{"id":6043,"date":"2018-12-11T09:45:39","date_gmt":"2018-12-11T15:45:39","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6043"},"modified":"2018-11-19T10:44:02","modified_gmt":"2018-11-19T16:44:02","slug":"7-cyber-security-tips-for-small-businesses","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/7-cyber-security-tips-for-small-businesses\/","title":{"rendered":"7 Cyber Security Tips for Small Businesses"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Protecting your data, and that of your clients, should be central to all of your business practices. Customers entrust companies with often very sensitive data, and it should be used and stored safely. Cyber security should be a priority in companies of any size, but when you\u2019re a small business without a big security budget, how do you keep yourself protected?<\/span><\/p>\n<h2><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>1 \u2013 Learn from Others\u2019 Mistakes<\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">When a large company experiences a cyber security breach, it doesn\u2019t take long for the media to expose it. Luckily for small businesses, that means there are <a href=\"https:\/\/www.wired.com\/story\/2018-worst-hacks-so-far\/\" rel=\"nofollow\" target=\"_blank\">a lot of public examples<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> to learn from. With each large-scale attack, we learn new ways to improve security, but hackers also invent new ways around it.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Each time you hear of a new cyber-attack, try to answer these questions:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0 \u00a0 \u00a0 1. What kind of data were they after?<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">\u00a0 \u00a0 \u00a0 2. How did they get it?<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">By understanding the answers to these questions, you will better understand which types of data are most vulnerable\u2014and therefore need the most protection\u2014and also how to avoid making the same mistakes that other businesses have.<\/span><\/p>\n<h2><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>2 \u2013 Restrict Websites<\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Limiting what your employees can look at on company computers can help to defend your network from any malware that lurks on unprotected websites. Some businesses go as far as implementing firewalls and actively <a href=\"https:\/\/www.spyzie.com\/parental-controls\/website-blocker.html\" rel=\"nofollow\" target=\"_blank\">blocking<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> certain sites, while others just use an honor system and trust that their employees will be sensible with their internet use.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"tab-stops: right 451.3pt;\"><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Whatever you choose, communication with your team is key. Either let them know which websites are trustworthy and therefore safe for them to browse in their downtime, or explain where firewalls exist and why. <\/span><\/p>\n<h2 style=\"tab-stops: right 451.3pt;\"><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>3 \u2013 Use Secure Websites<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14px; font-family: verdana, geneva, sans-serif;\">Hyper Text Transfer Protocol Secure (HTTPS) is the newer, more secure version of the protocol which transmits data between your web browser and the website you\u2019re currently on. Although it\u2019s mostly used for online banking and shopping, where sensitive financial data is processed, many larger companies are now using it as their default.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-size: 14px; font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/secure-https.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-6050 size-medium\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/secure-https-300x169.png\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/secure-https-300x169.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/secure-https.png 560w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Whenever possible, it is best practice to use these secure websites to house, view, and process your customer data. Any information entered into a website using HTTPS is encrypted and thus more difficult to hack. <\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">It\u2019s easy to recognize these kinds of websites by their URL, and most modern browsers usually indicate which protocol is being used with a padlock icon next to the website address.<\/span><\/p>\n<h2><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>4 \u2013 Know Which Software to Trust<\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">As with websites, you need to know that the software you\u2019re using is trustworthy. As a general rule, it is best to avoid sharing customer data with a third-party, but when you have to, ensure you pick the right software. There are plenty of online review sites that will help you find something that suits your business needs and won\u2019t compromise your cyber security.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">If you\u2019re having trouble finding something reliable and fit for purpose, consider building it in-house. Customers are more likely to give up their information to a company that will not share it and will therefore retain full control over it. You also have the added benefit of being the first to know when a security breach has taken place and be able to personally work on fixing it. <\/span><\/p>\n<h2><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>5 \u2013 Be Open and Honest<\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">When taking on a new client or signing on a new customer, be clear about how and why their data will be used. If you are using third-party software and will need to share their data with another company, tell them so. Being up-front lets your customers know where the vulnerabilities in the system lie and ultimately puts the risk-taking decision on them.<br>\n<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">People agree to these kinds of terms and conditions every day, so it\u2019s nothing scary or new to the consumer, but from time-to-time, you may get someone who declines them. Individuals are becoming more savvy about their data security and are taking a second look at the permissions they are giving to companies. As long as you can justify the terms of use and guarantee their data\u2019s security\u2014as far as is reasonably practicable\u2014this kind of transparency can help you further down the line if the worst is to occur.<\/span><\/p>\n<h2><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>6 \u2013 Carry Out Regular Maintenance<\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">Once you feel you have a good security structure in place, it\u2019s important that you keep an eye on it and make adjustments. It is possible that, as your business expands, it will outgrow its security system. Therefore, it is important that you employ an IT specialist who can regularly monitor and improve the system as needed.\u00a0<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/website-maintenance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6057 size-medium\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/website-maintenance-300x214.jpg\" alt=\"\" width=\"300\" height=\"214\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/website-maintenance-300x214.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/website-maintenance-768x548.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/11\/website-maintenance-1024x730.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">If you are running a skeleton staff or carry out most of the IT work yourself, it is worth taking a bit of time out at least weekly to make sure everything is running smoothly. Update passwords regularly and encourage your employees to create unique, complicated passwords that don\u2019t share a common pattern. <\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif; font-size: 14px;\">I.e. avoid passwords like \u201ccompanynameJohnDoe1\u201d. Ask that your customers do the same where applicable. Also clear out suspicious emails and update your spam filters to ensure that all irrelevant and potentially harmful mail is sent to junk. \u00a0<\/span><\/p>\n<h2><span style=\"font-size: 16px; font-family: verdana, geneva, sans-serif;\"><strong>7 \u2013 Don\u2019t Be Complacent<\/strong><\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><span style=\"font-size: 14px;\">Just because a business is relatively small doesn\u2019t mean it won\u2019t be a target. Think about anyone who has had an email address or Facebook account compromised. If it can happen to an individual, it can happen to a small business. It is not worth <a href=\"https:\/\/www.telehouse.net\/resources\/blog\/december-2017\/neglecting-your-data-management\" rel=\"nofollow\" target=\"_blank\">neglecting<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> your network security to save a bit of time or money.<\/span> <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting your data, and that of your clients, should be central to all of your business practices. Customers entrust companies with often very sensitive data, and it should be used and stored safely. Cyber security should be a priority in companies of any size, but when you\u2019re a small business without a big security budget, [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6061,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,42],"tags":[274,275,266,23,43,268,269,24,202,273,277,280,272,282,283,235,276,29,270,267,31,278,279,271,281],"class_list":["post-6043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-security","tag-block","tag-blocking","tag-cyber-security","tag-data","tag-data-breach","tag-data-security","tag-data-storage","tag-data-use","tag-encryption","tag-firewall","tag-https","tag-maintenance","tag-malware","tag-password","tag-password-protection","tag-protection","tag-safety","tag-security","tag-security-breach","tag-small-business","tag-software","tag-trust","tag-trustworthy","tag-website","tag-website-maintenance"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6043"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6043\/revisions"}],"predecessor-version":[{"id":6060,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6043\/revisions\/6060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6061"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}