{"id":2482,"date":"2014-07-16T08:20:03","date_gmt":"2014-07-16T13:20:03","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2482"},"modified":"2015-04-24T16:03:57","modified_gmt":"2015-04-24T21:03:57","slug":"do-you-need-to-tighten-up-your-business-security","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/do-you-need-to-tighten-up-your-business-security\/","title":{"rendered":"Do You Need to Tighten Up Your Business Security?"},"content":{"rendered":"<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2494 size-full\" title=\"Business Security Online\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/business-security-online.jpg\" alt=\"Business Security Online\" width=\"240\" height=\"160\">The online world is one that has its dangers, so it\u2019s a good idea to consider your business and its <a title=\"Why Is Network Security Important?\" href=\"\/blog\/why-is-network-security-important\/\">security on the internet<\/a>. For every contemporary business the ability to safely email, work remotely, and run its website is crucial to its day-to-day workings. The rules to keeping your business safe are often just common sense and they\u2019re also effectively the same as the rules you employ on your own personal computer.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">But with so many people working and using a given business\u2019 infrastructure, the threat of data loss or attack increases. It all depends on your business and the services that it\u2019s offering but there are some general rules to keep in mind. Good practices and prevention are very important and are much more easily implemented than costly attempts to patch them up after the fact.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Let\u2019s consider some good online practices and some easy to implement solutions to keep your business safe and secure.<\/span><\/p>\n<h2><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Staysafeonline.org and its helpful infographic<\/b><\/span><\/h2>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2495\" title=\"Tightening Up Business Security Online\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/tightening-up-online-business-security-300x242.jpg\" alt=\"Tightening Up Business Security Online\" width=\"192\" height=\"155\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/tightening-up-online-business-security-300x242.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/tightening-up-online-business-security.jpg 1000w\" sizes=\"auto, (max-width: 192px) 100vw, 192px\">For some useful and general advice, <a href=\"http:\/\/www.staysafeonline.org\/download\/datasets\/4629\/ncsa_small_business_infographic_final.pdf\" rel=\"nofollow\" target=\"_blank\">check out this infographic<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> (PDF); it contains relevant information for security conscious organizations. Let\u2019s consider it in some more detail.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Currently small business form the backbone of the US economy and half of all Americans that are employed are working for a small business. Between 1993 and 2009, 65% of all new businesses were small firms and they created 15 million (net) new jobs. For those small business the internet is a critical resource.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">73% of small businesses report that a safe and trusted internet is crucial to its success and 87% currently have one or more employee who uses the internet for daily tasks. This presents a clear need for consistent and clear internet practices and online safety will only become more and more necessary.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The internet is so important to small businesses that 55% said that the loss of an internet connection for 48 hours would have a negative impact on its infrastructure. A further 38% felt that 48 hours without the internet would be extremely disruptive.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The loss of the internet even for two days would have drastic consequences so businesses must safeguard its online infrastructure. Currently though, the majority of US small businesses feel satisfied with its online safety measures. However, this flies somewhat in the face of many studies, some of which have found that many businesses fail to implement even the most <a title=\"Basic Security Measures\" href=\"http:\/\/security.onestopclick.com\/technology_news\/report-highlights-business-security-failings_605.htm\" target=\"_blank\" rel=\"nofollow\">basic security measures<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> such as antivirus software.<\/span><\/p>\n<h2><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Here are some statistics:<\/b><\/span><\/h2>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2496 size-full\" title=\"Rising Percentages of Online Crimes\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/higher-percentages-of-online-crime.jpg\" alt=\"Rising Percentages of Online Crimes\" width=\"294\" height=\"277\">\u00b7 77% feel that their company is safe from cyber threats like <a title=\"Keeping cybercrime out \u2013 tips on network security\" href=\"\/blog\/keeping-cybercrime-out-tips-on-network-security\/\">hackers, viruses, malware<\/a> or a cyber-security breach.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">\u00b7 66% stated that they\u2019re not concerned about cyber threats like hackers or <a title=\"How Monitoring Software can Help to Protect Against CryptoLocker\" href=\"\/blog\/monitoring-software-can-help-to-protect-against-cryptolocker\/\">cyber-criminals<\/a> and they also feel that internal threats are over sold.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">\u00b7 47% believe that a data breach would have no impact on the business and that if there were any such breach it would be considered an isolated incident.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">\u00b7 Disturbingly, 18% felt that they wouldn\u2019t even know if their computer network was compromised.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The most important thing to take away from those statistics is the fact that most small businesses are completely under-prepared (and uneducated) when it comes to cyber-security. According to research conducted by Symantec, cyber-attacks are most likely to be aimed at small companies.<\/span><\/p>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The most worrying statistic in the infographic is the fact that 60% of small businesses will close within six months of a cyberattack. At the end of 2011 only 18% of attacks were aimed at small companies, the number has since doubled and now stands at 36%.<\/span><\/p>\n<h2><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Let\u2019s consider some more statistics then:<\/b><\/span><\/h2>\n<ul>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">87% of small businesses don\u2019t have a formal written internet security policy for its employees.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">69% don\u2019t even have an informal security policy.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">59% of small business don\u2019t have a contingency plan outlining procedures for responding to and reporting any data breach related loses.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">75% have no policy in place for social media usage by staff while on the job, only 23% have established policies.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">60% don\u2019t even have a privacy policy that employees must comply with when they handle customer or employee information.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">So, it seems clear that businesses are not prepared or even educated about the dangers online. There are however a number of things that a business can do. Let\u2019s consider them now.<\/span><\/p>\n<ul>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Keep a clean machine<\/b>. Every computer in your work place needs to be protected from malware, viruses and infections.<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Protect sensitive information<\/b>. <a title=\"How to Create and Manage Stronger Passwords\" href=\"\/blog\/the-dos-and-donts-of-managing-your-password\/\">All passwords<\/a> used in the enterprise <i>must<\/i> be secure and impervious to malicious attack.<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Safeguard your online reputation<\/b>. Carefully set security and privacy levels to reflect the <a title=\"What is People-Centric IT?\" href=\"\/blog\/what-is-people-centric-it\/\">level of protection<\/a> that you desire in your company infrastructures.<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Education.<\/b> Teach your employees how to be safe and secure online and inform them of online best practices. Make sure that they understand that any email, social media post or direct message, or even a text message that looks suspicious needs to be left unopened and deleted.<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><b>Consider managed services.<\/b> If you\u2019re not sure where to start with security then consider using a <a title=\"Managed Security Service\" href=\"http:\/\/blogs.gartner.com\/it-glossary\/mssp-managed-security-service-provider\/\" target=\"_blank\" rel=\"nofollow\">managed security service<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The online world has its perils and dangers and your business must do everything within its power to negate those malicious influences. Good online practices and careful education of staff members is the best form of prevention.<\/span><\/p>\n<p><a title=\"\" href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20Do%20You%20Need%20to%20Tighten%20Up%20Your%20Business%20Security?%20\/blog\/do-you-need-to-tighten-up-your-business-security\/?ref=blog\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1028\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" alt=\"Tweet this\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><a title=\"\" href=\"https:\/\/plus.google.com\/share?url={\/blog\/do-you-need-to-tighten-up-your-business-security\/?ref=blog}\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1053\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" alt=\"Share on Google+\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><br>\nPhoto Credit: <a href=\"https:\/\/www.flickr.com\/photos\/113459986@N06\/14015069428\/\" rel=\"nofollow\" target=\"_blank\">bill.sarris<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> via <a href=\"http:\/\/compfight.com\" rel=\"nofollow\" target=\"_blank\">Compfight<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <a href=\"https:\/\/www.flickr.com\/help\/general\/#147\">cc<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The online world is one that has its dangers, so it\u2019s a good idea to consider your business and its security on the internet. For every contemporary business the ability to safely email, work remotely, and run its website is crucial to its day-to-day workings. The rules to keeping your business safe are often just [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6,8],"tags":[],"class_list":["post-2482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2482"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2482\/revisions"}],"predecessor-version":[{"id":3479,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2482\/revisions\/3479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2494"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}