{"id":34857,"date":"2019-09-13T20:31:24","date_gmt":"2019-09-13T16:31:24","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=34857"},"modified":"2024-10-02T14:37:04","modified_gmt":"2024-10-02T10:37:04","slug":"5-critical-cybersecurity-tips","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/5-critical-cybersecurity-tips\/","title":{"rendered":"5 Critical Cybersecurity Tips for SMBs in 2024"},"content":{"rendered":"<p>If you run a small business, you might not think that you are a priority target for hackers. But you'd be wrong and here are 5 critical cybersecurity tips.<\/p>\n<p>Small and Medium-Sized Businesses (SMBs) are among the most frequent target for cyber attacks. Even the smallest business holds a wealth of personal information on customers, employees, and other businesses. In addition, SMBs are at <a href=\"https:\/\/www.securitymagazine.com\/articles\/89202-small-and-mid-size-businesses-need-to-focus-on-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">greater risk for cyber attacks<\/a> because they tend to be easier targets, and don\u2019t always have the resources that larger organizations can deploy to protect themselves.<!--more--><\/p>\n<p>SMBs also tend to be highly mobile, adaptive organizations, and this means that they have an <a href=\"https:\/\/www.cyberreefsolutions.com\/cyber-security-management-framework\/\" target=\"_blank\" rel=\"noopener noreferrer\">increased surface area for cyber attacks<\/a> due to the number of different systems and resources they use.<\/p>\n<p>It\u2019s no surprise, then, that according to the <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\">2018 Verizon Data Breach Investigations Report<\/a>, 58 percent of all cyberattacks targeted small businesses, and that in 2018 48 percent of data breaches involved hacking, and 30 percent featured malware.<\/p>\n<p>Thankfully, there are some steps you can take to protect your business, such as following these <a href=\"https:\/\/www.fcc.gov\/general\/cybersecurity-small-business\" target=\"_blank\" rel=\"noopener noreferrer\">5 critical cyber security tips<\/a> for small and midsize businesses:<\/p>\n<div class=\"table-of-content \">\n\t\t\t\t<p>Table of Contents<\/p>\n\t\t\t\t<ul><\/ul>\n\t\t\t\t<\/div>\n<h2>1. Consider Managed IT Services<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34864 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Group-6-150x150.png\" alt=\"Consider Managed IT Services\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Group-6-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Group-6-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>One of the easiest ways to improve your cybersecurity is to outsource it to experts who know how to protect your systems. Today, many companies offer managed IT services that are designed with data security in mind, and these cover all aspects of business operations.<\/p>\n<p>It\u2019s also worth reviewing the services that you already outsource, in order to make sure that your business partners are taking cybersecurity as seriously as you are. One area that is particularly critical for SMBs, but also often overlooked, is web hosting.<\/p>\n<p>Do you note infrequent times when your site is down? You might not make an intuitive connection between downtime and security vulnerabilities but it exists. A site that is offline indicates something could be wrong at your host\u2019s server and it might be hackers at play.<\/p>\n<p>What is a reasonable uptime expectation? Maybe higher than you think. In collaboration with Pingdom, consumer research group <a href=\"https:\/\/hostingcanada.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">HostingCanada.org<\/a> found that hosts with an annual average uptime with less than 99.95% were untenable as a business solution. That may seem quite good, but even 0.05% of downtime equates to <b>more than 43 hours<\/b> of a website being offline over the course of a year. The bottom line - web hosts that can\u2019t keep your site up at that rate can be a major vulnerability for your business.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/every-month-is-cybersecurity-awareness-month\/\">Every Month Is Cybersecurity Awareness Month<\/a><\/p>\n<h2>2. Patch Your Vulnerabilities<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34863 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-1-150x150.png\" alt=\"Patch Your Vulnerabilities\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-1-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-1-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Second, update your software. We all know we should do this, but it often gets overlooked in a busy working environment.<\/p>\n<p>The consequences of not updating your software can be severe, though. <a href=\"https:\/\/www.wired.com\/story\/equifax-breach-no-excuse\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Equifax breach<\/a> was one of the biggest stories of 2018 and involved the personal information of 143 million people being exposed. One of the strangest aspects of the leak, though, was that it would not have happened had Equifax updated their security software.<\/p>\n<p>This leak was made worse by the fact that Equifax did not tell anyone about the breach for 6 weeks, thereby incurring fines on top of those they already faced. This, in turn, points to another type of vulnerability that you should take seriously as an SMB: the <b>heavy fines <\/b>that can follow a data breach.<\/p>\n<blockquote><p>Even with the best security in the world, mistakes sometimes occur, and you should plan for them.<\/p><\/blockquote>\n<p>If the initial data breach doesn\u2019t kill your business, <a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/data-breach-fine\/\" target=\"_blank\" rel=\"noopener noreferrer\">the fines might<\/a>. This is particularly relevant for SMBs, because where a bigger organization can absorb the cleanup and containment costs of a breach, SMBs may not even survive the attack. According to the U.S. National Cyber Security Alliance, 60 percent of small companies are unable to sustain their business more than six months <a href=\"https:\/\/www.denverpost.com\/2016\/10\/23\/small-companies-cyber-attack-out-of-business\/\" target=\"_blank\" rel=\"noopener noreferrer\">following a cyberattack.<\/a><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/the-importance-of-patching-while-working-remotely\/\">The Importance of Patching While Working Remotely<\/a><\/p>\n<h2>3. Educate Your Employees<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34728 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Sharpening-Your-Salespeople\u2019s-Skills-150x150.png\" alt=\"Educate Your Employees\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Sharpening-Your-Salespeople\u2019s-Skills-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Sharpening-Your-Salespeople\u2019s-Skills-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Another huge source of risk for SMBs is poor staff knowledge and training, or even disgruntled employees deliberately leaking information.<\/p>\n<p>Believe it or not, many people are still not using strong passwords for their online or business accounts, and many still do not know how to spot a simple email scam. According to a recent Verizon report, one-fifth of data breaches are caused by human error, and this represents just as large a risk to SMBs as any technical infrastructure.<\/p>\n<p>Employee education and employment procedures should, therefore, take into account three primary sources of risk.<\/p>\n<ol>\n<li>Make sure that your employees know how to keep their accounts secure.<\/li>\n<li>This training should extend to physical security, so that employees know who should be in the office at a particular time, and report any suspicious characters.<\/li>\n<li>You should put in place rigorous exit procedures for employees who leave, shutting down their access to all critical systems immediately.<\/li>\n<\/ol>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/guide-to-cybersecurity-training-programs\/\">Creating a Robust Cybersecurity Training Program<\/a><\/p>\n<h2>4. Physically Secure Your Network<\/h2>\n<p id=\"last\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34862 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-2-150x150.png\" alt=\"Physically Secure Your Network\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-2-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-2-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Amid all the talk about securing systems and networks, it\u2019s easy to forget that physical devices are also a source of vulnerability. You can have the strongest network protections in the world and the best-trained staff, but sometimes overcoming your security measures is as easy as an attacker walking into your office and re-setting your router.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>The solution here is twofold. First, make sure that access to your physical infrastructure is limited to those who need it. Second, you can monitor access to your premises and key pieces of office infrastructure using video cameras.<\/p>\n<h2>5. Use Firewalls<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34861 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-3-150x150.png\" alt=\"Use Firewalls\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-3-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-3-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Finally, make sure you do what the SBA (Small Business Administration) has been <a href=\"https:\/\/www.sba.gov\/managing-business\/cybersecurity\/top-ten-cybersecurity-tips\" target=\"_blank\" rel=\"noopener noreferrer\">advising for years,<\/a> and set up firewalls to protect all parts of your network. This includes not just checkout and sign-up pages, but every single public-facing page on your site.<\/p>\n<p>This also extends to any network used by your employees to access business documents. If your employees sometimes work from home, for instance, they should have a firewall installed on their home computer.<\/p>\n<p>Your options, when it comes to firewalls, can be pretty confusing, but the standard firewalls that come with Windows 8 and 10 are a good place to start if you haven't set them up already. Beyond this, there are other solutions that will analyze network traffic in more depth, and catch greater levels of suspicious activity.<\/p>\n<p>Or, and to return to my first point, you can contract out your firewall protection to an expert, who will be able to advise you on the best protection for your SMB.<\/p>\n<h2>Plan, Plan, and Plan<\/h2>\n<p>Those 5 critical cybersecurity tips a starting point: ultimately, cybersecurity is your responsibility. Even if your business relies on a large number of third-party suppliers and partners, if you are sharing data with them you will be held responsible if it is stolen.<\/p>\n<p>The best advice of all and beyond the 5 critical cybersecurity types explained here, therefore, is to plan. This involves assessing your level of risk, putting in place suitable security measures, and taking expert advice on the best way to secure your networks. It should also involve a consideration of what you will do in the event that you become the victim of a cyberattack.<\/p>\n<p>The steps above will go a long way toward securing your business infrastructure against attacks, but even with the best security, they can still succeed. It is therefore critical that both you and your employees know how to respond, in order to avoid an attack sinking your entire business.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/3-key-strategies-msps-can-use-to-elevate-cybersecurity-awareness\/\">3 Key Strategies for MSPs to Elevate Cybersecurity Awareness<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you run a small business, you might not think that you are a priority target for hackers. But you&#8217;d be wrong and here are 5 critical cybersecurity tips. Small and Medium-Sized Businesses (SMBs) are among the most frequent target for cyber attacks. Even the smallest business holds a wealth of personal information on customers, [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":34859,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-34857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/34857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=34857"}],"version-history":[{"count":5,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/34857\/revisions"}],"predecessor-version":[{"id":58732,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/34857\/revisions\/58732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/34859"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=34857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=34857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=34857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}