Between 2011 and 2018 cyber attacks on businesses increased by 18%. Successful cyberattacks cost businesses an average of $7 million dollars. Almost half of all cyber attacks on businesses target small businesses. Businesses need to defend themselves against cyber attackers.
Education, Regular Password Changes, and ROTA software
Employees must be kept educated on how to thwart cyber attacks. Staff should be updated on the latest tacticts used by cyber thieves through resources . Employees should be advised to never write down passwords. At minimum passwords and usernames should be changed monthly. Ideally, they will be changed weekly. Password should contain a combination of upper and lower case letters, numbers, and symbols. Some businesses secure customer information but leave employee information vulnerable to hacking. To protect employee information Human Resource departments should utilize a security conscious database that includes ROTA software.
Encryption, ISP, WAF, And Firewalls
All business information should be encrypted. To hackers encrypted information and emails are unreadable. Using a cheap internet service provider that does not offer security features can cost a business far more than it saves. When choosing an ISP the security measures they offer should be a business’ first consideration. As data is transmitted a web application firewall (WAF) protects a business by intercepting hackers, spam, and malware. WAF service is available as a monthly subscription. The macOS and Windows come with a built-in firewall. Before using your computer you should make sure the firewall is activated. Firewall hardware or software is available through companies like Cisco and Fortinet.
Updates, Computer Back-Ups, And Tougher Security Measures
A business not installing updates because it takes computers offline and costs money is “Penny wise and dollar foolish”. An out-of-date operating system makes pulling off a successful cyber attack easier. If a hacker wreaks havoc on a business’ computer system having the information backed-up will get that business back up and running sooner. Time Machine and File History are back-up systems built into the Mac and Windows operating systems respectively. External back-up hard drives are also available. A business can make it tougher for a hacker to breach its computer system by having all their devices on a network that uses malware detection software. After a short period of inactivity, logins should be canceled.
Companys should encrypt all their information. Employees who understand how hackers operate are a business’ first line of defense against cyber attacks. Internet service providers should be chosen for their security features. Firewalls should be used. Updates, especially security related updates should be installed regularly. Customer and employee information should both be protected. Passwords should be changed routinely and all of a business’ information should be backed-up.