How to Protect Your Business From a Cyber Attack
It's pretty well-known that internet hackers are a huge threat to any business, but they
can be crippling for small businesses who, many times, never recover from the theft. The National
Cyber Security Alliance reported that an average of nearly $200,000 was stolen from the small
to medium sized businesses that were hacked in 2011. They also reported that nearly two thirds
of said businesses were forced to close within half a year of the cyber attacks.
Hackers are crafty and can be around any corner, but there are ways to protect your business
from attacks. Here are some precautions that you can take to help keep your business better
protected against hackers:
• Install software. It is amazing the amount of companies that do not have
all of the proper anti-virus and firewall software installed to their computers. It is of the
utmost importance to have all of the software running that will protect your business from
viruses, spyware, and adware.
• Encrypt data. This is something else that is simple and often gets overlooked.
Most standard operating systems come with encryption programs already installed. For Windows,
the program is called BitLocker and FileVault on Macs. They take only a few minutes to run
and will keep your files much better protected from cyber hackers.
• Get office security. Many hackings occur because physical equipment was
stolen. Make sure all of your computers and hardware are thoroughly secure. This means improving
your office security. This could mean anything from getting CCTV (closed circuit television)
cameras to getting all of your locks rekeyed. You do not want any disgruntled ex-employees
breaking in to steal your equipment.
• Be careful on the internet. Viruses can be acquired anywhere on the internet.
You can get them from visiting infected sites, downloading the wrong files, or even opening
up the wrong emails. Be careful of any activity that you or any of your employees make. Anytime
anyone enters a password on a site (even for bank accounts or social networking), you are in
jeopardy of being hacked.
• Log Off. You are actually nearly always vulnerable to a cyber attack. Just
by having your computer on can allow a hacker to get in. Log off whenever you can. This reduces
the chances. You can set your computers to automatically log off after a designated amount
of time. Try setting it to shut off it 15 minutes goes by without any usage.
• Backup your files. Some hackers are not out to steal from you, but just
get a thrill from randomly ruining things. Once inside, they may just delete as many files
as possible. Make sure that you have everything backed up. By syncing your files with the cloud,
you will always have access to everything.
• No Wi-Fi. Wi-Fi makes it super easy for hackers to get into your system.
Many hackers drive around with antennas on their vehicles until they find an open network.
Use wires for your network, and if you do need to use Wi-Fi, make sure that it is heavily guarded
• Get security. Don't try to handle everything on your own. You have your
own business to run without having to worry about the constantly updating firewall technology.
Hire a professional company that knows what they are doing. Look around to see their services
and check their credentials. A good company should make backups of everything as well as automatically
update any virus protection and malware software.
Daniel J Delgle is an experienced technician at Castle Tech, a company that provides
[the website secure-offsite-backup.com cannot be found] cloud data backup services.
More Network Security Articles:
• Nessus Network Vulnerability Scanner
• Network Security
• Network Security Model - Defining an Enterprise Security Strategy
• How SSL (Secure Sockets Layer) Works
• Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
• What is a Botnet Attack and How to Identify It?
• Types of Computer Security Threats
• What Roles Do Firewalls and Proxy Servers Play in Network Security?
• Secure, Network Compliant BYOD (Bring Your Own Device) Solutions
• The Role of Security Penetration Testers