Top 10 ways to improve small business cybersecurity effortlessly (Actionable Tips & Video)

Share on facebook
Share on twitter
Share on linkedin
Share on email
Small business cyber security guide

From a small business cyber security aspect, it’s important than ever to be aware of your unknowns. SMBs (Small and medium businesses) are a target due to their lack of preparedness regarding people, process and technology. This excuse, “my computer has no top-secret data,” doesn’t work anymore. Gone are the days when only a handful of systems hold sensitive data in a separate environment. Our experience with SMBs helped us come up with the top ten practical and pragmatic tips that would boost cyber security for SMBs. All this with more thought, less chaos of big spend products.

Feel free to watch this video containing a condensed version of the article.

Data breach scope for Small businesses

Multiple references are available online, showing how small businesses websites or IT assets are exploited by cyber criminals, costing billions of $ worldwide. 

Interpol reports show an alarming rate of cyber attacks demonstrating COVID-19 impact on small and medium-sized business categories. Cybercriminals exploit the fear and uncertainty factors caused by the unstable economic situation due to the pandemic. This goes without saying that we shall see more sophisticated and newer ways of cyber attacks.

Top 10 Cyber security tips for small businesses

Our aim with this small business IT security checklist is to help organisations without a ‘big spend product approach’. Although not all the following tips for a small business would be a breeze, a strategic plan with carefully selected actions would make tangible differences in the medium to long term timescales.  

Learn our top tips on how to strengthen small business cyber security and prevent the most common cyber attacks. 

0. Less is More

Start small. Assess the most critical assets to your business, review their current situation and leverage the current tools at hand. These include cloud services, free/inbuilt host firewall, anti-virus solutions and maximise the use of active directory (assuming it’s present). This responsibility starts from the top, with cultural change around business information security knowledge and education amongst the stakeholders as a starting point. Questions, discussions and more brainstorming follows the answers needed by the business to acknowledge and improve the computer security for small business. 

More products = more chaos!

Utilise independent security experts such as Cyphere to review the current tech stack to leverage the already present never utilised features. After this phase, you can set up a strategic plan to introduce new products/solutions as necessary for business.

1. Endpoint Protection

Endpoint refers to end-user systems or devices such as laptops, desktops/workstations and mobile devices. These endpoints serve as an entry point to an organisation. For example, a threat actor successfully establishing a connection with a staff computer due to a phishing attack (or another form of attack) is due to malicious code bypassing the endpoint controls. Therefore, the security of entry points is important by utilising antivirus or anti-malware solutions that detect suspicious activity and deter such attempts. Additionally, after implementation, it is important to ensure full system-wide scans are performed periodically and regular vendor updates.

2. Network Segmentation

It is the most underrated control in the IT security domain. Just like a submarine structure, you need to ensure there are different compartments within your organisations. In case a cyber attack has led to the compromise of a system or segment of the network, an attacker will not have immediate access to the entire organisation due to such network security measures. This may lead to limited impact, containment or detection of intrusion activity based on the incident scope.

3. Principle of Least Privilege

Apply the rule of least privilege. This concept relates to the implementation of privileges on the need to know basis. In case of a system compromise, threat actors shall face increased resistance to escalate their privileges. Any requirements related to compliance, framework or standards would be a breeze. There are several tools and tactics:

  • Privileged Access Management
  • Network segmentation
  • Separation of Privilege
  • Systems Hardening

See this Microsoft guide to implementing Least-Privilege Administrative Models across Windows systems.

4. Secure Internet Access

Internet is the backbone of any business. Since the rise of remote working during and post Covid-19, this is even more important in our lives.

  • Ensure that a restricted internet use policy for employees is served via emails, meetings and contracts (where needed).
  • If there is a web proxy, filter or internet traffic access solution in place, order an immediate review to ensure it serves the intended purpose. If there is no such software in place, deploy internet filtering solutions.

small business cybersecurity

5. Passwords

Change default passwords on all equipment such as network devices, printers, scanners, security devices.
If possible, implement and mandate the use of a password manager for small business. This, although it may require users to acknowledge the new software usage, shall offer multiple benefits in the long run, such as:

  • Cultural shift towards the importance of computer security for small business
  • Offering an easier alternative for hard to remember, randomly generated non-dictionary long and complex passwords
  • Allowing users to select different passwords for different services
  • Separating their personal information (the football team or dogs’ name that they may be used as password otherwise) from office.

6. Multi-factor Authentication

Implement multi-factor authentication on all your devices and internet-facing portals. At times, small business owners or employees’ credentials could be compromised without any cyber attack activity linked to your organisation. This technique, known as credential stuffing, is a type of cyber attack where stolen account credentials from one service are used to gain unauthorised access to other accounts on the internet. 

7. Secure Configuration

Secure configuration is important for all systems used within or outside the organisation. This includes a mobile device management solution to control mobile devices. Operating system hardened images used as a secure operating system base and secure hardening based network equipment configurations. CIS benchmarks are a great start to prepare internal checklists covering patch management, system hardening, services configuration and many other areas. If your mission-critical assets such as a revenue-generating website, opt for a penetration test at least once a year or after any major changes. This would pick up on the various cyber attacks that target retail or your business-specific websites, infrastructure. In case of website security of a small business, website hardening measures along with anti-DDoS and WAF services at the front should be deployed. If you need free advice around this, please get in touch to understand how we help strengthen small business website security without product spends. 

8. Secure and Regular Backups

Backups are an essential part of your cyber security strategy. In case of a cyberattack, data could be either compromised or deleted. Given the SMB businesses lacking strict processes and procedures, there is a large amount of data on staff laptops and mobile devices (tablets, phones). Ensure that a secure and regular backup policy is in place. This includes utilising a backup solution that allows the automatic ability to schedule backups.

Use the cloud. Modern devices and services offer easy cloud-based backups. This offers multiple benefits such as backup schedule configuration, secure storage and easy restores accessible from anywhere.

9. Phishing

Your employees could be your strongest or weakest link in cybersecurity. It all depends upon your cyber security strategy. 

  • Regular, thorough training must be an investment to deliver a baseline of knowledge for all employees. This would mark a shift in company culture with time, ensuring an overall boost for a proactive approach towards cybersecurity. 
  • Ensure that staff don’t browse the web or check emails from servers, or using administrative privileges. This will reduce the impact of attacks in the event user details are stolen.

10. Secure Wireless Networks

  • If your business uses a wireless network, corporate or staff network must be segregated from the guest (visitor) network or vice versa. It is important to ensure this segregation is strictly implemented on both the networks to keep trusted and untrusted users separate.
  • For corporate wireless networks, certificate-based authentication is the recommended authentication mechanism. This ensures user and connecting device identities are validated and cannot be spoofed.
  • Implement a captive portal to manage guest network access for visitors.

Logging and monitoring, secure communications, in-depth active directory security are further areas that a business should consider in the long run. Just before you decide to go on a shopping spree…

Make informed choices before buying security products.

After implementing the above-mentioned measures, an organisation should opt for a cyber health check (or IT security health check) to assess their risk (and improvement). This independent exercise should detail gaps around people, processes and technology in use.

Good to knows

  • Don’t buy a product you heard about from another peer or at an event. Every network is different.
  • Don’t rely on your IT/managed service provider to solve all your security troubles. 
  • Don’t select a single security vendor who says they will do it all for you. 
  • Review the usability and security balance regularly to ensure security is an enabler for growth.

A layered approach to cyber security delivers effective protection designed to protect assets. To learn more, you can check more blog entries for more articles. 

Table of Contents

BOOK A CALL