Loren Baker

5 Data Security Tips Small Businesses Should Mimic

Data Security Tips

As more and more companies begin to switch to the cloud, cyber attacks need to be a top priority for business owners of all sizes and within all industries. But small businesses in particular face a greater threat.

Almost half (43%) of cyber attacks target smaller businesses. Even worse, more than half (60%) of smaller businesses that are victims of cyber attacks go out of business within six months. Additionally, infosec experts recently stated that U.S. companies are not doing enough to secure their data.

Fortunately, your small business doesn’t need a huge budget or endless resources to thwart potential cyber attacks if you copy the following five tactics that enterprise-level businesses use to protect their sensitive data.

Data Security Tips

1. Educate yourself and your team on security threats.

Want to know what the biggest threat within your small business is? It’s the people within your organization.

While there are some instances of disgruntled employees sabotaging your business, most cases involve human error, like:

  • Creating weak passwords or sharing login information with others.
  • Leaving a work device unattended in public.
  • Allowing employees to bring their own mobile devices to work. These devices may put your network in jeopardy because they could be infected or don’t have the proper anti-virus software installed.
  • Phishing scams where an employee knowingly clicks on a link via email or text, opens a document or downloads a file that contains malware.
  • Accidentally emailing sensitive data to the wrong recipient.

The first step you need to take is to foster a culture that requires you to assign an owner, set the tone, create an organizational structure that drives it, hold offsite trainings, prioritize and focus, and communicate. Building a great company culture will encourage responsibility and help you establish security procedures. For example, you need to clearly communicate why an employee may not be able to bring their mobile device into work, like because it could enable a data breach.

If you don’t have the budget to hire a security consultant or have everyone attend a workshop, there is still a wide variety of security resources at your disposal, such as the Security Now and Security Weekly podcasts and online courses from Coursera, edX and Udacity.

You should also stay up-to-date with not only existing cyber threats but also emerging threats. Government Technology put together a list of the top 17 security threats for the upcoming year that you and your team should be familiar with.

2. Monitor what’s already lurking.

When it comes to security, most small businesses are so focused on preventing attacks that they don’t take the time to evaluate their existing database to see if there’s already been an attack. Implementing best practices when it comes to cybersecurity won’t prevent a breach if there’s already been a leak.

Training your employees is a start, as it will give you a better idea of whether anything has gotten through. For example, maybe during this training an employee informs you that his or her tablet, which is used for work, has been infected. Now you know possibly where the attack originated from and how to combat this specific threat.

Besides training your employees, you also want to conduct a do-it-yourself network security process to see if you’ve already been attacked or to better understand your network SI security level. This typically involves:

  • Vulnerability analysis where a tool like Nmap creates an inventory of your network assets, an OpenVAS vulnerability scanner detects any flaws in the inventory and Arachni searches for any web application vulnerabilities.
  • Configuration analysis using MBSA (Microsoft Baseline Security Analyzer) for Windows environments and Lynis for Linux environments.
  • Log analysis, which searches system logs for patterns that can reveal hacking attempts through tools like the ELK suite.

Once you’ve conducted this process, make sure you also run password checks and invest in real-time security monitoring tools from companies like Mindtree.

3. Use the right encryption.

One of the most effective ways to keep hackers out is through encryption. But for encryption to work properly, you first need to understand what exactly encryption is and how to use it correctly.

Encryption, as described in a previous CloudTweaks article, “converts data into an unreadable format called cipher text with the help of a secret key called the encryption key. And you cannot gain access to the primary data unless you can access the encryption key or guess it.

In order to encrypt data the right way, it’s suggested that you:

  • Check the strength of encryption provided. Apple uses 128-bit AES encryption, but if you need something stronger, try Crashplan, which offers 448-bit Blowfish encryption.
  • Use longer passphrases, such as eight-letter passphrases, as your encryption key.
  • Encrypt all of your data prior to it being uploaded.
  • Check regulations, compliance and security guidelines.
  • Encrypt your emails.
  • Use digital signatures.

4. Utilize security as a service applications.

Security as a service is generally software that is used to monitor data flowing through mobile devices. However, this software can also be used to protect your cloud infrastructure and data, access all of your cloud apps with a single set of login credentials, protect your company’s website and monitor the information moving through your network and devices like printers.

5 Embrace the cloud to thwart ransomware.

Ransomware involves cyber criminals who infect your system in order to hold your data hostage. To avoid this from happening, you should save, secure, store and back up all your data in multiple cloud locations.

Also, the cloud comes with advanced security features, such as sophisticated access controls and advanced encryption technology, which can protect your business from ransomware.

Protecting the data for your small business is a necessity, but you don’t need to have large, enterprise-level resources to protect your small business from potential cyber attacks.

By Loren Baker

Loren Baker

Loren Baker is the founder of Search Engine Journal and is a VP at Foundation Digital. A long time digital entrepreneur, Loren has been in digital marketing since 1998 and over the past decade he has built & executed innovative online strategies for leading companies in car insurance, retail shopping, professional sports and the movie & television industry.

View Website
Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Terrified of the Coming of Artificial Intelligence (AI)? Don’t Be. Now You Can Rent Your Own!

Terrified of the Coming of Artificial Intelligence (AI)? Don’t Be. Now You Can Rent Your Own!

Now You Can Rent Your Own! Beware the coming of AI! Or so say luminaries like Bill Gates, Stephen Hawking ...
The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Cloud Proofing Future Business Challenges

Cloud Proofing Future Business Challenges

Cloud Proofing Business Hardly a week goes by without coming across news around the increase in the number of organizations ...
Coupa Named a Leader in IDC Marketscape Worldwide SaaS and Cloud-Enabled Supplier Relationship Management Applications 2018

Coupa Named a Leader in IDC Marketscape Worldwide SaaS and Cloud-Enabled Supplier Relationship Management Applications 2018

SAN MATEO, Calif., July 09, 2018 (GLOBE NEWSWIRE) -- Coupa (NASDAQ:COUP), a leader in business spend management (BSM), today announced that it has been named a Leader in IDC’s Marketscape Worldwide SaaS and Cloud-Enabled Supplier Relationship ...
Uptick In Cybersecurity Job Searches Confirms Openness To New Employment

Uptick In Cybersecurity Job Searches Confirms Openness To New Employment

Cybersecurity job searches increased nearly six percent between March 2017 and March 2018, according to recently published research by job listings site Indeed. The increase actually outpaced a 3.5 percent uptick in jobs posted. These numbers do not ...
Four Providers of Smart City Kiosks Named IDC Innovators

Four Providers of Smart City Kiosks Named IDC Innovators

FRAMINGHAM, Mass., July 11, 2018 – International Data Corporation (IDC) today published an IDC Innovators report profiling four providers that are considered key emerging vendors in the Smart City kiosks market. The four companies named as ...