Friday, April 5, 2019

Cybersecurity for SMBs




Overview

Many articles have been written on the topic of cybersecurity, but most of them are targeting large enterprises that have IT departments and numerous resources.  This article is specifically designed for SMBs and contains simple, straightforward steps that can be taken to help improve your business cybersecurity.

What Is Cybersecurity

Although most people are aware of the term cybersecurity, many may not fully understand what it means.  Cybersecurity is simply the actions you and your employees take to protect the data on your computers, mobile devices and network against criminal or unauthorized access and use.

Unfortunately, SMBs are at the forefront of cybersecurity breaches today.  Here are some sobering facts that show how SMBs are being targeted:
  • Forty percent of all cybersecurity attacks are targeted at companies with less than 500 employees.1
  • Only fourteen percent of small businesses have a plan in place to protect their business.2 
  • The number one cybersecurity threat to small businesses comes from their own employees.3
  • Sixty percent of small businesses go out of business within six months of suffering a cyberattack.4

These facts indicate why it is critical for your business to take the necessary precautions to protect your data, your employees and your business.

Fortunately, there are some relatively simple steps to take that will help make your business more cybersecure.

Cybersecurity – Getting Started

While many businesses are fortunate and have IT departments or security departments that are charged with maintaining cybersecurity, the reality is that many SMBs do not.  However, this does not mean that their data should be unprotected.  All employees should be responsible for maintaining cybersecurity for the equipment and tools that they use and interact with on a regular basis.

The good thing is that cybersecurity is not a one-and-done type of process.  It is a cumulative process that begins with a series of small improvements and then depending on the requirements of your business, additional layers can be built up over time (as your business and budget allows).

The first step to implementing improved cybersecurity is also the easiest: educating your employees on the importance of cybersecurity.  Help them understand that cybersecurity does not just mean having their computer hacked, but that it also includes many other ways to gain unauthorized access to your business data.

Cybersecurity Components

Effective cybersecurity is composed of three components: common sense, physical security and electronic/digital security. 

I mention common sense because there are many simple steps that businesses can take to help implement cybersecurity that are no-to-low-cost.  This is also an area that many cybersecurity “experts” do not mention.

Why is physical security included?  Because many cybersecurity breaches occur as a direct result of a physical security breach.  Including physical security helps employees realize that there are many paths to enabling a cybersecurity attack.

Listed below are steps your business can take to help implement cybersecurity:

Cybersecurity – How To implement – Common Sense Security Steps

  • Don’t write passwords down and then leave the piece of paper laying on your desk or in your drawer
  • Don’t write passwords on a sticky note and attach it to the computer
  • Physically attach laptops to the workstation or desk area via a security cable (security cables are available for purchase from numerous vendors)
  • Install polarized screen protectors on all computer monitors and laptops to prevent unauthorized viewing of the screens
  • Lock computers with a password when away from them during business hours
  • Turn off computers and physically lock them up during non-business hours
  • Don’t take or use work computers, cell phones, or other mobile devices to public places where they can be forgotten, stolen, cloned or hacked
  • Don’t connect business computers or mobile devices to unsecured or public Wi-Fi networks
  • Don’t open email from unknown senders or sources
  • If there is any doubt about the authenticity of an email, delete it
  • Don’t click on hyperlinks or attachments from unknown senders or sources (in text messages, chat sessions or email)
  • Don’t provide personal or company information over the phone to anyone

Cybersecurity – How To implement – Physical Security Steps 

  • If possible, use badges for entry to your business or offices
  • When people enter your facility, don’t allow “drafting” (this is the practice of someone following the person in front of them without having to swipe a badge or provide other methods of authentication)
  • Be alert to social engineering (this is the practice of manipulating an employee to provide confidential information)5
  • Be alert to suspicious cars in the parking lot or people hanging around your business that are not employees
  • If you see someone suspicious inside or outside your place of business, notify your management immediately
  • If you see someone inside your business acting suspiciously, notify your management immediately
  • If you see someone in an area where they should not be, notify your management immediately
  • Install security cameras over all entryways and secure areas; if you cannot afford real cameras you can also install fake cameras that are very realistic looking

Cybersecurity – How To implement – Electronic/Digital Security Steps 

  • If you provide Wi-Fi in your facility, take the following steps6
    • Change both the router’s default generic user name and password to something more secure, as the defaults are a matter of public record
    • Change the service set identifier (SSID), aka the network name that is broadcast by the router, to something more personalized
    • Turn off the SSID broadcast so that anyone who needs to get onto your Wi-Fi will have to be told the SSID to enter
    • Turn on the router’s encryption, set it to WPA2 and set up a password for devices to use to connect to Wi-Fi
    • Turn on the router’s firewall
    • Unless you specifically require it, turn off the Guest Network setting
    • Turn off Wi-Fi Protected Setup (WPS)
    • Periodically update the router’s firmware (this is the software for the router)
  • Have and enforce a mandatory password policy for logging on to any computers, cell phones or mobile devices that are used for work
  • Require passwords for logging on to any computers, cell phones or mobile devices that are used for work
  • Require a password to log in to any business networks or databases
  • If possible, establish two-factor authentication (2FA) to log on7
  • Don’t use common words, phrases, or number strings for a password (such as “password”, “1234”, a pet’s name, etc.)
  • All passwords should be at least 8-12 characters long and contain a mixture or upper- and lower-case letters, numbers, and special characters
  • All passwords should be changed once per quarter, with at least the previous 6 passwords not able to be reused
  • If employees must connect to your business network when away from the office, ensure that they connect via a virtual private network (VPN)
  • All computers have a firewall included with the operating system, so ensure that the firewall is turned on
  • Install virus protection software on all computers, cell phones and mobile devices
  • If you already have virus protection, ensure that it is turned on and kept up to date
  • Ensure that all laptops, cell phones and mobile devices have tracking/locking/wiping software installed so that they can be located and/or wiped if lost
  • Do not allow the use of “shadow IT” (the use of personal equipment, hardware or software that is not supported by your IT organization)8
  • Backup all critical data (on employee computers, network servers, etc.) on a regular basis
  • Do not allow employees to connect USB or other external devices to computers or networks; if they must use them, have your virus protection software set to immediately scan them as soon as they are connected
Summary

Depending on the size of your business and the resources you have available, some of the recommendations listed above may require you to manually police and enforce them to ensure compliance.  Others may require a level of technical competency that you do not have available.  If that is the case, for the security of your business it may be worthwhile to consider hiring a consultant or subcontracting some of those functions out.

However, regardless of the size of your business, by following and implementing the above recommendations you will have taken positive steps to help secure your business from cybersecurity breaches and cyberattacks. 




© 2018 – Richard Hatheway, Catalyst Strategic Marketing
All Rights Reserved.


1,2 – “Untrained and Vulnerable: Small Biz Losing War on Cybercrime”, CIO Today, February 1, 2018, https://www.cio-today.com/article/index.php?story_id=107220

3 – “The 2017 State of SMB Cybersecurity”, Ponemon Institute, https://keepersecurity.com/assets/pdf/2017-Cybersecurity-SMB-Infographic.pdf

4 – “60% of small companies that suffer a cyber attack are out of business within six months.”, The Denver Post, October 23, 2016, https://www.denverpost.com/2016/10/23/small-companies-cyber-attack-out-of-business/


6 – “12 Ways to Secure your Wi-Fi Network”, PC Magazine, October 14, 2016, https://www.pcmag.com/article2/0,2817,2409751,00.asp

7 – “Understanding the basics of two-factor authentication”, Malwarebytes Lab, January 20, 2017, https://blog.malwarebytes.com/101/2017/01/understanding-the-basics-of-two-factor-authentication/

8 – “How to prevent shadow IT”, CSO Online, February 16, 2016, https://www.csoonline.com/article/3032209/security/how-to-prevent-shadow-it.html



The Value of a Value Prop - Part 2

  INTRODUCTION Everyone in business – and in marketing especially – knows that you need to have a value proposition (aka, value prop)....