<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=290086984736480&amp;ev=PageView&amp;noscript=1">
Search
word-map-thumb

The Alternative Board Blog

Save Yourself (& Business) from Cyber Attacks

Mar. 18, 2013 | Posted by The Alternative Board Worldwide

15 Things You Can Do to Reduce Your Risk

In September 2017, The Alternative Board surveyed hundreds of business owners about their cyber security experiences and fears, as well as their plans for keeping their companies safe. According to the results, over half of business owners have experienced some form of cybercrime, yet less than half have measures in place to protect themselves against future attacks.

U.S. businesses are clearly targets for cyber threats for obvious reasons, but businesses everywhere should prepare themselves for the worst.

Even if a small business is the unlikely target of a cyber threat, they should prepare themselves. If a high-ticket attacker is not interested in targeting them, an ex-employee or a competitor may be. Small businesses should therefore get better prepared.

There are plenty of sophisticated – and very expensive – solutions that can be put in place to protect your business. These involve a combination of security experts and software that can be engaged to identify any vulnerabilities and get them corrected. Most small businesses cannot afford this level of solution.

Want additional insight? Download Hiring a Business Coach for Your Small Business now 

DOWNLOAD

15 Steps to Improve Information Security 

Here are 15 steps a small business owner should take to improve the security of their information. This includes protection against both cyber attacks and physical security breaches.

  1. Be sure every computer in your business has anti-virus software installed. Confirm with your IT person that the software is configured to automatically load the latest virus definitions.
  2. Do not allow employees to use their personal computers to access your IT systems.
  3. Confirm with your IT person that you have a firewall sitting between your computers and the Internet.
  4. Be sure your IT person has a regularly scheduled process for applying the latest security patches to all of your computers.
  5. Ensure all of your computers are setup to lock themselves after 30 minutes of inactivity.
  6. Be sure each of your employees has a unique username and password, your systems are setup to force a password change every 90 days, and your employees are not sharing passwords. Ensure your employees do NOT record their passwords on sticky notes sitting on their desk.
  7. Do not print out any documents with secure data unless absolutely necessary. If documents need to be stored, make sure the hard copies are always physically secured. If you have to print out documents with secure data, utilize a shredding service to destroy sensitive documents after usage.
  8. Confirm with your IT person your data is backed up (offsite), you've tested a restore from backup, and your servers are connected to an Uninterrupted Power Supply (UPS).
  9. Create a written information security policy. Require existing and new employees to review and sign off.
  10. If you provide a guest wireless network, keep this separate from the wireless network your employees use. Do not put your guests and employees on the same wireless network.
  11. Ensure that your employees are very aware that they should never click on links from an unfamiliar email sender. If you think an email/link is legitimate, then go to the website in the link and open the link directly. Never open email attachments from unfamiliar senders.
  12. Consider Restricted User Profiles for your employees' workstations; this allows only your System Administrator to install new software and greatly reduces the risk of spyware andviruses.
  13. Be sure all of your employees use strong passwords (e.g. inclusive of numbers, capitals and non-alphanumeric characters).
  14. Utilize security features of wireless routers. This is also very important for your home because hackers attempt to break into home PCs in order to have them work for them.
  15. Sign up for the United States Computer Emergency Readiness Team (US-CERT) mailing list to receive the latest cyber security information directly to your inbox. Written for home and business users, alerts provide timely information about current security issues and vulnerabilities. There is an email signup option at the bottom of this page: http://www.us-cert.gov/

You may just want to hand this to your IT employee/consultant to run down. Getting a thumbs up on each of these items should help you sleep a lot better at night.

Read our 19 Reasons You Need a Business Owner Advisory Board

DOWNLOAD

Written by The Alternative Board Worldwide

Related posts

Aligning Employees to Your Company Culture
Apr. 25, 2019 | Posted by The Alternative Board Worldwide
Every organization comes with a unique culture, a set of agreed-upon values that govern the way the company does business. Some companies are better than others in defining that culture, so that...
When You're the HR Department for Your Business
Apr. 23, 2019 | Posted by Phil Spensieri, TAB York Region
Human Resources (HR) is an area that seems to cause most business owners the highest amount of stress. Unfortunately, without an HR Department, HR issues become the responsibility of you, the...
How to Appreciate (And Retain) Your Employees
Apr. 16, 2019 | Posted by The Alternative Board Worldwide
Any business that doesn’t place a high priority on employee appreciation is likely one that sees a fair degree of employee turnover. Back in the day, simply paying a worker on time—and perhaps...
Can You Have a "Fun" Workplace that's also Productive?
Apr. 11, 2019 | Posted by The Alternative Board Worldwide
Somewhere along the line, the idea of a serious, no-fun-zone workplace became institutionalized among American businesses. For a long time, that meant no intersection between “work” and “fun.”...
What are the Worst Mistakes You Can Make as a Leader?
Apr. 4, 2019 | Posted by The Alternative Board Worldwide
It takes a lot of smarts, experience, vision, intuition and skill to be an effective CEO or business owner. But all leaders must be mindful that their ability to make mistakes—just like everyone...
How Stronger Vendor Relationships Can Spur Growth
Apr. 2, 2019 | Posted by The Alternative Board Worldwide
Vendors may not seem like a high-priority constituency to most CEOs and business owners, but in fact, a strong business-vendor relationship can significantly boost growth. Unfortunately, many people...
Are You Ready For Your Exit?  Creating Your Exit Strategy
Mar. 26, 2019 | Posted by Phil Spensieri, TAB York Region
As a business owner, at some point, you will start thinking about what’s next; very often this thinking results in creating an exit strategy (or exit plan) Many business owners that I work with...
How to get better at Consultative Selling
Mar. 21, 2019 | Posted by Joe Zente, TAB Austin
Over the last year, I have interviewed over 100 salespeople on behalf of our clients.  I asked every one of them at the onset to describe their sales approach or methodology. In over 85% of cases,...
How to Plan a "Pivot Strategy" to Grow Your Business
Mar. 12, 2019 | Posted by The Alternative Board Worldwide
“Failure” is a word no CEO or business owner is comfortable with. But inevitably, failure occurs all the time (in lesser or major ways) in the business world. Small companies can’t get a foothold in...
How to Plan for Your Company’s Expansion
Mar. 5, 2019 | Posted by The Alternative Board Worldwide
Successful business growth doesn’t happen accidentally. While there are times when rapid expansion occurs due to unforeseen factors such as large-scale market changes or shifts in demographics, for...