Fewer Security Precautions Make Small Businesses A Prime Target For Hackers
Computers & Technology → Site Security
- Author Alex Famili
- Published August 11, 2011
- Word count 474
A primary role of any small to medium sized business leader is to manage costs and cut back where possible, especially in tough economic times. In doing so it is important that these efforts do not compromise the ability to secure information, minimize liabilities and ultimately make money.
Many small business managers believe they are less likely to be a target in a malicious attack because their company is small, but this is simply untrue. Hackers prey on small and medium sized businesses because they generally take fewer security precautions than their larger counterparts making them more vulnerable to these types of attacks.
Smaller businesses are generally more entrepreneurial and less emphasis is placed on rigid policy and procedure; therefore, a laid-back approach to best practices is often adopted as a result. The simplest precautions to implement are also the easiest to overlook and this is cause for trouble.
The bullet points below provide a quick and easy checklist to help reaffirm your commitment to security.
Training and education: Make sure that all employees understand the importance of the matter so that no one is a weak link in the system.
Access procedures: It may be convenient and productive for employees to log in extra hours and work on company files at home but keep in mind that anything brought in from outside is an instant threat. One infected file can contaminate an entire network. Formulate a plan to address this. Consider a company policy that forbids this practice or even disable USB ports. It is possible to disable only the flash drive portion of the USB so that they still are compatible with other functional hardware such as keyboards and mice.
Review permission: Employees should have access only to the parts of the system they need to complete their job function. It is particularly easy to overlook default settings when initiating a new user. Also, schedule this review periodically as job functions and needs change over time.
Change passwords regularly: Periodic changes to passwords are sometimes required but if not, employees are reluctant to update them. It is difficult to remember new passwords, after all a person can only have one birthday, birth city and first pet but this is an integral part of an overall strategy for information security at every level including servers, systems etc.
Research cloud computing solutions: Make sure that the vendors you partner with take security as seriously as you do. Research each vendor especially those who store or manage secure information for your company.
Install and update virus software: As much as we all know about the importance of virus protection delaying updates and not registering pre installed software are common occurrences. Don't make this mistake. A quick email reminder to all employees is a great way to keep this topic top of mind among your team.
Alex Famili is the co-founder and principal of Twist Solutions, LP. Twist Solutions is a Dallas Computer Support Company specializing in computer system management, computer services and a full range of Computer Services.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- A Brief Guide: The A-Z of Tailgating Attacks
- Essential Tips for Proofreading and Editing University Assignments
- Stop the Bleeding
- Top 10 Digital Forensics Tools: An In-Depth Exploration
- All You Need To Know To Secure Your Data From Phishing
- Crypto Security Guide: Everything You Need to Know to Protect Your Crypto
- Advancing Email Validation in Laravel
- Fortifying the Digital Fortress: Understanding the Foundations of Cybersecurity Architecture
- How is GenAI Changing Cybersecurity?
- AI-Enhanced Cybersecurity Trends for 2024
- The Game of Trust: A Guide to the Future of KYC in Gaming
- AI in Cybersecurity: The New Frontier in Digital Protection
- Metadata: The Attorney’s Secret Weapon in Civil Litigation
- The importance of cyber security
- 5 Reasons to Comply with CMMC
- Payless CCTV Security Camera
- How Bitdefender Protect From Pegasus Spyware
- Printer Security? Here Are 6 Tips To Keep Your Business Safe
- Why it is important to install Access control system at your business
- Powerful Keyloggers for Windows
- Website security check: Tips on how to protect your website from hackers
- How will cyber threats evolve in 2020?
- When to choose red teaming over penetration testing: A guide to a robust cybersecurity program
- Protect your files with drive image backup software
- How Cloud Management Values Change Your Business
- The U.S. Government and Zero Day Vulnerabilities
- Spyware – Yet Another Cyber Menace
- Reset lost passwords in Windows with Active@ Password Changer
- Antivirus measures you should know when your PC is infected with a virus
- Security Fit For Royalty!