Stay a Step Ahead: Cybersecurity in Motion
Why updating cybersecurity is a necessity for small businesses
part two of three Staying up-to-date in a changing landscape
Small businesses can count on one thing when it comes to cybersecurity: hackers, scammers and cybercriminals who target small businesses are never standing still. They are constantly developing new attacks, chipping away at existing security, and sharing what they learn among themselves. For small businesses to operate, it’s important not to take a “set it and forget it” approach. “Bigger companies are more likely on a fixed refresh cycle,” says Rohit Rao, a Senior Technology Advisor with Dell Small Business Solutions. “Small businesses tend to be less consistent. But it’s really important that they upgrade software, hardware and policies.” Coming Soon to Small Businesses: Windows 7 and Windows Server 2008 End of Service Small businesses should take note of the upcoming end of support for two common operating systems: Microsoft’s Windows 7 computer OS and Windows Server 2008 server OS.
Despite being over a decade old, many small
businesses still use these systems. After January 14, 2020, Microsoft will no longer release security updates or patches for the operating systems, which means any exploits hackers find will never be closed.
“These major end-of-service events involving the biggest software companies don’t happen often,” said Rao. “You want to pay attention.” Even without end of service events, small businesses should be regularly installing security patches, upgrades and new versions of software they own.
Hardware upgrades improve security and productivity
Needing a new operating system is an opportunity to upgrade hardware. In recent years, new features have been added to devices that reduce the risk of breaches, including:
Biometric logins: These include fingerprint scanners and infrared-capable cameras for facial and retina recognition, which significantly reduce a cybercriminal’s ability to hack a stolen device. Fingerprint-sensing mouse peripherals: These new innovations bring touch-login security to desktops. TPM 2.0 (Trusted Platform Module) built into processors: These enable trusted machines to communicate securely and block outside attackers. These security upgrades usually can’t be added to old hardware. Added security is just one justification for upgrading. The other is productivity – newer computers are faster and can eliminate the time wasted working around incompatibilities in older machines. When you add new hardware and software, you should train your employees. They must be taught to use enhanced security features and should be regularly informed of new ways cybercriminals are targeting small businesses.
Making security investments work for small businesses
“For most small business customers, the biggest constraint on security investments is budget,” says Jane Johnson, a financial coach with Dell Financial Services. “A lot of them are just starting up and feel security is a luxury, rather than the necessity it is.” Fortunately, there are creative ways to help small businesses invest in their cybersecurity while minimizing cash flow impact. Purchases of any size can be financed, spreading out costs, and often offering a competitive rate with low monthly payments.** Many software solutions, such as McAfee Small Business Security, are now available as subscriptions, so users get the latest version automatically. There may even be a leasing option available, which ensures regular upgrades.
Another advantage of financing is it lets small businesses upgrade their entire system at once. “It keeps it all together – hardware, software, services and support,” said Johnson. “They can get on-site tech support, and then don’t need to hire an IT resource.”
This approach helps small businesses focus on their core business, roll all technology expenses into a single convenient payment, and ensure all the pieces work well together, eliminating the security gaps common in piecemeal systems.
“It’s a common misconception that financing and leasing is only for larger customers, but we really work with credit analysts to get smaller customers approved,” says Johnson. “No business is too small for good security.”
Check back tomorrow for part three: Equipping smart employees to use smart technology