For Subscribers

Expert Advice: How to Up Your Cyber Security What you need to know to fend off a hack attack

By Ann C. Logue

Opinions expressed by Entrepreneur contributors are their own.

Xceedium
Breach fuzz: Ken Ammon of Xceedium.

The average cost to a U.S. business of a lost or stolen record containing customer information is $201, according to the 2014 Cost of Data Breach Study conducted by the Ponemon Institute for IBM. The most expensive incidents are due to malicious attacks, not to human error or process failure. That's a problem for your business.

Mega-retailer Target may have had to pay cash to counter its late-2013 data hack, which reportedly affected up to 110 million customers, but it was lucky. Similar breaches have resulted in the destruction of companies.

"If you get it wrong, your business can be erased," says Ken Ammon, chief strategy officer at Xceedium Inc. in Herndon, Va. Xceedium sells platforms used by government and major corporate customers to manage access privileges on information systems. Ammon urges startups, even those in their early stages, to pay extra attention to the security of data. We asked him to tell us more.

The Target breach apparently came about through an HVAC contractor. How can companies protect themselves?

Ask more questions and take a harder look at your suppliers. Target's HVAC providers should have had limited access to the company's system. Can your system be walled off to limit access based on a user's role? Platforms create a stronger authentication system, with two-factor authentication and a single sign-on, and small businesses can often get access to them through their IT providers. Many of our clients are major systems integrators that sell our service to their small-business clients.

What if you're the vendor working with a larger company? How can you assure your client that you won't cause problems for them?

If you're targeting larger companies, you have to be in touch with what matters on security. No matter the access system, contractors need to show that they are monitoring employees and setting boundaries. You definitely should be looking into tools and processes. A good step is two-factor authentication and password rotation for administrators.

Should businesses be more concerned about someone hacking into their systems from outside or from inside?

In a way, it's the same. Hackers use techniques that take advantage of an unwitting insider. They can use LinkedIn to find out the names of your administrators and the systems they use, and then send a spear-phishing email to hijack their credentials.

Then you have the Edward Snowden problem—an insider who wants to steal your data. The lower your security defense, the more tempting it will be, [and] the harder it will be to get caught.

What are some basic recommendations for startups?

If you have a "bring your own device" (BYOD) policy, you have to protect yourself before these phones and laptops connect to corporate infrastructure. You have to take a look at endpoint security. Establish a security policy and educate users. Make sure you cover what is allowed and disallowed, and include the penalty for violating the policy.

Security training has a substantial return for reducing risk, so train and support your users.

Use managed or cloud-based services for delivering office automation support platforms such as mail, calendar and office applications. Make sure the provider offers two-factor authentication support for administrators. Don't let your small-business IT provider sell you antiquated offerings.

There's an advantage, though. What you save from BYOD and cloud computing, you should put into security.

Ann C. Logue is the author of Hedge Funds for Dummies and Day Trading for Dummies.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Business News

Here's What Companies and Services Are Open and Closed on Juneteenth 2025

Juneteenth was designated as a federal holiday in the U.S. in 2021.

Living

You Built a Successful Business — But Your Inner Self Got Neglected in the Process. Here's What You Can Do About It Now.

Are you disconnected from the person you were before you started your business? Here's how to regain control over your inner design.

Business News

AI Is Going to 'Replace Everybody' in Several Fields, According to the 'Godfather of AI.' Here's Who He Says Should Be 'Terrified.'

Geoffrey Hinton, called the "Godfather of AI" due to his pioneering work on AI, says some fields face a heavier risk of replacement due to automation.

Innovation

How to Identify the Patent-Worthy Innovations in Your Business

Here's how to know which innovations are truly worth protecting — before putting time and money into filings that may never pay off.

Business Ideas

70 Small Business Ideas to Start in 2025

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2025.