Cybersecurity John Enright Cybersecurity John Enright

SMB Cybersecurity & Ransomware

SMB Cybersecurity & Ransomware

Small Businesses today are challenged with investing in network security and keeping up with technology with limited resources and budgets. Ransomware is a type of malware that encrypts files on a targeted computer and demands payment in exchange for unlocking them. Here are the top three steps SMBs can take to protect themselves from Ransomware:

- Backup your data regularly and test restores to ensure the backups are working properly,

- Avoid using administrative privileges on their company computers to avoid becoming a ransomware victim, and

- Implement an antivirus program with an automatic update.

1. There is no such thing as 100% cybersecurity protection. It is important to have up-to-date antivirus protection and not allow admin access to the company computer.

2. It is important to ensure that all employees are educated on the dangers of Ransomware and have a plan in place for how they will respond if a computer is infected with ransomware as employees can cause more damage than any malicious software.

3. It is important to have an audit process in place for all employees to ensure they are not downloading malware or ransomware onto their computers.

4. It is important to stay vigilant on the threat of Ransomware and keep working with your IT provider prior to any attacks happening. Ransomware is still a very real threat that could affect your company and compromise data.

Read More
Net DirXions Net DirXions

Cybersecurity Tips for Employees

In this eBook, we explore the need for employees to practice strict and secure cyber-security habits— not only to thwart digital attacks, but also to prevent someone from simply walking by their desk (in the office or at home) and picking up a device or document that contains sensitive information. We also present the key steps SMB business owners can take to educate their employees to help secure their company’s data and intellectual property.

When developing cybersecurity programs, many businesses focus on protecting their infrastructure perimeter and device endpoints. After all, that’s where cybercriminals usually first gain access and wreak havoc on a company’s digital access.

But it’s also important to consider what happens when a threat bypasses perimeter defenses and targets an employee—in the form of a malicious email or text, or even a voicemail that might prompt an employee to respond with confidential company information. There’s also the possibility of an offline attack from inside the office, where an employee or an office visitor might gain access to valuable data by quickly taking something carelessly left on a desk.

According to a recent PricewaterhouseCoopers survey, 86% of business executives expressed concern about cyber threats, including a lack of data security. In addition, 100% of IT professionals recently surveyed at an SMB said they could improve their cybersecurity systems. These numbers indicate that it’s clear there’s a pressing need for better cybersecurity. The issue is not going away anytime soon. If anything, it’s only getting worse.

Stronger cybersecurity has become a global priority over the last few years as hackers penetrate the IT infrastructure of government and enterprises with increasing frequency and sophistication. According to a recent government report, How to Protect Your Networks from Ransomware, 4,000 ransomware attacks occurred per day in 2016. Furthermore, the annual cost of global cybercrime damages are estimated to cost $6 trillion by 2021, according to a 2017 Cybercrime Report by Cybersecurity Ventures. Coupled with the Internet of Things (IoT) and the explosive growth of mobile devices, the threat landscape and potential for data leaks is even more significant.

In this eBook, we explore the need for employees to practice strict and secure cybersecurity habits— not only to thwart digital attacks, but also to prevent someone from simply walking by their desk (in the office or at home) and picking up a device or document that contains sensitive information. We also present the key steps SMB business owners can take to educate their employees to help secure their company’s data and intellectual property.

We can’t stress enough the importance of security awareness training for internal employees. Educating them on what it takes to protect proprietary documents and data is critical. Any leaks— unintentional and intentional—could hurt the business in the form of information that assists a competitor, violates regulations, or harms the corporate image. Leaks can also hurt employees from the standpoint of personal information that might be exposed. Lastly, customers and business partners could be at risk, compromising the industry reputation of any business that does not properly protect confidential information. It only takes one incident to completely destroy any goodwill you established and built with your customer base.

Read More