Cybersafety Connections November 2021 Vol #42  

Microsoft 365 Stock Images

Still on Small Business Cybersecurity  

We cannot stress how important cybersecurity is to businesses of all sizes including small businesses since they are not exempt from cyberattacks. Since they are not ex  

Small Business Cybersecurity  

That is right small businesses need a cybersecurity strategy to protect their business, customers, and data from cyberattacks/breaches.  

Federal Communications Commission’s ( FCC) 10 Tips  

1. Train employees in security principles  

Put in place basic cybersecurity practices and policies for employees like strong passwords, guidelines for internet usage, and penalties for violating company cybersecurity policies. Also, have rules for how to handle and protect customer data and other important data.  

2. Protect information, computers, and networks from cyber attacks  

The best defense against viruses, malware, and other online threat is to have the most up-to-date security software, web browser, and operating system. For best practice have the antivirus software set to run a scan after each update. Make sure key software updates are installed as soon as they are available.  

3. Provide firewall security for your Internet connection  

Firewalls are programs that prevent external parties from having access to a private network. Ensure the operating system’s firewall is enabled or install free firewall software available online. For remote employees, verify that their access devices have firewall protection.  

4. Create a mobile device action plan  

Mobile devices have their own security and management challenges especially if mobile devices house confidential company information or are used to access the corporate network. Some safeguards would be requiring users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information when using public networks. Have a procedure in place to report lost or stolen devices.  

5. Make backup copies of important business data and information  

Back up critical data on a regular basis and it is much better if the backup is done automatically. Copies of the backup can be stored offsite and in the cloud.  

6. Control physical access to your computers and create user accounts for each employee  

Put in place controls to prevent unauthorized individuals from accessing business computers. Be on the lookout for laptops that are an easy target for theft or can be lost and lock laptops when not in use. Each employee should have their own user account with a strong password and only trusted IT staff and key personnel should be given administrative privileges.   

7. Secure your Wi-Fi networks  

 Wi-Fi network for your workplace if in use should be secure, encrypted, and hidden. Hiding your Wi-Fi network involves setting up your wireless access point or router in such a way that it does not show the network name. This is known as the Service Set Identifier (SSID). To access the router, a password would be required. 

8. Employ best practices on payment cards  

Partner with banks or payment processors to be sure the most trusted and validated tools and anti-fraud services are in use. In accordance with your agreement with the bank or payment processor, you may have additional security obligations. You are encouraged to Isolate payment systems from other, less secure programs and not to use the same computer to process payments and browse the Internet.  

9. Limit employee access to data and information, limit authority to install software  

Give employees access to only the data and system they need to perform their jobs. Employees should not be able to install any software without permission.  

10. Passwords and authentication  

As already stated in number 1 on Train employees on security principles, 6. Control physical access and 10. Passwords and authentication, require employees to use unique passwords and change passwords every three months. Think about putting in place multi-factor authentication in addition to a password to gain entry.  

In conclusion I would like to add use VPN –Virtual Private Network to protect your internet traffic and keep your identities private online. 

Subscribe to get the latest post.