5>\r\n<p class=\"card-text\" style=\"font-size: 12px;\">For tech analyses on threat incidents<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-resources sb-webinars\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 \">\r\n<h3 class=\"text-center\">Small Business Webinars<\/h3>\r\n<\/div>\r\n<div class=\"col-xs-12 col-sm-12 col-md-8 col-md-offset-2 col-lg-9 col-lg-offset-3\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-6 col-sm-6 col-md-4 col-lg-4\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Trend Micro Webinar: Cybersecurity for Small Businesses\" href=\"https:\/\/resources.trendmicro.com\/2019-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.179620396.946970260.1588599653-99398900.1587364581\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/small-business-global.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Trend Micro Webinar: Cybersecurity for Small Businesses (2019-2020)\" href=\"https:\/\/resources.trendmicro.com\/2019-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.179620396.946970260.1588599653-99398900.1587364581\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Webinar: Cybersecurity for Small Businesses (2019-2020)<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-6 col-sm-6 col-md-4 col-lg-4\">\r\n<div class=\"card\">\r\n\r\n<a title=\"Trend Micro Webinar: Internet Security for Small Businesses (2018)\" href=\"https:\/\/resources.trendmicro.com\/2018-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.247979268.2032333849.1590310990-783246245.1589991924\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"card-img-top\" src=\"\/internet-safety\/wp-content\/uploads\/business\/images\/thmb_Internet-Security-for-Small-Businesses.jpg\" alt=\"\" \/><\/a>\r\n<div class=\"card-body\">\r\n<h5 class=\"card-title\"><a title=\"Trend Micro Webinar: Internet Security for Small Businesses (2018)\" href=\"https:\/\/resources.trendmicro.com\/2018-WBN-ISSB-Internet-Security-Challenges.html?_ga=2.247979268.2032333849.1590310990-783246245.1589991924\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro Webinar: Internet Security for Small Businesses (2018)<\/a><\/h5>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div class=\"col-xs-12\">\r\n<p class=\"text-center\"><a class=\"btn btn-danger text-cta\" href=\"\/internet-safety\/business\/events\">View more webinars<i class=\"fa fa-chevron-right fa-right\"><\/i><\/a><\/p>\r\n\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-section sb-resources sb-contact\">\r\n<div class=\"row\">\r\n<div class=\"col-xs-12 col-md-12 col-lg-8 col-lg-offset-2\">\r\n<h3 class=\"text-center\">Contact Us<\/h3>\r\n<p class=\"text-center\">For inquiries about Internet Safety for Small Businesses \u2013 whether you are interested in partnering with us, or belong to a school or an organization that would benefit from cybersecurity enablement workshops \u2013 contact us at <a href=\"mailto:csr_education@trendmicro.com?Subject=ISSB\">csr_education@trendmicro.com<\/a>.<\/p>\r\n\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<hr \/>\r\n\r\n<div class=\"sb-footer\">\r\n<div class=\"row\">\r\n<div class=\"issb col-xs-12 col-sm-12 col-md-12 col-lg-6 col-lg-offset-2\">\r\n<h5>Internet Safety for Small Businesses<\/h5>\r\n<ul class=\"sb-footer-ul\">\r\n \t<li><a href=\"\/internet-safety\/business\">Home<\/a><\/li>\r\n \t<li><a href=\"\/internet-safety\/business\/events\">Events<\/a><\/li>\r\n \t<li><a href=\"\/internet-safety\/business\/resources\">Resources<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<div class=\"tm col-xs-12 col-md-12 col-lg-2\">\r\n<h5><a title=\"Go to TrendMicro.com\" href=\"https:\/\/www.trendmicro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img style=\"max-width: 150px !important;\" src=\"\/internet-safety\/wp-content\/uploads\/2020\/05\/trend-micro-logo.png\" alt=\"Trend Micro logo\" width=\"150\" \/><\/a><\/h5>\r\n<ul class=\"sb-footer-ul\">\r\n \t<li><a href=\"https:\/\/www.trendmicro.com\/\">TrendMicro.com<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.trendmicro.com\/en_gb\/about\/legal.html\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policy<\/a><\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<!-- \/.sb-footer -->","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"class_list":["post-2331","page","type-page","status-publish","hentry","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/2331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=2331"}],"version-history":[{"count":1,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/2331\/revisions"}],"predecessor-version":[{"id":37069,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/2331\/revisions\/37069"}],"up":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/pages\/2263"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=2331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}