Story image

Seven things SMBs can do right now to prevent cyber attacks

04 Sep 2018

New research from Australian’s Deakin University has found that many small businesses are at risk of cyber attacks, but most are unaware of the risk and doing nothing to prevent it.

Professor Matthew Warren is the deputy director of Deakin’s Centre for Cyber Security Research and Innovation. He believes businesses are becoming more dependent on IT systems, which makes them vulnerable to emerging security risks.

“From hairdressers to builders, accountants to GPs, small businesses are using IT to improve, expand and market their services, and that includes things like booking services, online sales, social media promotion, websites and customer databases,” he explains.

However those businesses are using technology for convenience, without understanding privacy and security risks. In addition, they may not have the right skills, resources, or expertise to protect their systems and data.

“Many think security is not their responsibility but it’s a serious risk that can destroy their business,” Warren warns.

You don’t have to go far to find examples. In 2016, thieves targeted a small business that had a national security contract with the Australian federal government. The thieves stole large amounts of data.

“While not all breaches will impact on matters of national security, when you consider that the average time it takes to resolve a cyber-attack is 23 days, that can still have an enormous impact on a small business’ operations and ultimately on its bottom line,” Warren says.

He says there are several things SMBs can do to protect themselves.

  • Patch systems and enable automatic patching. All systems and packages are updated (called patching) and the patching can be done automatically rather than implemented individually by users.
  • Back up all important data.
  • Use a cloud based email and/or data storage.
  • Use strong authentication. Use passphrases instead of passwords and use two stage authentication where possible.
  • Set up different accounts. For example you can set up an administrator account, as well as user accounts.
  • Don’t use the same password across all accounts (Twitter, Facebook, LinkedIn, Gmail, Adobe, Apple, etc). When one is hacked, they all become vulnerable if you’re using the same password.
  • Don’t click on links, attachments or images from people not known to you. Criminals often hack one account and use that account to send malware to people in the contact list.

“SMBs need to ask themselves – if they were a victim of a cyber-attack how much immediate business would they lose, could they restore their system and data, and would their customers have confidence in their organisation in the future,” Warren concludes.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.