SYS-CON MEDIA Authors: Yeshim Deniz, Carmen Gonzalez, Liz McMillan, Elizabeth White, Pat Romanski

Article

SMBs Beware: Beef up the Defense against Security Breaches

SMBs Beware: Beef up the Defense against Security Breaches

Security Breaches

When the United States government is the victim of a cyberattack, millions of people can be affected. The same is true for the large business that have been the victims of cyberattacks. These stories make the headlines and create a buzz about the importance of keeping data that is stored on computers safe. The government or business will talk about who was affected and what they are doing to help those that have had their information compromised. They will talk about how they will continue to work to improve their security in the future. They will also invest the money needed to take care of anyone that has been damaged and to upgrade their security systems.

It is great that the governments and big businesses have the resource to react this way. It is vital that they keep private information they have stored safe and secure.  But these are not the only businesses that are at risk. Small to medium sized businesses are also collecting and storing private information. If their systems are the target of a cyberattack, the results can be problematic for many people. A SMB may not think they have the resources that the big business has to protect their information, but that does not remove the responsibility that they have to do this. It is up to every business that collects private information about people to take all the steps they can to make sure that it is safe. That means learning the best and most cost effective ways to secure business data. There are two basic areas that a business needs to work on to protect themselves from a cyberattack. Those two areas are people and technology.

People

Many of the cyberattacks against businesses are the results of an employee of the business opening the door in some way. They may download a virus through an email or when they are surfing the internet. They may not use a secure password for access to their computer or they may not change it frequently. There are many ways that a cyberattack can happen as the result of an employee making a mistake.

The SMB needs to invest in the training of their employees when it comes to security. They need to make everyone aware of and committed to following the security procedures of the business when it comes to private information. The training is something that should be ongoing. It needs to be for both new employees of a business and for established employees. The constant reinforcement is a good way to help people to remember the importance of security and can help prevent many of the cyberattacks.

Technology

If the door to a cyberattack is closed through vigilant employees, there is still the possibility of an attack through the vulnerability of the technology that a business uses. No matter how good the employees are, if they do not have the right tools to protect the information, they could be victimized. There are many different technologies that SMBs should have in place.

  • Antivirus Software - Antiviruses like Immunet and AVG should always be in place. Many cyberattacks are the result of viruses that infect the computer systems. With this type of software in place, the chance of a virus is diminished. The software not only needs to be in place, it should always be on and up to date. That will give a business the protection they need at all times.
    Watch out for Laptops and Mobile Devices - SMBs may rely on these technologies to compete, but they are also the most vulnerable. They can be lost or stolen or simply fall into the right hands. All information on these devices should use encryption software to protect it.
    Monitoring Software - A SMB should be able to monitor how their employees are using the technology and to make sure that employees are using the proper security methods that are in place. It is the responsibility of the business to make sure that the employees are always doing the right thing and monitoring software is one way to accomplish that.
    Secure Backup - despite the best efforts of a SMB, a cyberattack can still occur. If the attack manages to wipe out information a SMB that has a secure backup can retrieve whatever was lost.

Cybercriminals are no different than any other criminal. They are looking for the easiest targets that they can find. If a SMB puts up a good defense, the cyber attackers will go out looking for a business that is not being vigilant. The best way to prevent a cyberattack is not to become a target and taking a few steps is something that every business could and should do.

 

More Stories By Peter Davidson

Being a senior business associate, Peter Davidson strives to help different brands and start ups to make efficient business decisions and plan effective business strategies. With years of rich domain expertise, he loves to share his views on the latest technologies and applications through his well researched content pieces. Follow him on Google+ and Twitter.

Latest Stories
92% of enterprises are using the public cloud today. As a result, simply being in the cloud is no longer enough to remain competitive. The benefit of reduced costs has normalized while the market forces are demanding more innovation at faster release cycles. Enter Cloud Native! Cloud Native enables a microservices driven architecture. The shift from monolithic to microservices yields a lot of benefits - but if not done right - can quickly outweigh the benefits. The effort required in monitoring,...
Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expensive intermediate processes from their businesses. Accordingly, attendees at the upcoming 23rd CloudEXPO, June 24-26, 2019 at Santa Clara Convention Center in Santa Clara, CA will find fresh new content in full new FinTech & Enterprise Blockchain track.
As the digitization of business accelerates the move of critical applications and content to the cloud, the network has never been as critical to business success. Consuming everything ‘as-a-service' requires new levels of network automation, agility and security. Discover how Enterprises can take advantage of Digital Platforms, directly connecting to an extensive ecosystem of digital partners and flex their service at the click of a button.
Blockchain has shifted from hype to reality across many industries including Financial Services, Supply Chain, Retail, Healthcare and Government. While traditional tech and crypto organizations are generally male dominated, women have embraced blockchain technology from its inception. This is no more evident than at companies where women occupy many of the blockchain roles and leadership positions. Join this panel to hear three women in blockchain share their experience and their POV on the futu...
Cloud Storage 2.0 has brought many innovations, including the availability of cloud storage services that are less expensive and much faster than previous generations of cloud storage. Cloud Storage 2.0 has also delivered new and faster methods for migrating your premises storage environment to the cloud and the concept of multi-cloud. This session will provide technical details on Cloud Storage 2.0 and the methods used to efficiently migrate from premises-to-cloud storage. This session will als...
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
In very short order, the term "Blockchain" has lost an incredible amount of meaning. With too many jumping on the bandwagon, the market is inundated with projects and use cases that miss the real potential of the technology. We have to begin removing Blockchain from the conversation and ground ourselves in the motivating principles of the technology itself; whether it is consumer privacy, data ownership, trust or even participation in the global economy, the world is faced with serious problems ...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...
For enterprises to maintain business competitiveness in the digital economy, IT modernization is required. And cloud, with its on-demand, elastic and scalable principles has resoundingly been identified as the infrastructure model capable of supporting fast-changing business requirements that enterprises are challenged with, as a result of our increasingly connected world. In fact, Gartner states that by 2022, 28% of enterprise IT spending will have shifted to cloud. But enterprises still must d...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizations that start with a cohesive, well-planned migration strategy can avoid common mistakes and stay a step ahead of the competition. Learn from Atmosera CEO, Jon Thomsen about the opportunities and challenges found in three pivotal phases of the journey to the cloud: Evaluation and Architecting, Migration and Management, and Optimization & Innovation. In each phase, there are distinct insights tha...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...