SYS-CON MEDIA Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, William Schmarzo, Yeshim Deniz

Article

SMBs Beware: Beef up the Defense against Security Breaches

SMBs Beware: Beef up the Defense against Security Breaches

Security Breaches

When the United States government is the victim of a cyberattack, millions of people can be affected. The same is true for the large business that have been the victims of cyberattacks. These stories make the headlines and create a buzz about the importance of keeping data that is stored on computers safe. The government or business will talk about who was affected and what they are doing to help those that have had their information compromised. They will talk about how they will continue to work to improve their security in the future. They will also invest the money needed to take care of anyone that has been damaged and to upgrade their security systems.

It is great that the governments and big businesses have the resource to react this way. It is vital that they keep private information they have stored safe and secure.  But these are not the only businesses that are at risk. Small to medium sized businesses are also collecting and storing private information. If their systems are the target of a cyberattack, the results can be problematic for many people. A SMB may not think they have the resources that the big business has to protect their information, but that does not remove the responsibility that they have to do this. It is up to every business that collects private information about people to take all the steps they can to make sure that it is safe. That means learning the best and most cost effective ways to secure business data. There are two basic areas that a business needs to work on to protect themselves from a cyberattack. Those two areas are people and technology.

People

Many of the cyberattacks against businesses are the results of an employee of the business opening the door in some way. They may download a virus through an email or when they are surfing the internet. They may not use a secure password for access to their computer or they may not change it frequently. There are many ways that a cyberattack can happen as the result of an employee making a mistake.

The SMB needs to invest in the training of their employees when it comes to security. They need to make everyone aware of and committed to following the security procedures of the business when it comes to private information. The training is something that should be ongoing. It needs to be for both new employees of a business and for established employees. The constant reinforcement is a good way to help people to remember the importance of security and can help prevent many of the cyberattacks.

Technology

If the door to a cyberattack is closed through vigilant employees, there is still the possibility of an attack through the vulnerability of the technology that a business uses. No matter how good the employees are, if they do not have the right tools to protect the information, they could be victimized. There are many different technologies that SMBs should have in place.

  • Antivirus Software - Antiviruses like Immunet and AVG should always be in place. Many cyberattacks are the result of viruses that infect the computer systems. With this type of software in place, the chance of a virus is diminished. The software not only needs to be in place, it should always be on and up to date. That will give a business the protection they need at all times.
    Watch out for Laptops and Mobile Devices - SMBs may rely on these technologies to compete, but they are also the most vulnerable. They can be lost or stolen or simply fall into the right hands. All information on these devices should use encryption software to protect it.
    Monitoring Software - A SMB should be able to monitor how their employees are using the technology and to make sure that employees are using the proper security methods that are in place. It is the responsibility of the business to make sure that the employees are always doing the right thing and monitoring software is one way to accomplish that.
    Secure Backup - despite the best efforts of a SMB, a cyberattack can still occur. If the attack manages to wipe out information a SMB that has a secure backup can retrieve whatever was lost.

Cybercriminals are no different than any other criminal. They are looking for the easiest targets that they can find. If a SMB puts up a good defense, the cyber attackers will go out looking for a business that is not being vigilant. The best way to prevent a cyberattack is not to become a target and taking a few steps is something that every business could and should do.

 

More Stories By Peter Davidson

Being a senior business associate, Peter Davidson strives to help different brands and start ups to make efficient business decisions and plan effective business strategies. With years of rich domain expertise, he loves to share his views on the latest technologies and applications through his well researched content pieces. Follow him on Google+ and Twitter.

Latest Stories
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, discussed the best practices that will ensure a successful smart city journey.
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, highlighted the current challenges of these transformative technologies and shared strategies for preparing your organization for these changes. This “view from the top” outlined the latest trends and developments i...