SYS-CON MEDIA Authors: Pat Romanski, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Yeshim Deniz

Article

SMBs Beware: Beef up the Defense against Security Breaches

SMBs Beware: Beef up the Defense against Security Breaches

Security Breaches

When the United States government is the victim of a cyberattack, millions of people can be affected. The same is true for the large business that have been the victims of cyberattacks. These stories make the headlines and create a buzz about the importance of keeping data that is stored on computers safe. The government or business will talk about who was affected and what they are doing to help those that have had their information compromised. They will talk about how they will continue to work to improve their security in the future. They will also invest the money needed to take care of anyone that has been damaged and to upgrade their security systems.

It is great that the governments and big businesses have the resource to react this way. It is vital that they keep private information they have stored safe and secure.  But these are not the only businesses that are at risk. Small to medium sized businesses are also collecting and storing private information. If their systems are the target of a cyberattack, the results can be problematic for many people. A SMB may not think they have the resources that the big business has to protect their information, but that does not remove the responsibility that they have to do this. It is up to every business that collects private information about people to take all the steps they can to make sure that it is safe. That means learning the best and most cost effective ways to secure business data. There are two basic areas that a business needs to work on to protect themselves from a cyberattack. Those two areas are people and technology.

People

Many of the cyberattacks against businesses are the results of an employee of the business opening the door in some way. They may download a virus through an email or when they are surfing the internet. They may not use a secure password for access to their computer or they may not change it frequently. There are many ways that a cyberattack can happen as the result of an employee making a mistake.

The SMB needs to invest in the training of their employees when it comes to security. They need to make everyone aware of and committed to following the security procedures of the business when it comes to private information. The training is something that should be ongoing. It needs to be for both new employees of a business and for established employees. The constant reinforcement is a good way to help people to remember the importance of security and can help prevent many of the cyberattacks.

Technology

If the door to a cyberattack is closed through vigilant employees, there is still the possibility of an attack through the vulnerability of the technology that a business uses. No matter how good the employees are, if they do not have the right tools to protect the information, they could be victimized. There are many different technologies that SMBs should have in place.

  • Antivirus Software - Antiviruses like Immunet and AVG should always be in place. Many cyberattacks are the result of viruses that infect the computer systems. With this type of software in place, the chance of a virus is diminished. The software not only needs to be in place, it should always be on and up to date. That will give a business the protection they need at all times.
    Watch out for Laptops and Mobile Devices - SMBs may rely on these technologies to compete, but they are also the most vulnerable. They can be lost or stolen or simply fall into the right hands. All information on these devices should use encryption software to protect it.
    Monitoring Software - A SMB should be able to monitor how their employees are using the technology and to make sure that employees are using the proper security methods that are in place. It is the responsibility of the business to make sure that the employees are always doing the right thing and monitoring software is one way to accomplish that.
    Secure Backup - despite the best efforts of a SMB, a cyberattack can still occur. If the attack manages to wipe out information a SMB that has a secure backup can retrieve whatever was lost.

Cybercriminals are no different than any other criminal. They are looking for the easiest targets that they can find. If a SMB puts up a good defense, the cyber attackers will go out looking for a business that is not being vigilant. The best way to prevent a cyberattack is not to become a target and taking a few steps is something that every business could and should do.

 

More Stories By Peter Davidson

Being a senior business associate, Peter Davidson strives to help different brands and start ups to make efficient business decisions and plan effective business strategies. With years of rich domain expertise, he loves to share his views on the latest technologies and applications through his well researched content pieces. Follow him on Google+ and Twitter.

Latest Stories
Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. It even comes with Prometheus to store the metrics for you and pre-built Grafana dashboards to show exactly what is important for your services - success rate, latency, and throughput. In this session, we'll explain what Linkerd provides for you, demo the installation of Linkerd on Kubernetes and debug a real world problem. We will also dig into what functionality you can build on ...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions. New research shows that delivering on multicloud e...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Take advantage of autoscaling, and high availability for Kubernetes with no worry about infrastructure. Be the Rockstar and avoid all the hurdles of deploying Kubernetes. So Why not take Heat and automate the setup of your Kubernetes cluster? Why not give project owners a Heat Stack to deploy Kubernetes whenever they want to? Hoping to share how anyone can use Heat to deploy Kubernetes on OpenStack and customize to their liking. This is a tried and true method that I've used on my OpenSta...
DevOps is a world surrounded by information, starting from a single commit and ending in roll out to production. In this talk, I'll introduce you to the world of Taboola DevOps data collection, to better understand what goes on under the hood. The system we've developed in-house helps us collect and analyse the entire DevOps process from the very first commit all the way to production. It provides us a full clear view with a drill-down toolset that helps keep us away from the dark side. ...
We at Capgemini have developed a cloud-native PaaS Solution called "Apollo". Apollo is built on top of following open source components. - Apache Mesos for cluster management, scheduling & resource isolation - Marathon or Kubernetes for Container orchestration - Docker for application container runtime, - Consul for service discovery via DNS - Weave for networking of Docker Containers - Traefik for application container load balancing
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
With digital video content creation going viral and assuming the bulk of Internet traffic, how can the deluge of video content be analyzed effectively to derive insights and ROI? After all, video is not only huge in size, but it is complex given various visual, audio and temporal elements. Video summarization (a mechanism for generating a short video summary via key frame analysis or video skimming) has become a popular research topic industry-wide and across academia. Video thumbnail generation...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio a...
Containerized software is riding a wave of growth, according to latest RightScale survey. At Sematext we see this growth trend via our Docker monitoring adoption and via Sematext Docker Agent popularity on Docker Hub, where it crossed 1M+ pulls line. This rapid rise of containers now makes Docker the top DevOps tool among those included in RightScale survey. Overall Docker adoption surged to 35 percent, while Kubernetes adoption doubled, going from 7% in 2016 to 14% percent.
Technology has changed tremendously in the last 20 years. From onion architectures to APIs to microservices to cloud and containers, the technology artifacts shipped by teams has changed. And that's not all - roles have changed too. Functional silos have been replaced by cross-functional teams, the skill sets people need to have has been redefined and the tools and approaches for how software is developed and delivered has transformed. When we move from highly defined rigid roles and systems to ...
Even if your IT and support staff are well versed in agility and cloud technologies, it can be an uphill battle to establish a DevOps style culture - one where continuous improvement of both products and service delivery is expected and respected and all departments work together throughout a client or service engagement. As a service-oriented provider of cloud and data center technology, Green House Data sought to create more of a culture of innovation and continuous improvement, from our helpd...