One of the first lines of defense in a cyber-attack is a firewall. It’s also important that employees working from home install a firewall on their home network as well.
Document your cybersecurity policies
While small businesses often operate by word of mouth and intuitional knowledge, cyber security is one area where it is essential to document your protocols.
Plan for mobile devices
With 59 percent of businesses currently allowing BYOD – Bring your own device, it is essential that companies have a documented BYOD policy that focuses on security precautions. With the increasing popularity of wearables, such as smart watches and fitness trackers with wireless capability, it is essential to include these devices in a policy.
Educate all employees
Employees often wear many hats at SMBs, making it essential that all employees accessing the network be trained on your company’s network cyber security best practices and security policies.
Enforce safe password practices
Yes, employees find changing passwords to be a pain. However, 63 percent of data breaches happened due to lost, stolen or weak passwords.
Regularly back up all data
While it’s important to prevent as many attacks as possible, it is still possible to be breached regardless of your precautions. It’s recommended to back up word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Be sure to also back up all data stored on the cloud. Make sure that backups are stored in a separate location in case of fire or flood. To ensure that you will have the latest backup if you ever need it, check your backup regularly to ensure that it is functioning correctly.
Install anti-malware software
It’s easy to assume that your employees know to never open phishing emails. However, the it’s found that 30 percent of employees opened phishing emails. Since phishing attacks involve installing malware on the employee’s computer when the link is clicked, it’s essential to have anti-malware software installed on all devices and the network.
Use multifactor identification
Regardless of your preparation, an employee will likely make a security mistake that can compromise your data. Using the multi-factor identification settings on most major network and email products is simple to do and provides an extra layer of protection. He recommends using employees’ cell numbers as a second form, since it is unlikely a thief will have both the PIN and the password.