Small Business Cybersecurity Quick Wins

Small Business Cybersecurity Quick Wins

Small businesses are quickly deploying various technologies to better serve their customers and manage their business more efficiently. Different kinds of technologies, however, come with a variety of risks and, thus, require alternative strategies to protect them. Our “Quick Wins” blog can be used as a starting point as a content outline for your own security awareness training program. We even created a downloadable infographic for your convenience. 

Icons_Printer

QUICK WINS FOR COPIER / PRINTER / FAX SECURITY.
DIGITAL COPIERS / PRINTERS / FAX MACHINES ARE COMPUTERS TOO.

Click to download a PDF of the "Small Business Cybersecurity Quick Wins" Infographic

 

Icons_Email
QUICK WINS FOR EMAIL SECURITY.

WHEN IN DOUBT, THROW IT OUT.
BE EXTRA CAUTIOUS WHEN IT COMES TO EMAIL.

  • Require strong, unique passphrases on email accounts
  • Turn on two-factor authentication
  • Do not use personal email accounts for company business
  • Employees should know not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source. Employees should also be instructed about your company’s spam filters and how to use them to prevent unwanted, harmful email
  • Learn More: https://www.ic3.gov/media/2017/170504.aspx

Icons_File
QUICK WINS FOR FILE SHARING.

SHARING IS CARING, ONLY WHEN DONE SECURELY.

  • Restrict the locations to which work files containing sensitive information can be saved or copied
  • If possible, use application-level encryption to protect the information in your files
  • Use file-naming conventions that don’t disclose the types of information a file contains Monitor networks for sensitive information, either directly or by using a third-party service provider
  • Free services do not provide the legal protection appropriate for securing sensitive information
  • Learn More: https://www.ftc.gov/tips-advice/business-center/guidance/peer-peer-filesharing-guide-business

 

Icons_Mobile
QUICK WINS FOR MOBILE DEVICES.

KEEP A CLEAN MACHINE FOR ON-THE-GO DEVICES.

 

Icons_Credit-Card
QUICK WINS FOR POINT OF SALE SYSTEMS.

HACKERS ARE OFTEN FINANCIALLY MOTIVATED.
DON’T MAKE IT AN EASY PAYDAY.

  • Change from manufacturer's default admin password to a unique, strong passphrase
  • Use a network monitoring app to scan for unwanted users
  • Restrict remote administrative management
  • Log out after configuring
  • Keep firmware updated
  • Learn More: https://www.us-cert.gov/ncas/tips/ST15-002

 

Icons_Router
QUICK WINS FOR ROUTERS.

YOUR HOME OR BUSINESS NETWORK IS NOT TOO SMALL TO BE HACKED.

  • Create unique, strong passphrases
  • Separate user and administrative accounts
  • Keep a clean machine: Update software regularly
  • Avoid web browsing on POS terminals
  • Use antivirus protection
  • Learn More: https://www.pcisecuritystandards.org/merchants/

 

Icons_Social
QUICK WINS FOR SOCIAL NETWORKS.

SOCIALIZE ONLINE WITH SECURITY IN MIND.

  • Limit who has administrative access to your social media accounts
  • Set up 2-factor authentication
  • Configure your privacy settings to strengthen security and limit the amount of data shared. At the very least, review these settings annually
  • Avoid third-party applications that seem suspicious and modify your settings to limit the amount of information the applications can access. Make sure you’re accessing your social media accounts on a current, updated web browser
  • Learn More: https://www.us-cert.gov/ncas/tips/ST06-003

 

Icons_Computer
QUICK WINS FOR SOFTWARE.

HAVING THE LATEST SECURITY SOFTWARE, WEB BROWSER AND
OPERATING SYSTEM ARE THE BEST DEFENSE AGAINST THREATS.

  • Make sure your computer operating system, browser, and applications are set to receive automatic updates
  • Ensure all software is up to date. Get rid of software you don't use
  • Your company should have clear, concise rules for what employees can install and keep on their work computers
  • When installing software, pay close attention to the message boxes before clicking OK, Next or I Agree
  • Make sure all of your organization’s computers are equipped with antivirus software and antispyware. This software should be updated regularly
  • Limit access to data or systems only to those who require it to perform the core duties of their jobs
  • Learn More: https://www.lockdownyourlogin.org/update-software/

 

Icons_Third-Party2
QUICK WINS FOR THIRD PARTY VENDORS.

DO YOUR DUE DILIGENCE,
GET IT IN WRITING AND MONITOR COMPLIANCE.

 

Icons_USB-Drive
QUICK WINS FOR USB DRIVES.

THESE SMALL DEVICES CAN EASILY CREATE HUGE SECURITY ISSUES.

  • Scan USBs and other external devices for viruses and malware
  • Disable auto-run, which allows USB drives to open automatically when they are inserted into a drive
  • Only pre-approved USB drives should be allowed in company devices. Establish policies about the use of personal, unapproved devices being plugged into work devices
  • Keep personal and business USB drives separate
  • Don’t keep sensitive information on unencrypted USB drives. It is a good practice to keep sensitive information off of USB drives altogether
  • Learn More: https://www.us-cert.gov/ncas/tips/ST08-001

 

Icons_www
QUICK WINS FOR WEBSITE SECURITY.

CREATE A SAFE ONLINE SHOPPING EXPERIENCE FOR YOUR CUSTOMERS.

 

Icons_Wi-Fi
QUICK WINS FOR WI-FI SECURITY.

THINK BEFORE YOU CONNECT.

  • Use separate Wi-Fi for guests or customers than you do for business
  • Physically secure Wi-Fi equipment
  • Use a virtual private network (VPN) when using public Wi-Fi
  • Do not connect to unknown, generic or suspicious Wi-Fi networks. Use your mobile carrier's data plan to connect instead
  • Turn off Wi-Fi and Bluetooth when not in use on your devices
  • Secure your internet connection by using a firewall, encrypt information and hide your Wi- Fi network
  • Learn More: https://www.consumer.ftc.gov/articles/0014-tips-using-public-wi-fi-networks
Share :

Sign Up For Network Security News