Cyberattacks are a concern for small businesses. Learn about cybersecurity threats and how to protect yourself.
Cyberattacks cost the U.S. economy billions of dollars a year. They also pose a threat for individuals and organizations. Businesses can be attractive targets for cyber criminals. Small businesses in particular may lack the means to protect their digital systems.
Surveys have shown that many small businesses feel vulnerable to a cyberattack. Many small businesses cannot afford professional IT solutions. They may also lack time to devote to cybersecurity, or may not know where to begin.
Start protecting your small business by:
What is the leading cause of small business data breaches? Employees and work-related communications. They are direct pathways into your systems. Train your employees on internet usage best practices. This can help in preventing cyberattacks.
Other useful training topics include:
Safeguard your internet connection by encrypting information and using a firewall. If you have a Wi-Fi network, make sure it is secure and hidden. This means setting up your wireless access point or router so it does not broadcast the network name. This is also called the Service Set Identifier (SSID). Make sure your router is password protected. If you have employees working remotely, they should use a Virtual Private Network (VPN). A VPN will connect to your network securely from their location.
Install antivirus software on all business’s computers, and update them regularly. Antivirus software can be found online from a variety of different vendors. All software vendors provide patches and updates to correct and improve security and operations. It is best to configure your software to install updates automatically. Also update all operating systems, web browsers, and other applications. This will help secure all business data.
Multi-Factor Authentication (MFA) is an important security measure. It verifies someone’s identity by requiring more than a username and password alone. MFA may require users to provide two or more of the following:
Check with your vendors to see if they offer MFA for any of your accounts (for example, financial, accounting, payroll).
Using a CSP to host information and collaboration services adds needed security, especially under a hybrid work model. Software-as-a-Service (SaaS) providers for email and workplace productivity can help secure data.
While it’s important to use best practices in your cybersecurity strategy, preventative measures only go so far. Cyberattacks constantly change, and business owners should be aware of the most common types. To learn more about a specific threat, click on the link provided to view a short video or fact sheet.
Malware (malicious software) is software designed to harm a computer, server, or computer network. Malware can include viruses and ransomware.
Viruses are harmful programs intended to spread from device to device like a disease. Cyber criminals use viruses to gain access to your systems. This can cause significant and sometimes unrepairable issues.
Ransomware is a type of malware. It infects and restricts access to a computer until the owner provides some sort of ransom. Ransomware can encrypt data on a device, and demand money in return for a promise to restore it. Ransomware exploits unpatched vulnerabilities in software and is usually delivered through phishing emails.
Spyware is a form of malware. It gathers information from a target and sends it to another entity without consent. Some spyware is legitimate and legal. It may operate for commercial purposes, like advertising data collected by social media platforms. Malicious spyware, however, illegally steals information and sends it to other parties.
Phishing is a common type of cyberattack. It can use things like links in an email to infect your system with malware to collect sensitive information. Phishing emails can appear legitimate, or appear to be sent from a known entity. These emails often entice users to click on fraudulent links or open attachments containing malicious code. Be cautious about opening links from unknown sources. If something seems suspicious from a known source, don’t click on it - ask the source directly if it's legitimate.
To improve your business’s cybersecurity, it’s best to understand the risk of an attack. It’s also important to know where you can safeguard your data and systems.
A cybersecurity risk assessment can identify where your business is vulnerable. It can also help create a plan of action. This plan of action should include:
There’s no substitute for dedicated IT support, even if expensive. This can be an employee or external consultant. Here is a list of measures that all businesses can take to improve their cybersecurity.