{"id":6802,"date":"2019-12-17T10:07:06","date_gmt":"2019-12-17T16:07:06","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6802"},"modified":"2019-12-04T16:08:07","modified_gmt":"2019-12-04T22:08:07","slug":"building-business-with-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/building-business-with-cybersecurity\/","title":{"rendered":"Building Business with Cybersecurity"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/12\/secure-office.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6803 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/12\/secure-office.jpg\" alt=\"\" width=\"300\" height=\"199\"><\/a>Cybersecurity is a hot topic. With high profile breaches making headlines on almost a monthly basis, combined with a far more restrictive regulatory environment, the need to responsibly protect your customers\u2019 data has never been felt more keenly.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It is estimated that a business is subjected to a ransomware attack every <a href=\"https:\/\/www.infotech.co.uk\/blog\/35-cyber-security-stats-to-make-you-serious-about-data-protection\" rel=\"nofollow\" target=\"_blank\">14 seconds<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, predicted to drop to eleven seconds by 2021. The fallout from cybercrime will cost the world more than six trillion dollars a year, and the average cost to a business of a successful cybercrime attack has increased by 71 percent since 2017.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Prioritising cybersecurity boosts business. 71 percent of customers have stated they would cease doing business with a company that suffered a breach. Not surprising when a single breach in 2019 lead to the exposure of 1.16 billion email addresses and passwords.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With small businesses making up 43 percent of cybercrime attacks, they have the most to lose at a time when they need to be focussed on growth. How then can you help build your business by putting cybersecurity at the fore?<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">#1 Training<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">This may sound like a no-brainer, but you may be surprised to learn that only 20 per cent of UK businesses have staff take part in cybersecurity training. They are your first line of defence against cybersecurity threats and are also the ones most likely to unwittingly help facilitate a breach. 78 per cent of employees are aware of the risks of suspicious email links but still click on them.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Thankfully, as a small business, you are unlikely to have a massive workforce, so arranging regular training shouldn\u2019t be too much of a challenge. But arrange it you should. Security risks are reduced by 70 per cent when organisations invest in cybersecurity training.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Important topics to cover include how to create a strong password (an alarming number of people still use phrases such as \u201c123456\u201d and \u201cpassword\u201d to login), the dangers of clicking on links contained within emails, how to identify phishing attempts, the risks associated with public WiFi. Training should be supported with regular updates informing staff of the latest threats and protocols.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">#2 Establish Policy<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Even for a small business, it\u2019s a great idea to have an official cybersecurity policy. A formal document distributed to all existing staff members and used during the onboarding process will help to make sure all employees are on the same page when it comes to what you expect from them. The policy should include points such as:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">Appropriate use of work email and internet use<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">Use of work issued mobile devices and personal devices at work<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">Remote access policy<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">The use of portable media such as USB storage devices<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">The company and staff\u2019s responsibility regarding sensitive data<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">Reporting procedures in the event of an issue or breach<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">You may think as a small business you don\u2019t need a formal written down policy, however by doing so, you and your people will know exactly what to do with no scope for misunderstanding or assumption.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">#3 Access Limitation<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It\u2019s not only external forces which pose a threat to your business, with many breaches being facilitated by internal agents. Blackmail or malicious intent can potentially both lead one of your own staff to help criminals access your data.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The best way to protect against this is to make sure access to hardware and software is limited to only those staff members who need it to perform their role. While it may be tempting to give blanket access in the name of convenience, it\u2019s simply not necessary or wise to do so.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">By keeping the list of people with access to sensitive systems small, you reduce the chances of bad actors being able to complete their mission and, should something untoward occur, the number of employees under suspicion will be thankfully diminished.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">#4 Backup<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">If a cyberattack or other IT related issue results in the loss of data, the consequences for your business can be devastating. The recovery of such data \u2013 if recovery is even possible \u2013 can take weeks and cost your brands thousands in lost productivity and revenue.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Backing up all your data regularly won\u2019t undo the damage a cybersecurity breach does to your business or reputation. However, it will enable your company to recover from the breach far more quickly by allowing your IT systems to return to a pre-breach state in far less time.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Including backup procedures and schedules could be another point to include in your official cybersecurity policy.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Final Thoughts<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">There are four great tips for how to apply cybersecurity to your small business. With your defences shored up, the chances of your upward trajectory being disrupted by a cybersecurity breach will be significantly reduced \u2013 keeping your business growing into the successful and profitable brand you want it to be.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a hot topic. With high profile breaches making headlines on almost a monthly basis, combined with a far more restrictive regulatory environment, the need to responsibly protect your customers\u2019 data has never been felt more keenly. \u00a0 It is estimated that a business is subjected to a ransomware attack every 14 seconds, predicted [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":6803,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-6802","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6802"}],"version-history":[{"count":2,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6802\/revisions"}],"predecessor-version":[{"id":6805,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6802\/revisions\/6805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6803"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}