<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=349935452247528&amp;ev=PageView&amp;noscript=1">
Find out where you can get a Taste of TAB... our global events blast is on!
Search
word-map-thumb

The Alternative Board Blog

Wake up and Look at Your IT Security Before it’s Too Late!

Sep. 7, 2022 | Posted by Phil Spensieri

 

We’ve all read with shock and horror about large cyber-attacks such as the breaches at Target, Netflix, and financial institutions including JP Morgan, but what if I told you that the most frequent threats have been to small and medium-sized businesses?

In fact, more and more small businesses are being targeted because many have valuable data that can be held for ransom or sold to others, yet they don’t typically think they will be targeted so they don’t have rigorous security protections in place.

Many small business owners think it won’t happen to them, but according to Inc. Magazine, “75% of SMBs would have to shut down if forced to pay cybercriminals to gain access to their data or software in a ransomware attack. The cost of this type of breach is more than just monetary; it also causes an intense disruption to a company’s operations.”

If you haven’t looked into your IT security yet, I encourage you to do so before it is too late and you are in data recovery mode. Making even small changes now will help not only protect your business, but also help save your business enormous amounts of time, money and hassle.

 

Designate an IT leader

Your first step, no matter the size of your business, is to hire someone to be in charge of managing your IT. I highly recommend using a third-party security service provider. When you use a third-party expert, they will assess your current IT structure and recommend the appropriate changes as well as train your employees. They will also perform regular risk assessments, develop constant monitoring and incident response strategies, review network alerts and performance and flag suspicious activity. A third-party provider may also:

 

  • Train employees to spot suspicious emails
    • You’ll need to educate yourself and all of your employees about common security threats. They need to understand the difference between legitimate and fraudulent emails. A few good examples of email hacking include clicking on an attachment in an email you think is from a vendor, but is actually a phishing scam. An employee choosing a weak password for a new account that gets hacked, or your IT team installing malware software on all of your company’s computers, but forgets to set automatic security updates on just one, can leave your business vulnerable.

 

  • Use alternative email accounts
    • Most of your employees will have a personal email account or they can create a gmail account for business purposes. You can greatly reduce the risk of your company email accounts getting onto spoofed email lists by having your staff use alternative email addresses when registering for activities online.

 

  • Create strong email passwords
    • Gone are the days of simple passwords or using the same password for every one of your business accounts. I can’t emphasize enough how important it is to create strong, unique passwords. I have found that using a password manager provides strong encryption and serves as a strong defense against cybercriminals. It will securely store all logins for each employee and regularly prompts you to update passwords. If you have an IT partner, they will be able to set this up for you.

 

  • Keep malware software up to date
    • This seems like a simple business rule, but many of my clients feel they just don’t have the time to install malware protection software on all company devices. A third-party provider will strongly suggest that you make this more of a priority and configure it to install patches and updates automatically. It is crucial that you run the latest version of malware software so you aren’t vulnerable to security problems.

 

Cyberattacks are here and they are going after your small business! Regardless of size, every business needs to stay proactive and vigilant against cyberattacks. Take the time now to invest in simple protective measures to prevent great harm to your business in the future.

Want additional insight? Read 9 Steps to Safeguard Your Business to learn more

DOWNLOAD

Read our 19 Reasons You Need a Business Owner Advisory Board

DOWNLOAD

Written by Phil Spensieri

Phil Spensieri is a TAB Facilitator in the York Region of Ontario, Canada. To find a TAB Board in your area, visit https://www.thealternativeboard.com/facilitators-world-map

Related posts

Top 3 Strategic Musts for the Coming Year
Jan. 11, 2024 | Posted by The Alternative Board
The first quarter of the year always seems to have business owners dreaming a little bigger, reaching a little higher, and planning innovative ways to improve their organizations in the ensuing...
Peer Coaching Groups for Company Success & Employee Well-Being
Aug. 18, 2023 | Posted by Dave Scarola
Do you incorporate peer coaching and peer learning into your company? Should you? This article will explain what Peer Coaching Groups are and how they can positively impact organizations and...
Ay Yi Yi: The Fascinating World of AI
Jul. 12, 2023 | Posted by The Alternative Board
Artificial intelligence. What once felt wildly futuristic has suddenly become mainstream and is growing more ubiquitous by the minute. You are likely already interacting with AI, even if you are not...
5 Tips for Building a Long-Term Sales Strategy
Jun. 21, 2023 | Posted by Lee Polevoi
Any hard-working salesperson can tell you closing a sale is their ultimate goal. Short-term sale strategies emphasize the value of a clean, efficient transaction with a customer, particularly...
Watch Out for Blind Spots in Sales
Jun. 7, 2023 | Posted by Lee Polevoi
Let’s assume your company employs one or more salespeople who are responsible for generating leads and closing deals. As talented as these sales professionals might be, some “blind spots” in sales...
What Technology Strategy is Most Effective for Your Remote Team?
May. 31, 2023 | Posted by Lee Polevoi
If, like many businesses these days, you employ a cadre of remote workers, it’s imperative to do all you can to support their offsite efforts. That means providing the best technology available so...
How Employee Learning and Development Can Boost Retention
May. 17, 2023 | Posted by Lee Polevoi
The ideal employee is an individual who works hard, acts on their own initiative, seeks to be a high-quality team player, and wishes to grow in their career. If you have employees who fit this...
How to Tackle Skills Gaps in the Workplace
May. 3, 2023 | Posted by Lee Polevoi
Finding the right candidates for your open positions is hard enough, given current labor conditions. The challenge becomes more pressing when you hire a talented individual, only to find out they...
Workplace Collaboration: A Secret to Success
Apr. 26, 2023 | Posted by The Alternative Board
Collaboration. It seems like such an easy concept to grasp and embrace, particularly as it pertains to the teamwork required to run and grow a successful company. But then why do so many so many...
How Leaders Can Boost Employee Engagement and Productivity
Apr. 19, 2023 | Posted by Lee Polevoi
These days, business leaders are more focused than ever on finding ways to promote employee engagement and productivity. Although circumstances differ from one business to another, certain key...