Protect Your Small Business

Protect Your Small Business from Future Threats

Protect Your Small Business

The well-known ransomware called Wannacry hit hundreds of computers in May 2017. As a business leader, it is important to understand what happened, to ensure that proper security measures are being taken to protect my business from future threats.

Computer systems will always be prone to attacks; from the largest enterprise to the smallest home business, many of these attacks start with email. The most recent example being the highly publicized WannaCry ransomware attack. E-mail attacks typically start with an innocent-looking phishing e-mail in your inbox, and end with losing access to all your data. One of the main problems with these types of attacks is that they are always evolving, sometimes within hours or days of each other, and they’re becoming harder to detect.

For example, in the recent Google Docs and DocuSign phishing e-mail attacks, attackers changed servers within hours after spam filters started to pick up on the breach; and then bypassed them. This allowed even more e-mails to go through, and more data was compromised. Once a user clicked on a link and entered information, or downloaded an attachment, data was compromised. In some cases, beyond recovery.

Myth: Many people feel that having a spam filter in place protects them from these threats.

It’s not always true that spam filters protect users from threats. In fact, with many of the recent attacks, the e-mails that were received were not recognized, or flagged as spam. In most cases, they are e-mails being sent from the account of a compromised party (who entered their credentials in a phishing e-mail), or through a legitimate third party.

So, what can you do to protect your business and employees from future attacks, when even a good spam filter might not catch a possible threat?

The key is having as many layers of protection between the outside world and the end user, as possible. The first layer of protection would be your spam filter, and the second would be your Anti-Virus / Anti-Malware software. The Anti-Virus / Anti-Malware software on your PC should be the last line of defense, and ideally never used.

What are some other layers of protection?

The most critical layer of protection has nothing to do with technology at all, but everything to do with the end user. Ensuring that you and your end users are diligent and attentive when reviewing e-mails, is important. It’s essential to always be on the lookout for suspicious emails with links or attachments. For example, if you receive a random e-mail from someone you may or may not know, it could be that their account has been compromised.

Were you expecting to receive a signed DocuSign document? Were you waiting for someone to share a document with you?

If the answer is no, don’t assume that because you know the name on the e-mail, that it’s safe. This is true even if it’s from someone within your own company. It doesn’t take much time to pick up the phone and call/text that person and ask. In this modern world, attackers prey on the fact that we have become so dependent on e-mail, and will not find other means to provide checks and balances. Do not e-mail back and ask if this is real, as the attacker could be sitting and monitoring that person’s e-mail account, waiting to reply, just to get you to enter in your information.

Another layer of protection is using Office 365 Exchange Online for your e-mail. Microsoft also offers Office 265 Advanced Threat Protection, which helps monitor your e-mail in real-time, against new, more sophisticated attacks, by screening malicious attachments and links. This is done by working with the security features already included in Microsoft 365’s Exchange Online Protection spam filter. Overall, this provides better defenses against zero-day attacks. Since zero-day attacks are generally unknown to the public, it is more difficult to defend against them (as patches have not yet been released), which is why they’re often effective against “secure” networks.

Office 365 Advanced Threat Protection can be added to most Office 365 Business or Enterprise plans, and is included in the Office 365 Enterprise E5 plan. Basic configuration of Office 365 Advanced Threat Protection is relatively quick, and licensing is easily acquired.

By Matthew Cleaver

Matthew Cleaver Contributor
Matthew Cleaver is the CEO and Managing Partner of The SMB Help Desk. Matthew has worked with multiple Fortune 500 companies and countless small businesses, supporting business process changes for sales and marketing systems as well as ERP systems. As a small business owner, certified Salesforce developer, certified Sales Cloud Consultant, and cloud evangelist Matt understands the challenges that small business owners face, and how implementing cloud solutions can improve operational efficiency, customer service, and the overall performance of the business.
Sean Peterson

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes and serving customers. Leading software ...
The Cloudification of Healthcare: Benefits and Risks

The Cloudification of Healthcare: Benefits and Risks

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The healthcare industry is no exception ...
George Foot

Your Biggest Data Security Threat Could Be….

Biggest Data Security Threat Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, even the most popular cloud ...
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which cloud" is now the center ...
Reuters news

Robot Wars: Russia’s Yandex begins autonomous delivery testing

MOSCOW (Reuters) - Russian internet giant Yandex has started testing autonomous delivery robots, the latest addition to its technological arsenal, the company said on Thursday. Named after the space exploration ...
Facebook

Facebook admits to another data leak, saying that up to 100 developers accessed people’s data from Groups

More than a year after Facebook clamped down on how much personal data third parties could see, the company has found some app developers still had access to people's data ...
Accenture News

Accenture Expands Cybersecurity Capabilities with Network of “Cyber Ranges” to Help Industrial Companies Simulate and Respond to Cyberattacks

Accenture will also open new Cyber Fusion Center in Houston for industrial control systems NEW YORK; Nov. 7, 2019 – Accenture (NYSE: ACN) has expanded its cybersecurity capabilities with the ...