top of page

7 Ways To Protect Your Business From Cybersecurity Threats

Updated: Mar 5, 2020

What can a small company do if it doesn’t have resources to hire a cybersecurity specialist or even a general-purpose IT guy?

Exactly what a western movie protagonist would do: take their safety into their own hands.


On this list, you’ll find 7 tips on how to protect your small business from cybersecurity threats. The best thing about them is that anyone can implement — no tech skills required.


1. Restrict Employee Access & Permissions


The sad truth about data breaches and other cyberattacks is that they are very often facilitated by company employees.

In most cases we’re not talking corporate sabotage — it’s usually just simple human error. In fact, IBM found that human error was at least one of the causes of 95% data breaches.


There are many ways in which an employee may compromise your cybersecurity:

Opening suspicious emailsBrowsing dangerous websitesClicking malicious links

So what do you do?

You have to regulate your workers’ internet access because it just takes one malicious website or file to endanger your company’s cybersecurity.

This is where getting an OpenDNS service comes into play.


OpenDNS services come in free and paid (corporate) versions. They allow you to set simple restrictions on what websites can and can’t be accessed from your network.


The most convenient thing about an OpenDNS service is that it already has lists of dangerous websites divided into categories you can enable or disable with a click. And setting one up isn’t hard.


Additionally, an OpenDNS service allows you to block sites you feel may distract your employees from doing their job such as gambling, video services, social networks, etc.


But that’s entirely up to you.


2. Use A Virtual Private Network


This applies to any eCommerce business but it’s especially important if your company employs remote workers.


A virtual private network, or a VPN, is a technology that encrypts data you send over the internet so that it can’t be read by snooping third parties.


When you storing information about your customers and regularly process payments, VPNs can go a long way in keeping your data safe from hackers.


There are a lot of VPN providers out there all offering different features, speeds, security, and other parameters. So it’s a good idea to try before you buy, as many services let you test their VPNs for free for a limited amount of time.


3. Perform Penetration Testing


To continue the Wild West analogy, there are hackers who wear black hats and those who wear white.


The black-hat hackers are the bad guys who seek to get into your system by exploiting human factors, software vulnerabilities, and other weak spots of it for their personal gain without your permission.


As for the white-hat or ethical hackers, they want to do the same thing… only because you ask and pay them to.

It may sound a bit counterintuitive to pay someone to hack your system but it really is an indispensable way of testing how strong your network is.


Known as penetration testing, this strategy is like a fire drill for your organization: it lets you see what is lacking in your cybersecurity setup and take measures to fix it.


Unlike a dedicated security team you need to pay upkeep to, pen testers are going to be your one-time contractors. Of course, as the cybersecurity landscape is constantly changing, you may want to run these tests every once in a while – once a year is good enough and once every six months is great.


4. Secure Your Premises


Sometimes, software-only measures are not enough to fully protect your company.

Depending on what kind of business you run, your office may see a lot of visitors every day. And if you are being targeted by cybercriminals, stepping foot in your place of business is a good way for them to assess how well you are protected.


For example, it could be as simple as an employee writes down their password on a piece of notepaper and leaves it on their desk. Not only does it allow a potential malefactor to snap a quick photo of it while nobody is looking but also tells them what your company’s attitude towards cybersecurity is.


It doesn’t mean, of course, that you should turn your office into Fort Knox. However, certain simple precautions must be taken.

In general, your visitors should not be able to see or hear anything that does not directly relate to their specific case.


You can achieve that by doing a little restructuring of your working space and making sure that sensitive company and customer data does not lie unattended in broad daylight.


5. Backup Your Data


One of the most devastating cyberattacks for businesses and nonprofits alike is ransomware.


It is a type of malware that gets installed on a computer and blocks the user’s access to all the programs and data stored on that device.

The purpose of it is extorting money from the victim for unblocking their computer. Of course, there’s never any guarantee that the hacker will actually keep their promise once paid.


For a company, losing access to its business data often means losing its very ability to conduct business.


If you can’t see, for example, the deliveries you have to make today and the addresses of the clients you have to deliver those items to, you won’t be able to satisfy your customers’ demands, ruining your day and reputation.

This is why you should keep regular backups of your important data on a device that is not connected to the network and the internet at large.


The best way to do it is by using an external hard drive. It connects to a computer via the USB port, can store terabytes of information, and can be encrypted with BitLocker, a powerful program that comes preinstalled on modern Windows.


Since it is basically a USB flash drive, it doesn’t have an internet connection so even if your system gets blocked by ransomware, the hard drive won’t be affected by it.


6. Establish a Password Policy


Snooping passwords or obtaining them via malicious links and emails are not the only way hackers can get your employees’ credentials.


There is also a method calledbrute-forcing.

Brute-forcing involves hackers literally trying to guess the password that would get them into the system.


Of course, they aren’t doing it all by themselves. Instead, they are helped by artificial intelligence and machine learning algorithms, which makes the process much quicker.


However, to break a really long and varied password this way, even AI will need to take a couple-millennia-long vacation. If you use special symbols as well as letters and digits, you are safe from brute-forcing.

The thing is, not many people do use complex passwords. Most passwords, in fact, are terrible.


If your company has any employees, chances are, at least some of them are using weak passwords to get into the system.

It is up to you to stop this dangerous practice.

You have to make sure that all of your workers know and understand the importance of using strong passwords.

To guarantee compliance, you should be very precise when delivering this point to them. Specify the number of symbols required (it should be at least 12), the need for capital and lower-case letters, digits, and symbols like #, &, %, etc.


7. Conduct Cybersecurity Awareness Training


It’s a good idea to take the above tips and conduct an in-house cybersecurity training program so your employees understand the threats and how to protect against them.

Yes, it costs some time and money, but nowhere near as much as a data breach.

Everyone working for you should be involved in this training – without exceptions. That, of course, includes you.


Remember: following these recommendations will not make your company 100% immune to all cyberthreats. It will, however, make you far more resistant to them and able to recover faster if an attack happens.

24 views0 comments

Recent Posts

See All

Top 10 CyberSecurity Tips

1. Record Organizational Inventory Understand what information you need to protect and where it is, as well as all the hardware and software in play. It’s essential to know the inventory you hold,

bottom of page