Practical Cybersecurity to Protect Your Small Business

Practical Cybersecurity to Protect Your Small Business

 

Protecting Your Small Business with Cyber Security

We’ve all seen the headlines “Company X has had their data held for ransom” or worse yet, “Company Y had a data breach and customer information has been stolen”. This only happens to the big Fortune 100 companies, right?

Wrong – cybersecurity is relevant to companies of all sizes and anyone is a target. In fact, 43 percent of cyber attacks target small business.

While your business may only have a security budget that is a fraction of larger enterprises, spending that money wisely can still help you sleep at night. Nothing is ever infallible; however, implementing security measures can go a long way.

Cyber Security Measures You Should Have in Place

Cyber Security

Cybersecurity works best when implemented in layers, much like how you protect your own house. Working from the outside in, there are several common layers typically implemented in a well-designed system:

  • Starting on the perimeter layer, you need to implement a Firewall to prevent malicious traffic from reaching your network. This is much like installing a fence around your yard. This allows you to control who comes in and who goes out.
  • Companies may have certain services they want the public to access – such as a website or mobile app. These services are best protected in a DMZ (demilitarized zone) which is a highly protected zone of your network, much like the front yard of your house. You can carefully screen and watch what happens in your yard!
  • The core of your network is much like your house itself. You want to install an alarm system and routinely maintain your home, so it remains resistant to outside threats. On computer systems, this is done by installing Antivirus software and by regularly patching and updating your systems.
  • With all of these layers of security, your home (or network) is fairly well protected, however the final layer is the occupants of the home, or the employees of your business. Users need to be educated on safe behaviors and what may be a potentially harmful activity.  That innocent link to a funny dog video may not be what it appears to be. Users need to be exceptionally cautious when dealing with the rapidly growing volume of sneaky email and social media threats and learn to scrutinize everything, much like you would look through the peephole when a stranger is at the front door!

 


Learn More:

 

Some questions you should ask yourself:

  1. Do I know what I would do if my data was held for “ransom”?
  2. Do I know what I would do if my computer became infected with a virus?
  3. Do I know if my website and email is properly protected?
  4. Do my users know what a suspicious email or Facebook link looks like?

You can take our Online Security Assessment to answer questions like these to determine how prepared your organization is to deal with a cyber threat.

It is vital to know the answers to these questions BEFORE something happens. Time is of the essence when dealing with a data breach or malicious activity and if you are unable to stop the spread quickly, it could be much like a fire in your house: if not quickly contained it can be devastating.

If you are unsure of your company’s cybersecurity defenses, or are unable to answer the above questions that probably means there is room for improvement. Just like with your home, unless you’re experienced in assessing alarm systems, its often best to talk to an expert who specializes in this field. By following these measures and getting a security assessment, you can significantly reduce the risk that cyber threats pose to your business.

 


Shield Your Business from Breaches and Attacks
Contact Resolute Today!


 

Picture

Greg Croteau
Technical/Security Architect
Resolute Technology Solutions.

Originally published on the Winnipeg Chamber blog.

 

Recent Posts

Share

Leave a Comment

Comment (required)

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Name (required)
Email (required)