{"id":5303,"date":"2021-07-01T14:54:28","date_gmt":"2021-07-01T12:54:28","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=5303"},"modified":"2025-11-18T09:55:10","modified_gmt":"2025-11-18T08:55:10","slug":"vsb-smb-how-to-protect-my-company-data","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/","title":{"rendered":"VSB\/SMB: how to protect my company&#8217;s data?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Banner article DOT TPE PME\" title=\"Banner article DOT TPE PME\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" class=\"lazyload img-responsive wp-image-6237\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p><strong><em>In a study published by R\u00e9gionJob in 2019, nearly 9 out of 10 companies said they were currently working on a digital transformation initiative. Cost reduction, dematerialization, immediacy... the many advantages make this transition to digital vital for all companies, even for VSB and SMB. However, behind this promise of dematerialization lie multiple dangers unheard of in the days when information was stored on paper. Hacking, computer attacks and other data leaks are detrimental to all enterprises and even more so to small businesses, which generally do not have a dedicated IT department and find themselves overexposed...<\/em><\/strong><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\"><strong>Anonymizing data, the preferred solution for companies <\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>Given the lack of knowledge of most companies about many aspects of digitalization, solutions to protect data have multiplied. Among the best-known techniques are the regular changing of passwords, the addition of physical security for data access and the implementation of dual authentication.<\/p>\n<p>Although these techniques are effective up to a point and make it possible to drastically reinforce security in companies, they are insufficient when it comes to protecting against an attack or data leak. Indeed, to protect information in companies, all experts are unanimous: data anonymization remains the preferred solution to eliminate risks.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:#ea5050;--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>Personal Data and Anonymisation: 5 tips for a successful anonymization project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#105378;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/dot-guide-5-tips-for-a-successful-anonymization-project\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download the Guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">VSB \/ SMB: is anonymization applicable to my company?<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>Although the concept of data anonymization may seem far too complex for small businesses, it is not. Data anonymization is a process that renders confidential information in an organisation completely unusable to an outsider. Depending on the needs and the nature of the risks, there are several anonymization methods that can be applied to all types of data. Whether it is personal customer data or internal company information, everything is subject to increased protection. In fact, even small and medium-sized companies are concerned and can implement this type of protection within their structure.<\/p>\n<p>Beware, however, that data anonymization is a complex process and it not accessible to everyone. To be done properly, it is necessary to call on professionals who will put in place effective and secure methods, to allow each company to prepare its future serenely, without having to worry about the security of its sensitive information. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"Iv-vbM6J3FE\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are several methods of anonymization for which VSB and SMB are concerned and can set up protection within their organization. <\/p>\n","protected":false},"author":5,"featured_media":6237,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113],"tags":[],"class_list":["post-5303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VSB\/SMB: how to protect my company&#039;s data?<\/title>\n<meta name=\"description\" content=\"There are several anonymization methods able to secure a high level of protection for both VSBs and SMEs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VSB\/SMB: how to protect my company&#039;s data?\" \/>\n<meta property=\"og:description\" content=\"There are several anonymization methods able to secure a high level of protection for both VSBs and SMEs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-01T12:54:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T08:55:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"VSB\/SMB: how to protect my company&#8217;s data?\",\"datePublished\":\"2021-07-01T12:54:28+00:00\",\"dateModified\":\"2025-11-18T08:55:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\"},\"wordCount\":3096,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\",\"name\":\"VSB\/SMB: how to protect my company's data?\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\",\"datePublished\":\"2021-07-01T12:54:28+00:00\",\"dateModified\":\"2025-11-18T08:55:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"There are several anonymization methods able to secure a high level of protection for both VSBs and SMEs\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png\",\"width\":940,\"height\":350,\"caption\":\"Banner article DOT TPE PME\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VSB\/SMB: how to protect my company's data?","description":"There are several anonymization methods able to secure a high level of protection for both VSBs and SMEs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/","og_locale":"en_US","og_type":"article","og_title":"VSB\/SMB: how to protect my company's data?","og_description":"There are several anonymization methods able to secure a high level of protection for both VSBs and SMEs","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2021-07-01T12:54:28+00:00","article_modified_time":"2025-11-18T08:55:10+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"VSB\/SMB: how to protect my company&#8217;s data?","datePublished":"2021-07-01T12:54:28+00:00","dateModified":"2025-11-18T08:55:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/"},"wordCount":3096,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/","name":"VSB\/SMB: how to protect my company's data?","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png","datePublished":"2021-07-01T12:54:28+00:00","dateModified":"2025-11-18T08:55:10+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"There are several anonymization methods able to secure a high level of protection for both VSBs and SMEs","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/vsb-smb-how-to-protect-my-company-data\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/07\/Banner-article-DOT-TPE-PME.png","width":940,"height":350,"caption":"Banner article DOT TPE PME"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=5303"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5303\/revisions"}],"predecessor-version":[{"id":13037,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5303\/revisions\/13037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/6237"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=5303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=5303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=5303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}