• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Technical Support: 703-288-7230
  • Call: +1-866-531-1990
  • Contact Us
  • Blog
cropped-Nortec-logo-1.png

Nortec Communications

IT Services & Solutions

Menu
  • Cloud
    • Explore the Cloud
    • Why Nortec?
    • Cloud Consulting Services
    • Work With a Microsoft Gold Partner
  • Cloud
      • Explore the Cloud

        The Cloud Experts

      • Why Nortec?
      • Cloud Consulting Services
      • Work With a Microsoft Gold Partner
        • Managed Cloud Services
          • Managed Cloud Services
          • Microsoft 365 Business
          • Managed Microsoft Teams
          • Data Center Services & Management
          • Data Backup and Disaster Recovery
        • Remote Workforce Solutions
          • Communications and Collaboration
          • Cloud Administration
          • Desktop Management
          • Remote Worker Cybersecurity
        • Cloud Cybersecurity
          • Mobile Device Management
          • Identity Management
          • Threat Protection
          • Cybersecurity Training
        • Cloud Infrastructure
          • Azure Partner
          • Data Center Services & Management
          • Hybrid Cloud Computing
        • Solutions
          • On-premise Mitel
          • Microsoft 365
          • Teams
          • Azure
          • Microsoft Licensing
        • Resources
          • Ebooks
          • Cloud Cost Calculator
          • Checklists
          • Case Studies
          • Consultation
          • Blog
  • Services
    • Managed IT Services
    • Cybersecurity Services
      • Identity Management
      • Cybersecurity Awareness Training
      • MDM Solutions
      • Endpoint Security
      • Cybersecurity Consultant
    • Phone Systems
      • Cloud Phones
      • Microsoft Teams
      • Managed Microsoft Teams
      • On-premise Mitel
      • Mitel Support
    • Work With a Microsoft Gold Partner
      • Microsoft Teams
      • Azure Partner
      • MDM Software
      • Microsoft 365
      • Microsoft Windows 10
      • Microsoft Licensing
    • Network Architecture
  • Resources
    • Blog
    • Checklists
    • Videos
    • Infographics
    • Ebooks
    • Case Studies
    • News
  • About Nortec
    • Our Methodology
    • Core Values
    • Leadership
    • Vendor Awards & Competencies
  • Support
  • Contact
  • Book A Consultation

10 Cybersecurity Tips for Small Business

Primary Sidebar

Subscribe to our blog

 


 


 

Recent Posts

  • Choose a Managed Cloud Service with Endpoint Detection and Response
  • IT Support for the Changing Workforce
  • Maximize Work-From-Home Benefits With a Cloud Managed Services Provider
  • Stay Protected During the Holidays With Mobile Endpoint Security
  • What Is the Difference Between Cloud and Managed Services?
cybersecurity tips washington dc

Cybersecurity 101 – Understand What You’re Up Against

According to a CNBC poll, 59% of small business owners believe they are ready to “quickly resolve” a cyberattack. For the most part, this is misplaced confidence. Many small businesses that come to us after an attack are not following the best practices outlined above. There’s also a lack of understanding about the nature of threat.

Cybercrime is a form of modern war

You aren’t dealing with tech-savvy teenagers who want to play a prank. Even an amateur can send a convincing phishing email that unleashes a potent virus. Then there are the professionals and nation-state threat actors who are backed by multi-million-dollar budgets.

“Cybercrime for Dummies” isn’t enough

You could leaf through a copy of the book (yes, it really exists), or enroll in a Cybersecurity for Beginners course. It won’t help when you’re swept up in a large-scale, professional attack like SolarWinds. To go toe-to-toe with today’s hacker class, you want a team of cybersecurity experts.

Offload responsibility to a cybersecurity service provider

Along with unfathomable budgets, criminals continually branch out into new nefarious realms. To pick the best cybersecurity programs and tools, you need to have deep knowledge of malware attacks, phishing scams and other activities hackers deploy. You don’t have time to track that, implement a solution and manage it – but a cybersecurity service provider does.

Protecting your business is a choice – what will you decide?

The cybersecurity business divide has nothing to do with size. Small businesses are attacked all the time. It’s between organizations that put in place preventative, protective measures and those that don’t. You want to be the former.

10 Common Sense Cybersecurity Best Practices:

Here are 10 essentially common sense cybersecurity best practices published by the Federal Communications Commission for Small Businesses:

1. Train employees in security principles

Establish basic practices cybersecurity training to protect sensitive business information and communicate them to all employees on a regular basis. Establish rules of behavior describing how to handle and protect customer information and other vital data. Clearly spell out the penalties for violating business policies.

2. Protect information, computers and networks from viruses, spyware and other malicious code

Install, use and regularly update antivirus and antispyware software on every computer used in your business. Such software is readily available online from a variety of vendors. Most software packages now offer subscriptions to “security service” applications, which provide additional layers of protection. Set the antivirus software to automatically check for updates at a scheduled time of low computer usage, such as at night (midnight, for example), and then set the software to do a scan after the software update.

3. Provide firewall security for your Internet connection

A firewall is set of related programs that prevent outsiders from accessing data on a private network. Install and maintain firewalls between your internal network and the Internet. If employees work from home, ensure that their home systems are protected by firewalls. Install firewalls on all computers – including laptops – used in conducting your business.

4. Download and install software updates for your operating systems and applications as they become available

All operating system vendors regularly provide patches and updates to their products to correct security problems and improve functionality. Configure all software to install such updates automatically.

5. Make backup copies of important business data and information

Regularly backup the data on every computer used in your business. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files and accounts receivable/payable files. Backup data automatically if possible, or at least weekly.

6. Control physical access to your computers and network components

Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft, so make sure they are stored and locked up when unattended.

7. Secure your Wi-Fi networks If you have a Wi-Fi network for your workplace make sure it is secure and hidden

To hide your Wi-Fi network, set-up your wireless access point or router so it does not broadcast the network name also known as the Service Set Identifier (SSID). In addition, make sure to turn on the encryption so that passwords are required for access. Lastly, it is critical to change the administrative password that was on the device when it was first purchased.

8. Require individual user accounts for each employee

Setup a separate account for each individual and require that strong passwords be used for each account. Administrative privileges should only be given to trusted IT staff and key personnel.

9. Limit employee access to data and information, and limit authority to install software

Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission.

10. Regularly change passwords

Passwords that stay the same, will, over time, be shared and become common knowledge to coworkers and can be easily hacked. Passwords should be changed at least every three months as part of an identity-based management strategy.

Contact us today for a cybersecurity risk assessment

The evaluation will zero in on your vulnerabilities. We’ll review the results with you, make and prioritize recommendations, then build out a plan tailored to your risks and budget. You won’t find that in Cybersecurity for Dummies.

You’re One Click Away from Better Cybersecurity

Sign Up for An Assessment

Footer

nortec logo white

Serving the Atlantic Region from FL to PA

Washington, D.C.

7531 Leesburg Pike, Suite 300, Falls Church, VA 22043

Pittsburgh

102 Broadway Street, Suite #410, Carnegie, PA 15106

Need Support?

703-288-7230 [email protected]

Copyright © 2023 Nortec Communications, Inc. All Rights Reserved.| Sitemap