7 Key Cybersecurity Tips for Small Businesses
Grow Your Business, Not Your Inbox
Large enterprises typically have the resources to protect their networks against the ever-evolving landscape of cybersecurity threats. But smaller businesses have tighter budgets and fewer resources. Hackers know that, which is one of the main reasons they target small businesses. To compound matters, small businesses adapting to remote work have a new set of security considerations to contend with.
A cyberattack can have serious consequences, with many small businesses having to shutter for good due to the fallout. These are high stakes. With that in mind, here are seven key security recommendations for small businesses:
- Educate users: No amount of technology can completely protect your network and data. User training and awareness are crucial to building solid defenses. Industry research shows that workers cause more than half of all cybersecurity incidents, making humans the “weakest link” in IT security. Trained workers, however, shift from liabilities to assets, becoming your first line of defense against cybersecurity threats.
- Secure endpoints: Small business IT leaders peg laptops and mobile devices as the most vulnerable endpoints or entry points to a network. Whatever the device, all endpoints must be secured to help prevent a breach. Many traditional or anti-virus tools block only the malware they recognize, based on signatures that have been written into the AV software. More sophisticated endpoint protection platforms scan and block malware, using a constantly updated threat list, protecting every device on the network.
- Apply security patches: Left to users, many security patches will be ignored, creating vulnerabilities that hackers know how to exploit. The fast-spreading WannaCry and Petya ransomware attacks first brought ransomware attacks to the top of the news cycle, and attacks have grown since. Remote work is complicating the problem and exposing new vulnerabilities. Many ransomware attacks exploit vulnerabilities that can easily be fixed through proper patch management. Businesses need strict patching policies so users don’t ignore software update prompts. Preferably, businesses would deploy automated patch management, taking users out of the equation.
- Deploy firewalls: Think of a firewall as a sentry that allows only authorized guests into a building. Firewalls block unauthorized content with controls, such as access denial to IP addresses known to deliver malware. Even if a malware payload is delivered, a firewall can prevent it from communicating with the command and control server from which it would receive instructions to lock out data. This could stave off infection until the malware is detected and removed. Firewalls let you choose which types of content to allow into your network, blocking unauthorized data while still allowing outbound communications. For remote workers, tapping business-grade Internet and connectivity can help.
- Enforce password policies: Although users tend to resist them, passwords are necessary and should be changed regularly. Require users to use combinations with numbers, special characters and upper and lowercase letters to make passwords harder to crack.
- Prepare an incident response plan: Prevention is critical to a cybersecurity strategy but you cannot ignore another critical component — incident response. Since no security measure is 100%foolproof, businesses must prepare for the eventuality of a breach. Every business should have an incident response plan (IRP) outlining what steps to take and who is responsible for the response following a breach. Nearly 40% of companies don’t have any sort of incident response plan in place in case of a breach, according to the Ponemon Institute. Without an IRP, it’s hard to minimize the damage of a breach if you’re unclear on what actions to take. Some malware infections spread at lightning speed once a network has been breached, so reaction time is critical. Trying to come up with a response plan after an incident already occurred is too late. And remember, cybersecurity experts warn that for most businesses, a cyberattack isn’t a matter of if, but when.
- Build a cross-functional security team: Avoiding, preparing for, and responding to security breaches involves more people than those in charge of IT and cybersecurity. Technical staff are usually the first to spring into action following an incident as they seek to identify the problem, assess the damage and start remediation, but the response also includes non-technical aspects. In addition to employees, it may be necessary to notify customers and suppliers about the breach, so there is work to do for management, as well as other functions like marketing, PR, HR and legal.
In its most recent report on the state of cybersecurity for SMBs, the Ponemon Institute reported that the number of small businesses that experienced breaches “involving sensitive information about customers, target customers or employees” increased to 63% from 58% in one year. Nearly one-third of companies that were breached did not know the root cause of the attacks. This means they lacked the systems and practices to not only stop a breach, but also figure out how it happened. Considering the relentless pace of cyberattacks, this is too risky. SMBs need strong, well-executed cybersecurity strategies.
Comcast Business SecurityEdge can help protect the Internet-connected devices that employees and guests use from malware, ransomware, phishing, botnets, and more. Comcast Business at Home provides a dedicated business-grade Internet connection with the option of added security for remote workers.