Categories: Articles

Why you need to get serious about cybersecurity

used with permission from HP Technology at Work

More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That’s a big mistake, because small business owners are at a greater risk than they may think for data security problems and cybercrime.

Your businesses at risk

Businesses are starting to wake up to the risk of cybercrime. In a 2016 survey by the Ponemon Institute, more than half of businesses surveyed believe cyber attacks are becoming more targeted, more sophisticated, and more costly.

Cyber attacks are also targeting small businesses to a greater degree than in the past. Some 55% of respondents in the Ponemon study experienced a cyber attack in the past 12 months, and 50% had a data breach in the past year.

Cyber attacks are costly and disruptive. Companies in the study that suffered an attack spent an average of $879,582 due to damage or theft of IT assets. What’s more, disruption to normal operations cost the affected businesses an average of $955,429.

However, small business owners remain inadequately prepared to defend against cyber attacks. According to Ponemon:

  • Just one-third of respondents say the technologies they currently use adequately detect and block most cyber attacks.
  • Nearly six in 10 say attacks have gotten past intrusion detection systems.
  • 76% say attacks have gotten past their anti-virus solutions.

What are the most common risks?

Here are some of the most common weaknesses that make businesses vulnerable to cyber attacks—and how to get serious about defending yourself.

Cloud-based applications and data storage: Cloud usage is on the rise and expected to grow, which creates more opportunity for cybercriminals. Web-based attacks are the most common type of cybercrime, according to Ponemon, and 41% of respondents have suffered a data breach due to errors by third parties (such as contractors) that have access to cloud applications.

  • Solution: Limit access to your cloud-based apps only to those who need it. Choose laptops with built-in encryption of storage drives for extra protection.

Phishing and social engineering: Humans remain a weak link in cybersecurity, which makes phishing and social engineering popular approaches for cybercriminals. Ponemon found 65% of small and midsized businesses that have a password policy do not strictly enforce it.

  • Solution: Develop and enforce a cybersecurity policy that includes regular training and requires passwords be changed every six months at minimum. Guard against human error by buying PCs with strong multi-factor authentication mechanisms that combine factors such as PINs and fingerprints or passwords and facial recognition. For extra protection, add a mobile app such as HP WorkWise1 that lets employees monitor and lock their computers with their smartphones.

Mobile devices: Laptops, tablets, and smartphones used to access business-critical applications and networks create opportunity for cybercriminals. However, many businesses allow employees to use their own personal mobile devices for work.

  • Solution: Provide employees with company-issued mobile devices so you can set up device management solutions. Require employees to use a password or biometric authentication to secure their mobile devices.

Networked peripherals: When printers, scanners, copiers, and fax machines are connected to your business network, they can provide easy entry points for cybercriminals.

  • Solution: Choose printers with built-in security features that can detect and stop threats the moment they start. Establish and implement a security policy for printer use and restrict access to printers only to those who need them.

Remote work: Employees working in public settings or during business travel are at risk of having their notebooks or mobile devices stolen or compromised. Prying eyes may spy passwords or critical business data on a laptop screen.

  • Solution: Prevent data theft and loss by choosing notebooks with a full stack of endpoint security features, including an integrated privacy screen that darkens to prevent visual hacking.

Stay proactive

Business owners must take cybersecurity seriously. Developing smart policies and employing the proper technology can help you protect your small business from these very real risks.

 

 

[1] HP WorkWise smartphone app is available as a free download on the Apple Store and Google Play.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

The Executive’s Guide to Security Operations Center Models

Cyber threats never take a day off, never clock out and go home at the…

2 days ago

Introduction to Azure Services

Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…

2 days ago

Introduction to Microsoft Copilot

Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…

3 days ago

Project Management: Why is it important?

Making things happen is the art and science of project management. The process involves managing…

1 week ago

Enhancing Website Performance and User Experience Through Caching Strategies

In today's fast digital life, website performance is important, as it holds visitors and ensures…

1 week ago

Protecting Municipal Data: Security Tips for City Officials

The FBI reported that cyber attacks against government facilities saw an increase of almost 36…

1 week ago