How to Fix Common Data Security Mistakes

How to Fix Common Data Security Mistakes

Your favorite bagel shop may have an amazing selection of sesame, garlic, parmesan, and blueberry bagels, friendly customer service, and that quirky vibe that you love. But it may not have the much-needed security in place to protect them and you against cybercrime. The damaging effects of cyber threats like malware, phishing, and ransomware on a small business can put sensitive and personal data of employees and customers at risk — not to mention vendors and everyone in the supply chain.

In fact, 60% of small companies go out of business within six months of falling victim to a data breach or cyberattack. Small to medium-sized businesses (SMBs) face the same type of cyberattacks as their larger counterparts but are more vulnerable because they often lack a robust cybersecurity infrastructure, internal security support, and technology know-how. The evolution of the digital landscape and the effects of the pandemic have unfortunately made smaller organizations the perfect target for cyber criminals. And it’s a big problem — according to the Small Business Administration, there are 32.5 million small businesses with less than 500 employees in the U.S.

A hole in a bagel is acceptable, but a security hole could be a recipe for disaster. Considering how much data a small business has that could potentially be compromised — financial information, customers’ credit or debit card numbers, personal identification numbers, passwords, or customers’ personal information (name, address) from loyalty programs — it might be time to shore up security efforts.

Eight Common Data Security Mistakes and How to Fix Them

Fortunately, common data security mistakes are easily remedied without adding headcount or much cost:

1. Treating all data equally. Often, businesses don’t know what to protect. Understanding the value of different types of data will help with a corresponding data security strategy. Once you determine your most sensitive data, encrypt it — this makes it unreadable if compromised. Many small businesses look to full-disk encryption obtained through built-in programs or third parties.

2. Setting up Wi-Fi yourself. Offering secure, reliable Wi-FI for customers can help you with repeat customers and Yelp reviews. But a poorly configured Wi-FI could provide an opening for cyber thieves. Look to experts to help you strategically plan, configure, and install the right equipment.

3. Misconfiguring a Virtual Private Network (VPN). Similarly, consult experts to help with your VPN. Traditional VPNs do not have adequate control over who or what device can connect to the network. It is often exploited because there is no standard way to set it up, operate, or distribute access. Organizations may want to look to an expert to ensure the access channel is secured to protect data and confidentiality.

4. Trying to handle security yourself. With limited people and budget, consider outsourcing security to service providers with the specialized knowledge to properly configure and keep your systems and applications safe. A trusted and experienced third party can manage this for you so that you won’t overlook some of the key security features.

5. Not prioritizing employee security training. Humans are the weakest link in cybersecurity. Most compromises are caused by a simple error such as an employee clicking on a harmful link. Training employees on good security practices, such as two-factor authentication, will go a long way to greatly reduce cyber threat risks.

6. Relying on old technology. Many companies rely on outdated, legacy systems to save costs. Legacy applications rely on older, more limited frameworks, software libraries, and operating systems, presenting more security issues. Modern applications are better integrated with newer frameworks and platforms and have built-in security features to reduce the chance of data compromise.

7. Skipping data backup. Many businesses, large and small, often overlook this critical step. A frequent backup strategy is essential, especially to protect financial data, intellectual property, source code, and email. A good plan is to start backing up your mission critical data first.

8. Forgetting software patches. Don’t leave your organization and employees vulnerable when security updates and patches are readily available for everything from operating systems to applications to devices.

Most companies don’t need a complete security overhaul. A few measured, practical steps can make a big difference in helping small businesses protect their data, systems, reputations, and livelihoods. While your favorite bagel shop may have already perfected the chewy bagel, a few adjustments to security practices may be on the menu.

Featured

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

  • Leveraging Smart Sensors

    The integration of smart sensors with data-driven video technology provides schools with a comprehensive solution to enhance safety and security. This combination offers advanced capabilities such as environmental monitoring, audio analytics, vape detection and unified data management, empowering schools to create a secure and healthy learning environment for students and staff. Read Now

  • Unlocking the End-user Perception

    An observation as a creator of identity verification solutions is that while industry leaders are often excited by the opportunity to leverage biometrics, there are often concerns raised about the end-user mindset during the conversation. Primarily, what are end-users’ expectations of biometric technology? What concerns might they have about its usage to authenticate and protect their access? Read Now

  • 4 Killed, 9 Injured at Georgia High School Shooting

    Four people were killed and nine were hospitalized after a shooting at Apalachee High School in Winder, Georgia on Wednesday. That’s according to CNN. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3