{"id":15060,"date":"2015-04-14T18:30:39","date_gmt":"2015-04-14T18:30:39","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3843"},"modified":"2020-02-26T18:54:10","modified_gmt":"2020-02-26T16:54:10","slug":"steps-to-protect-small-business-from-no-small-cyberwoes","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/steps-to-protect-small-business-from-no-small-cyberwoes\/15060\/","title":{"rendered":"Steps to protect small business from no-small cyberwoes"},"content":{"rendered":"<p>Security is a tough matter for small businesses for multiple reasons; startups and small entities tend to save on their IT wherever possible, and that\u2019s where security failures are common. Up to 31% of all cyberattacks are directed at businesses with less than 250 employees. There are just a few important steps that any business should take to strengthen its security. Simple things should go first: identify what data are critical and should be protected as such, use the proper security solution, etc.<\/p>\n<p>A few extra recommendations:<\/p>\n<ol>\n<li><strong>Educate\u2026<\/strong><\/li>\n<\/ol>\n<p>\u2026yourself and your employees about cyberattacks, malware, phishing, malicious sites, etc. Most of the threats require a certain degree of \u201ccooperation\u201d from the end-users, and if they know how to counter this and how to avoid getting trapped, protection becomes much easier.<\/p>\n<p>However, this must be a continuous process and the employees should be trained regularly, since situations with cyberthreats tend to be extremely volatile.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Steps to protect small business from no-small cyberwoes #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTD57&amp;text=+Steps+to+protect+small+business+from+no-small+cyberwoes+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Take a look at this post about <a href=\"https:\/\/business.kaspersky.com\/cybersecurity-education-in-enterprise-not-only-for-security-employees\/3836\" target=\"_blank\" rel=\"noopener nofollow\">cybersecurity education<\/a>.<\/p>\n<ol start=\"2\">\n<li><strong>Use strong passwords and\/or a password manager<\/strong><\/li>\n<\/ol>\n<p>There\u2019s a joke making the rounds on the Web: \u201cBad guys have hacked my mail. How could they have guessed that I\u2019ve set as my password the year of St. Dominic canonization?!\u201d<\/p>\n<p>And St. Dominic had been canonized in 1234.<\/p>\n<p>On a serious note, in the list of \u201c<a href=\"http:\/\/gizmodo.com\/the-25-most-popular-passwords-of-2014-were-all-doomed-1680596951\" target=\"_blank\" rel=\"noopener nofollow\">The 25 Most Popular Passwords of 2014<\/a>\u201c, \u201c123456\u201d and \u201cpassword\u201d still hold top positions, which makes the criminals\u2019 life a bit too easy.<\/p>\n<p>It\u2019s one of the first rules of cybersecurity to use complex passwords which include both symbols and digits, and are NOT dictionary words.<\/p>\n<p>A good password manager, such as the one shipped with Kaspersky Small Office Security, also simplifies the chore of memorizing dozens of passwords. All you need to remember is just one good combination.<\/p>\n<p><a href=\"http:\/\/arstechnica.com\/security\/2015\/04\/hacked-french-network-exposed-its-own-passwords-during-tv-interview\/\" target=\"_blank\" rel=\"noopener nofollow\">\u2026And don\u2019t write the passwords on the sticky notes for all to see!<\/a><\/p>\n<ol start=\"3\">\n<li><strong>Keep the most important data most safe<\/strong><\/li>\n<\/ol>\n<p>Even if your business is a small undertaking, as soon as it is viable, it has something \u2013 some information \u2013 that may draw interest from cybervillains. So it\u2019s logical to assume that this information needs extra safeguarding.<\/p>\n<p>First of all, some critical data should be kept \u201ccold\u201d \u2013 in an offline storage, while the entire infrastructure should be protected with <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">a security solution, tailored specifically for smaller businesses<\/a>.<\/p>\n<p style=\"text-align: center\"><em>What else can be done? Take a look at <a href=\"https:\/\/kas.pr\/pF96\" target=\"_blank\" rel=\"noopener\">this presentation<\/a> about the steps to protect businesses.<\/em><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is a tough matter for small businesses for multiple reasons; startups and small entities tend to save on their IT wherever possible, and that&#8217;s where security failures are common.<\/p>\n","protected":false},"author":209,"featured_media":15697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[2302,234],"class_list":{"0":"post-15060","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-protectmybiz","10":"tag-small-business"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/steps-to-protect-small-business-from-no-small-cyberwoes\/15060\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/steps-to-protect-small-business-from-no-small-cyberwoes\/15060\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/steps-to-protect-small-business-from-no-small-cyberwoes\/8107\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/steps-to-protect-small-business-from-no-small-cyberwoes\/15060\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/protectmybiz\/","name":"protectmybiz"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=15060"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15060\/revisions"}],"predecessor-version":[{"id":26523,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15060\/revisions\/26523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15697"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=15060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=15060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=15060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}