Three Cybersecurity Must-Haves for Small Businesses

Three Cybersecurity Must-Haves for Small Businesses

Tips and tactics for ensuring your small business is safe from the threat of cyberattacks.

Pop quiz: What percentage of small businesses in the U.S. suffered a cyberattack in 2017? Without peeking below at the answer, take a guess.

Would you estimate 10 percent? Maybe 25 percent? Higher?

Answer: 47 percent of small businesses had their networks breached at least once by cybercriminals in 2017. (Worse: Almost half those businesses were then hit again.) That’s according to a survey reported in a 2018 USA Today story. After analyzing the alarming data from its survey, the research team concluded that only about three in 10 small businesses would be able to handle a cyberattack if they were hit with one today.

Why most SMBs Aren’t Prepared for a Cyber Attack

Most small companies have limited budgets and lack the IT resources they assume it would take to develop a sophisticated cyber-defense infrastructure.

Also, many SMBs mistakenly believe that their businesses are so small, so insignificant when compared to the giant, multibillion-dollar corporations whose names we all know, that hackers wouldn’t even bother trying to breach their tiny company’s network. However, as you can see from that 47 percent stat, cybercriminals are very interested in hacking small businesses.

The bad news is that hackers know SMBs don’t prioritize cybersecurity, and this is precisely why they target these companies. If you’re a burglar, it makes sense to target the house with the weakest lock.

The good news is that SMBs can significantly harden their cyber defenses without spending the millions of dollars that the mega-corporations budget each year for their cybersecurity. In fact, there are a few steps your company can and should take immediately that won’t break the bank.

1. Train Your Staff on Basic Cybersecurity Awareness

Believe it or not, one of the most successful strategies cyber criminals are still using to access businesses’ networks and data is phishing and similar social-engineering tactics.

In other words, a hacker can breach a business’s systems simply by sending a phony email to an employee (or using a pretext to engage that employee on social media). The hacker then manipulates that individual into some action—opening an attached file, clicking on a link, etc.—which the hacker has set up as a digital lock-picking device to enter the company’s systems and access proprietary data.

Train your employees on the basics of cybersecurity awareness, such as examining the sender’s email address when receiving a suspicious message, and not opening attachments or clicking links from unknown senders.

2. Create a Plan for Mobile Device Security

Let’s assume you’ve secured your company’s on-premise network with firewalls to protect your office’s Internet activity and antivirus software to thwart malicious code from infecting your in-house computers. (You’ve done those things, haven’t you?) None of those measures will matter if your employees access your company’s data or networks offsite from their mobile devices, and those mobile devices themselves are not secure.

So another important step to take is to set up a plan for mobile-device security. You can establish companywide rules, for example, that employees may not use their phones to view, transmit, or download company data unless you have first installed security apps on them and/or these devices have been password-protect.

Remember, your company’s data doesn’t live solely within the walls of your office, and your cybersecurity strategy needs to account for that reality.

3. Conduct a Cybersecurity Threat Assessment with a Third-Party Expert

Once you and your team begin researching small-business cybersecurity strategies, tools, and best practices, it’s easy to become overwhelmed. You will almost certainly discover areas in which your company’s systems and data are vulnerable to hackers right now, and your internal research will probably also reveal that your sensitive data resides in so many places that there’s no way even to keep track of it cost-effectively.

Don’t panic, and don’t throw your hands up in frustration. Given how critical your data is to your company’s operations, your business can’t afford for you to do either. Instead, bring in a team of experts—such as a Managed Security Service Provider (MSSP)—and let them perform a full cybersecurity risk assessment to identify your weaknesses and help you harden them.

Cybersecurity: It’s No Longer Optional

Bottom line: The cyber bad guys know your small business is almost certainly underprepared (if not flat-out unprepared) to stop their attacks, and it’s only a matter of time before they target your company. You won’t need millions of dollars to establish a strong cyber-defense infrastructure, but you will need to establish one. And you need to start now.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.