Protect Your Tech! IT Security Advice & Resources
Know the risks! Smaller businesses are big targets for cybercriminals. Cybercriminals (the “bad guys”) know that a small business has fewer defenses around their IT than a large enterprise.
That means it’s easier for cybercriminals to break into small businesses and steal their information: Bank accounts, stored emails, customer files, etc. They can use that information to steal money directly. Or create attacks on your customers. Or hijack your computers for their own purposes. The list of dangers goes on.
When asked, two-thirds (66%) of small businesses say that their business is dependent on the Internet for its day-to-day operations. 38% characterize themselves as “very dependent.” 67% say they have become “more dependent” on the Internet in the last 12 months.
The research also indicates that businesses have vital information to protect: 69% handle sensitive information, including customer data; 49% have financial records and reports; 23% have their own intellectual property and 18% handle intellectual property belonging to others outside the company.
That means it’s easier for cybercriminals to break into small businesses and steal their information: Bank accounts, stored emails, customer files, etc. They can use that information to steal money directly. Or create attacks on your customers. Or hijack your computers for their own purposes. The list of dangers goes on.
When asked, two-thirds (66%) of small businesses say that their business is dependent on the Internet for its day-to-day operations. 38% characterize themselves as “very dependent.” 67% say they have become “more dependent” on the Internet in the last 12 months.
The research also indicates that businesses have vital information to protect: 69% handle sensitive information, including customer data; 49% have financial records and reports; 23% have their own intellectual property and 18% handle intellectual property belonging to others outside the company.
Questions You Must Consider:
What information do you collect (from customers, partners, vendors, employees)?
How do you store the information?
Who has access to the information?
How do you protect your data?
What steps are you taking to secure your computers, network, email and other tools?
If the answer to any of these is, “I don’t know,” your data may be vulnerable.
How do you store the information?
Who has access to the information?
How do you protect your data?
What steps are you taking to secure your computers, network, email and other tools?
If the answer to any of these is, “I don’t know,” your data may be vulnerable.
Protect Your Small Business with these tips:
- Keep a clean machine: Use the latest security software, web browser, and operating system, and keep them all up-to-date. It’s among the best defense against viruses, malware, and other online threats out there.
- Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
- When in doubt, throw it out: Links in emails, tweets, posts, and online ads are all ways a cybercriminal can compromise your computer. If it looks suspicious—even if you know the source—it’s best to delete or if appropriate, mark as junk email.
- Never open unsolicited email: Email scams like “phishing” are among the most common schemes criminals use to steal information. Use email filters to block these emails, and be leery of any messages that ask you to provide personal information. Even if they appear to come from a bank or company you've dealt with.
- Protect all devices that connect to the Internet: Not just computers. Smartphones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
- Plug & scan: USB drives and other external devices can be infected by viruses and malware. Use your security software to scan them before using them.
Source: National Cyber Security Alliance
Additional Resources
Top 10 Threats to Information Security: http://scsonline.georgetown.edu/programs/masters-technology-management/resources/top-threats-to-information-technology
The FCC Small Biz Cyber Planner: http://www.fcc.gov/cyberplanner
OnGuardOnline.gov Business Resource (includes employee training resources): http://www.onguardonline.gov/features/feature-0007-featured-info-small-business
LastPass Password Security: https://lastpass.com/
Think you’ve been attacked? Report Cyber-Attacks here: https://www.staysafeonline.org/business-safe-online/report-cyber-attacks/
The FCC Small Biz Cyber Planner: http://www.fcc.gov/cyberplanner
OnGuardOnline.gov Business Resource (includes employee training resources): http://www.onguardonline.gov/features/feature-0007-featured-info-small-business
LastPass Password Security: https://lastpass.com/
Think you’ve been attacked? Report Cyber-Attacks here: https://www.staysafeonline.org/business-safe-online/report-cyber-attacks/
Quick Links
Chairman's Circle Sponsors
View the Fremont Chamber event calendar to see the next chamber events.
Get the GA Alert
Subscribe to receive the latest government affairs alerts