The importance of cybersecurity
Many small-business owners may think their organizations hold little appeal to hackers due to their small size and limited scope. However, according to the Small Business Administration (SBA), this naivety may actually make them ideal targets. Small business are keepers of employee and customer data, financial account information, and intellectual property. Their systems, if not adequately protected, may also inadvertently provide access to larger supplier networks. “Given their role in the nation’s supply chain and economy, combine with fewer resources than their larger counterparts, to secure their information, systems, and networks, small employers are an attractive target for cybercriminals,” reports the SBA on its cybersecurity website. Consider the following tips complied from information supplied by the SBA, the Federal Trade Commission (FTC), and the Federal Communication Commission (FCC).
What are your vulnerabilities?
To protect your organization, you must first understand your vulnerabilities. How are your systems protected? Do you collect and store personal information of customers and employees, such as credit card information, Social Security numbers, and birth dates? If so, how is this information stored and who may access it? Do you store it in multiple locations and formats? Are these files password protected and, if so, are you using multiple complex passwords? Do you have a Wi-Fi accessible to employees and customers? How do your vendors and other third-party service providers protect their information? You may want to engage a professional to help identify your risks.
Tips for Security
When monitoring your security, ensure that you have firewall and encryption technology that protects your Internet connections and Wi-Fi networks. Make sure your business’s computers have antivirus and anti-spyware software installed and updated automatically. Require employees and others who access your system to use complex passwords that are changed regularly. Keep only personal data that you actually need and dispose of it securely as soon as it no longer serves a business purpose. Back up critical information and data on a regular basis and store it in backups securely offsite. Assign individual user accounts to employees and permit access to software and systems only as needed. Be especially cautious with laptops and company-assigned smartphones. Question third-party vendors to ensure that their security practices comply with your standards.
Some of the Stats:1
Redundancy is key
In writing or speaking, redundancy is typically not recommended unless you’re really trying to drive a point home. When it comes to your digital life, however, redundancy is not only recommended, but also critical. That’s because redundancy means having multiple data backups stored in different locations. Here are some ideas for redundancy when backing up your data:
More about cloud storage
Cloud storage – using internet-based service providers to store digital assets such as books, music, videos, photos, and even important documents including financial statements and contracts – has become increasingly popular in recent years. But is it right for you? If a cloud service is one of your backup tactics, be sure to review carefully the company’s policies and procedures for security and backup of its servers. Another good idea is to encrypt (that is, convert to code) to protect sensitive documents and your external drives. Other considerations include:
Educate your employees
To help ensure that your employees are also maintaining sound cybersecurity practices, establish clear security policies and procedures to put them in writing. Cover such topics as handling sensitive or personal information, appropriate use of internet and social media, and reporting vulnerabilities. Clearly spell out consequences for failing to follow the policies. Develop a mandatory employee training program on the importance of cybersecurity. Explain the basics of personal information, as well as what is and isn’t acceptable to post on social media.
Employees could unknowingly release information that could be used by competitors or, worse, by criminals. Ensure that employees understand the risks associated with phishing emails, as well as “social engineering” – manipulative tactics criminals use to trick employees into divulging confidential information.
For more information, visit the SBA cybersecurity website. In addition, business owners might want to review “Protecting Personal Information: A Guide for Business” and “Start with Security: A Guide for Business,” both available on the FTC website.
Sources:
1-https://mmitiowa.com/the-significance-of-cyber-security-in-smbs/
2-https://www.forbes.com/sites/edwardsegal/2022/03/30/cyber-criminals/?sh=2f189f3352ae
Investment Advisory Services offered through Trek Financial LLC., an (SEC) Registered Investment Advisor.
Information presented is for educational purposes only. It should not be considered specific investment advice, does not take into consideration your specific situation, and does not intend to make an offer or solicitation for the sale or purchase of any securities or investment strategies. Investments involve risk and are not guaranteed, and past performance is no guarantee of future results. For specific tax advice on any strategy, consult with a qualified tax professional before implementing any strategy discussed herein. Trek 23-544