avatarJohn Teehan

Free AI web copilot to create summaries, insights and extended knowledge, download it at here

3024

Abstract

damage that a cybersecurity breach could cause.</p><h2 id="5f1b">Secure passwords and authentication</h2><p id="1c84">Solid, safe, and sensible authentication techniques provide the foundation for your business’s security protection. This includes having a robust password generating procedure and thinking about using two-step authorization.</p><p id="8f00">Secure password generation should include numbers and letters, upper and lower case requirements, and special characters. Employees (and business owners) should be warned against choosing passwords based on names, dates, or other guessable strings of letters, words, or numbers.</p><p id="8a94">Furthermore, rules should be implemented to ensure that passwords are changed regularly, and that staff understands the importance of not sharing password information with others.</p><h2 id="902d">Using encryption</h2><p id="e314">Encryption goes a long way toward protecting your data. Even if a bad actor were to gain access to your networks, the data would be useless to them if they didn’t have the correct encryption tools and protocols. From mobile devices and desktop workstations to network servers or cloud apps and storage, encryption tools can be applied on either or both sides of any information transmission.</p><figure id="81f0"><img src="https://cdn-images-1.readmedium.com/v2/resize:fit:800/0*g5OPdpLpTqy7y5iS"><figcaption>Photo by <a href="https://unsplash.com/@moneyphotos?utm_source=medium&amp;utm_medium=referral">olieman.eth</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h2 id="de87">Employee training and empowerment</h2><p id="7e66">When it comes to protecting your company’s data, employees are a business’s most valuable asset. Make sure your staff is aware of the necessity of using the cybersecurity procedures you set in place, including secure passwords, encryption software, and safe email and Internet habits. They should be aware of how phishing emails work, the danger of suspicious attachments, and how to recognize suspicious URLs.</p><p id="0e05">Simple precautions can save you and your business a lot of trouble. Regular employee seminars on cybersecurity issues can go a long way toward protecting your business.</p><h2 id="3256">Don’t go it alone</h2><p id="6a13">Depending on your business needs and network size, you may want to hire a managed service provider to establish your security requirements, monitor your network, and provide online or remote support. They may also assist you in developing a disaster recovery plan if your data does end up getting damaged in an attack.</p><figure id="a5f9"><img src="https://cdn-images-1.readmedium.com/v2/resize:fit:800/0*NQimAVi6Xjds_rQg"><figcaption>Photo by <a href="https://unsplash.com/@homajob?utm_source=medium&amp;utm_medium=referral">Scott Graham</a> on <a href="https://unsplash.com?utm_source=medium&amp;utm_medium=referral">Unsplash</a></figcaption></figure><h1 id="9ec3">Preparing Today To Protect

Options

Tomorrow</h1><p id="d270">Understanding the risks and how to reduce them is your best option for ensuring that your company survives the rising tides of cybercrime. You can be certain that cyber-criminals are continually finding new ways to infiltrate your systems, and it’s up to you to try to stay ahead of the game.</p><p id="e320">The dangers are real, and the consequences might be catastrophic. If you want to keep your business running efficiently and safely so you can focus on development, you need to enact preventative measures by bolstering your network security and training your staff.</p><div id="9aa7" class="link-block"> <a href="https://readmedium.com/building-a-productive-routine-working-at-home-15a8de66e2cf"> <div> <div> <h2>Building a Productive Routine Working At Home</h2> <div><h3>Whether you are freelancing or a WFH warrior, here’s how to make it work.</h3></div> <div><p>medium.com</p></div> </div> <div> <div style="background-image: url(https://miro.readmedium.com/v2/resize:fit:320/0*niuj8t6nG1zida0A)"></div> </div> </div> </a> </div><div id="4b1c" class="link-block"> <a href="https://readmedium.com/demolishing-business-misconceptions-about-freelancers-424121d9ed29"> <div> <div> <h2>Demolishing Business Misconceptions About Freelancers</h2> <div><h3>Employers need to understand how this works.</h3></div> <div><p>medium.com</p></div> </div> <div> <div style="background-image: url(https://miro.readmedium.com/v2/resize:fit:320/0*hTBS0SkQ9uK6zADp)"></div> </div> </div> </a> </div><h1 id="847b">About John Teehan</h1><p id="3e5d"><i>John lives in Rhode Island with his wife, son, and dog. He specializes in tech, health, business, parenting, pop culture, and gaming. Visit<a href="http://www.wordsbyjohn.net/"> wordsbyjohn.net</a> for more info and rates. Twitter: @WordsByJohn2.</i></p><p id="e943"><i>Do you like poetry, short fiction, and general oddities? Check out my new book, </i>Life Among Psychopaths: an unexpected potpourri<i>, now available on Amazon.</i></p><div id="816e" class="link-block"> <a href="https://wordsbyjohn.medium.com/membership"> <div> <div> <h2>Join Medium with my referral link - John Teehan</h2> <div><h3>As a Medium member, a portion of your membership fee goes to writers you read, and you get full access to every story…</h3></div> <div><p>wordsbyjohn.medium.com</p></div> </div> <div> <div style="background-image: url(https://miro.readmedium.com/v2/resize:fit:320/0*GBwcJXhlXGJx6E73)"></div> </div> </div> </a> </div></article></body>

Talking Data Protection For SMBs

Small-to-medium businesses deserve as much protection as big businesses.

Photo by Towfiqu barbhuiya on Unsplash

Hackers have become more daring in recent years, and cyber attacks have increased. According to the HISCOX Small Business Cyber Risk Report, 47% of small companies have been victims of a cyberattack in the last year. Nearly half of those had up to four more attacks.

Cyberattacks and fraud are among the top concerns for small business owners when it comes to keeping their businesses alive and well.

What is the situation really like, and what can you do about it?

Looking At The Numbers

According to a Symantec Internet Security Threat Report, roughly half of all small firms will face a cyber attack. Only around a quarter of those companies believe they are in a position to protect themselves from such an event. While large businesses are likewise vulnerable to attack, the chances are less, and they are more likely to be able to protect themselves.

Customer records are the most commonly targeted category of information in small-to-medium-sized business (SMB) attacks, followed by intellectual property, credit card numbers, and other financial information.

The News Gets Worse

Sixty percent of organizations hit by a successful hack will likely go out of business within six months. A successful cyber attack has the potential to cost a lot of money. According to the Ponemon Institute, SMBs lose an average of $2 million each year due to the destruction or theft of sensitive IT data. Even more, money is lost when corporate operations experience disruption. Fines in the healthcare and banking industries, which have significant regulatory compliance difficulties, can end up tripling that cost.

Photo by Towfiqu barbhuiya on Unsplash

It may already be too late by the time a cyberattack has occurred. Your company’s assets and reputation have both been harmed. That’s why SMBs need to prioritize effective cybersecurity procedures.

Protecting Your Data Isn’t Difficult

It’s not all bad news. There are easily actionable steps you can take to protect your data from malicious actors. Doing so means avoiding the embarrassment and damage that a cybersecurity breach could cause.

Secure passwords and authentication

Solid, safe, and sensible authentication techniques provide the foundation for your business’s security protection. This includes having a robust password generating procedure and thinking about using two-step authorization.

Secure password generation should include numbers and letters, upper and lower case requirements, and special characters. Employees (and business owners) should be warned against choosing passwords based on names, dates, or other guessable strings of letters, words, or numbers.

Furthermore, rules should be implemented to ensure that passwords are changed regularly, and that staff understands the importance of not sharing password information with others.

Using encryption

Encryption goes a long way toward protecting your data. Even if a bad actor were to gain access to your networks, the data would be useless to them if they didn’t have the correct encryption tools and protocols. From mobile devices and desktop workstations to network servers or cloud apps and storage, encryption tools can be applied on either or both sides of any information transmission.

Photo by olieman.eth on Unsplash

Employee training and empowerment

When it comes to protecting your company’s data, employees are a business’s most valuable asset. Make sure your staff is aware of the necessity of using the cybersecurity procedures you set in place, including secure passwords, encryption software, and safe email and Internet habits. They should be aware of how phishing emails work, the danger of suspicious attachments, and how to recognize suspicious URLs.

Simple precautions can save you and your business a lot of trouble. Regular employee seminars on cybersecurity issues can go a long way toward protecting your business.

Don’t go it alone

Depending on your business needs and network size, you may want to hire a managed service provider to establish your security requirements, monitor your network, and provide online or remote support. They may also assist you in developing a disaster recovery plan if your data does end up getting damaged in an attack.

Photo by Scott Graham on Unsplash

Preparing Today To Protect Tomorrow

Understanding the risks and how to reduce them is your best option for ensuring that your company survives the rising tides of cybercrime. You can be certain that cyber-criminals are continually finding new ways to infiltrate your systems, and it’s up to you to try to stay ahead of the game.

The dangers are real, and the consequences might be catastrophic. If you want to keep your business running efficiently and safely so you can focus on development, you need to enact preventative measures by bolstering your network security and training your staff.

About John Teehan

John lives in Rhode Island with his wife, son, and dog. He specializes in tech, health, business, parenting, pop culture, and gaming. Visit wordsbyjohn.net for more info and rates. Twitter: @WordsByJohn2.

Do you like poetry, short fiction, and general oddities? Check out my new book, Life Among Psychopaths: an unexpected potpourri, now available on Amazon.

Cybersecurity
Business
Work
Technology
Advice
Recommended from ReadMedium