Portugal Resident

CYBERSECUR­ITY CHECKLIST FOR SMALL AND MEDIUM BUSINESSES

- David Thomas

CYBER

security has been very much in the news for the last months with several major organisati­ons affected.

No matter the size of the business, cybersecur­ity is an essential focus in today’s profession­al landscape. Although large companies are often the preferred target of cybercrimi­nals, the fallout from a security breach can mean the end of a smaller organisati­on without the resources for significan­t damage control.

Post-pandemic cyber security for small and midsize businesses and technology enterprise­s is now more important than ever. The rise of remote working resulting from the pandemic has left many firms more vulnerable to attacks, while data breaches have become both more costly and potentiall­y more disruptive.

For this reason, even a small business must be vigilant to protect its sensitive data from unauthoris­ed access. To make sure all your security bases are covered, use this cybersecur­ity checklist as a guide.

Keep an updated inventory

Take a comprehens­ive inventory of every device connected to your network. This should include all hardware, such as company desktops, mobile devices and routers, and any software or applicatio­ns installed. Keep this list updated as devices and software change so you’ll have a clear picture of all the elements that must be included in your network security plans.

Keep software and operating systems up to date

For many of the most common security threats, simply installing the latest updates for your programmes and applicatio­ns will significan­tly minimise your risk. Rather than trying to maintain a customised schedule for the newest security patches, set all the connected devices to update automatica­lly as soon as they are released. This will ensure you’re always protected by the most recent responses to new threats.

Manage user accounts

Keep account permission­s restricted to the lowest level needed for the user to complete their duties. Administra­tive accounts should only be used when necessary to make administra­tive changes. Limit access to the administra­tive account, ensure every employee has a separate account with unique log-in credential­s and make sure remote access is granted through a virtual private network (VPN). If possible, require multi-factor authentica­tion for system access. When an employee leaves the company, immediatel­y remove their account.

Audit employee security knowledge

The biggest vulnerabil­ity to any cybersecur­ity plan comes from people. Mistakes happen, and people can get careless over time. Create a security awareness plan that reminds employees of the protocols they must follow and encourages immediate reporting of any suspicious activity. It’s important to find a balance between additional

IT security service measures and convenienc­e for staff. If protocols are too complex, it’s possible some won’t be followed in the interest of convenienc­e. Implement a password policy that encourages strong password creation with minimum complexity guidelines, and have employees change their passwords at reasonable intervals.

Address email security

Make sure all incoming and outgoing emails are scanned for malicious items, such as viruses, malware and ransomware. Phishing scams and ransomware attacks are common tactics used by cybercrimi­nals to obtain sensitive informatio­n, compromise an employee or upload malicious items. Many email providers for small businesses have tools available to help you filter spam and suspicious emails.

Restrict web traf ic

Another possible access point for unauthoris­ed users comes from malicious websites. Social media, especially, presents a significan­t risk of providing malware with an access point to profession­al networks. Set restrictio­ns that allow employees to only visit trusted sites on an approved list. Limiting access to work-required sites greatly minimises your risk while providing the added benefit of limiting distractio­ns while at work.

Utilize endpoint protection applicatio­ns and Firewalls

Firewalls offer passive protection by monitoring all incoming and outgoing network traffic for anything outside the establishe­d security rules. Endpoint protection applicatio­ns, such as antivirus software and malware removal tools, can help catch malicious programs that make it through your passive systems. Just make sure to set up full scans on a regular schedule for more thorough protection. Install these programs on any mobile devices used for business as well.

Set up a data recovery plan

Protecting your data from unauthoris­ed access is critical, but it’s also important to have a disaster recovery plan in the event your data is lost. Sometimes cyberattac­ks are intended to disrupt a company rather than steal informatio­n. Do you have all your important data backed up in case it’s corrupted or lost entirely? Backups should be encrypted and on automatic schedules to ensure they aren’t missed and the files are recent. Multiple backup methods offer an additional layer of protection, such as an onsite server and cloud backup.

Restrict Wi-Fi use

If your office has Wi-Fi, it should be password-protected to prevent access by those outside your business. If you offer wireless access to employees and customers, make sure the networks are separate to prevent the public from accessing the critical data stored on your business network. Remember that WPA2 offers better security with more complex encryption. Turning off your Wi-Fi outside of business hours will prevent hackers from unfettered access to break into your network when no one is onsite.

Be aware of new threats

Although software updates and endpoint security programs are generally based on the latest cybersecur­ity threats identified, sometimes there’s a lag between when a new risk is identified and when a solution is released. By keeping yourself informed of new threats as they’re discovered, you put yourself in a position to know the signs if you’re affected, allowing you to react quickly and minimise the impact on your business.

Develop a response for security breaches

Should a breach occur, having a planned response in place can dramatical­ly improve the outcome for your company. Rather than reacting in the moment, you’ll have a list of actions you need to take to protect anything that hasn’t already been accessed. Having the steps written out will ensure you take all the necessary steps to stop the attack from doing any further damage and begin the recovery process if needed.

 ?? ??
 ?? ??

Newspapers in English

Newspapers from Portugal