Small Business Information Security Tips

Small businesses and organizations may be daunted by the perceived resources needed to secure their systems. However, not making cyber security a priority could be a costly decision. The following tips from the National Cyber Security Alliance represent key security principles intended to provide a starting point for a more comprehensive information security plan. 

1. Ensure that all employees use effective passwords, and when possible, stronger authentication technology. Encourage passwords that are comprised of different upper and lower case letters characters and change them every 60 to 70 days (not to exceed 90 days). For example, use C@tandD0g instead of catanddog. Consider setting up network command requirements that change passwords every 60 to 70 days, not to exceed a 90-day change cycle. In many cases, passwords may not provide you with enough protection and security. For a more secure and reliable way to authenticate users and prevent hackers from stealing passwords, you may consider implementing some sort of multi-factor or strong authentication. 

2. Protect your systems. Install and use anti-virus programs, anti-spyware programs and firewalls on all computers in your business. Ensure computers are protected by a firewall-firewalls can be separate appliances, built into wireless systems or a software firewall that comes with many commercial security suites.

3. Keep all software up to date. Ensure that all computer software is up-to-date and contains the most recent patches (i.e., operating system, anti-virus, anti-spyware, anti-adware, firewall and office automation software). Most security and operating systems contain automatic updates, make sure that function is turned on and sign up for security notifications from the software company. Without updates, your systems will not be well protected against new cyber threats.

4. Create backups. Make regular (weekly) back-up copies of all of your important data/information. Store a secured copy away from your office location and use encryption to protect any sensitive information about your company and customers. Regularly creating back-ups better ensures that your critical data is not lost in the event of a cyber attack or physical incident, like a fire or flood.

5. Be prepared for emergencies. Create a contingency plan for your business so you can recover if you experience an emergency. Include plans to continue business operations at an alternate location when necessary. Test your plan annually. Make sure to erase all data on the hard drive before recycling or throwing away a computer. For more information on how to develop a business plan to prepare for an emergency, go to http://www.ready.gov/business/plan/planning.html.

6. Encrypt your customers’ data. Protect your customers’ data from hackers and thieves by encrypting it. Encryption programs encode data or make it unreadable, until you enter a password or encryption key that unlocks it. Some encryption programs are built into popular financial and database software and some broadband providers now include encryption for wireless networks as a part of their service. Simply check your software’s owner’s manual to find out if this feature is available and how to turn it on. In some cases you may need an additional program to properly encrypt your sensitive data.

7. Report Internet Crime. Locate and join an organization of your peers for information sharing purposes. If you suspect fraud or criminal intent, report it to the local law enforcement agencies, the local Federal Bureau of Investigation, Secret Service or state attorney general’s offices. Moreover, some states require you to notify your customers if hackers or thieves steal or could have stolen your customers’ unencrypted personal information, including data residing on a computer stolen in the offline world. Check your state laws to see if this rule applies to your incident. To find out more information on how to report a cyber security incident, go to https://forms.us-cert.gov/report/ or http://www.ic3.gov/complaint/

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3