Easy and Low-Cost Techniques to Help Protect Your Small Business from Cyber Threats – Part II

In Part I, we introduced Cybersecurity and some initial actions that you could implement as a starting point for protecting your business.  In Part II, we will introduce a few more easy techniques that you can implement.  These techniques are geared towards protecting your devices connected to your company network.

 

Invest in protection

Purchase and install virus protection software for each of your computer devices.  Also, ensure that each employee has virus protection installed and active on their devices prior to connecting to your company network if you allow employees to utilize their own devices.  Virus protection helps with protecting against threats that may come through a network.  A device can be impacted by visiting websites that have malware or viruses.  Also, downloading software or files from websites could introduce an attack in your company network as those items may contain a virus which is activated upon opening or installation.  Another common way of introducing an attack into your company is by employees opening and clicking on emails that appear to come from someone they know.  This attack technique is called phishing.  The virus protection is able to quarantine the infected files which reduces the risk of infecting your computer device.  Without virus protection, the device, along with its files could become compromised and useless.  In addition, without protection, the virus could spread to other devices connected in the same network.

 

Ensure all software and virus protection is up to date

If you have a Windows device, you probably think that the updates never end!  YES, it seems to be a pain; but why is it best to update to the latest software release whether it be on your laptop, phone, website, network device, etc.?  Within many of the updates, there are security holes being patched.  New security risks are introduced on a consistent basis.  In order to combat against new security threats, software companies update their software and notify you of the available updates.  By ignoring these updates, you leave your devices vulnerable; and one or more device could become compromised.  More than likely, it will cost you more in the long run to remove any threats from your devices than to be proactive and keep up with the latest updates.

 

Make difficult passwords and update passwords consistently

Ensure that your passwords are difficult to “crack”.  You can make a password out of your favorite quote or sentence; but substitute symbols or numbers for certain alpha characters to make the passwords easier to remember.  Also, do not set the same password for all your accounts.  Once a hacker “cracks” one account, they can determine what other types of accounts you may have and hack into those as well.  But how do you remember all these passwords?  There is technology referred to as a Password Vault/Manager to store all your passwords.  With the Password Vault/Manager, you only have to recall one password to the vault while the vault contains the passwords to all of your other accounts.

 

Changing up your account passwords on a consistent basis (i.e. once every thirty days or 60 days) would help reduce the risk of your device or accounts from being compromised.  This includes rotating the password for your internal network.  Employees come and go.  Thus, to reduce the risk of ex-employees having access, rotating passwords on your network and certain systems would combat a security threat.

 

As mentioned in Part I, these techniques also are a starting point.  With the introduction of the 5G network and many more devices and technology that utilize the network, such as Alexa, Google Home, cars, smart watches, cryptocurrency, etc., security threats are expected to significantly increase over time.  It is important to keep abreast of the latest trends in cybersecurity and how it could impact your business.  Your business is your “baby”.  Be proactive in protecting it.

Easy and Low-Cost Techniques to Help Protect Your Small Business from Cyber Threats- Part I

What is Cybersecurity and how does it impact you as a small business owner?  Cybersecurity is the act of protecting hardware, software and data from attacks via a network (i.e. wireless, internet, Bluetooth, etc.).  These attacks are referred to as cyberattacks.  With that definition alone, you can now begin to imagine how possible cyberattacks could impact your business as well as your personal life.

Look around you and take inventory of how many electronic devices you have connected to the internet.  Do you have a phone, laptop, tablet, security system and/or smart devices?  Also, what do you have stored on each of these devices?  Do you have sensitive client data, a company website or company information?  What would happen if that information is stolen or damaged?  How would that impact you and your business?  Is your business able to absorb an outage due to an attack?

As a small business owner, adding cybersecurity to your already full plate may be overwhelming.  In this article, we provide some initial, small actions that can be done to start you on your way to protecting your business.

Invest in protection

Purchase and install virus protection software for each of your computer devices.  Also, ensure that each employee has virus protection installed and active on their devices prior to connecting to your company network if you allow employees to utilize their own devices.  Virus protection helps with protecting against threats that may come through a network.  A device can be impacted by visiting websites that have malware or viruses. 

Also, downloading software or files from websites could introduce an attack in your company network as those items may contain a virus which is activated upon opening or installation.  Another common way of introducing an attack into your company is by employees opening and clicking on emails that appear to come from someone they know.  This attack technique is called phishing.  The virus protection is able to quarantine the infected files which reduces the risk of infecting your computer device.  Without virus protection, the device, along with its files could become compromised and useless.  In addition, without protection, the virus could spread to other devices connected in the same network.

 

Protect your company network

If you have your own company internal network, be sure to password protect connecting to the network.  This is to ensure that random people passing by your office space do not connect to your network without you knowing.  By leaving your network open, you invite hackers in to “sniff” your network traffic or be able to intercept the data you are sending in/out of your company.  To allow guests to connect to your network, set up a separate network for them to connect to; and ensure that the guest network is not able to impact your company network.  For example, if a guest obtains a virus, it could spread throughout the guest network.  You do not want the virus from the guest network to be introduced into your company network.  Thus, having two different networks or a network that is separated by a firewall would reduce the risk of infection and attack.  What is a firewall?  It is a piece of software installed on a network device to monitor incoming and outgoing network traffic.  It can also be configured to block and allow certain traffic.  As a result, traffic from the guest network could be blocked by the firewall from entering into the company network.

 

Another technique you may consider is not broadcasting your company network’s name, also referred to as the SSID (Service Set Identifier).   Although, this is not full proof, it does make it more difficult for a hacker to break into your network.  This can be disabled on the network router. 

Also, consider investing in a Virtual Private Network which provides an encrypted network connection for those employees connecting from outside of the office.  This is especially advantageous when you have a company of mostly virtual employees; and you have sensitive data being transmitted between the company network and employees’ devices.

 

Consider using a hotspot when away from the office

When on travel, most people connect to the hotel’s or restaurant’s wireless network.  This makes your connected device vulnerable to other guests using the network.  A sophisticated guest could intercept your device traffic and obtain important information such as credit card information or login credentials to certain sites.  Having your own hotspot would greatly reduce the security risk.  You could also configure your hotspot to be password protected and to not broadcast its network name.

 

Ensure all software and virus protection is up to date

If you have a Windows device, you probably think that the updates never end!  YES, it seems to be a pain; but why is it best to update to the latest software release whether it be on your laptop, phone, website, network device, etc.?  Within many of the updates, there are security holes being patched.  New security risks are introduced on a consistent basis.  In order to combat against new security threats, software companies update their software and notify you of the available updates.  By ignoring these updates, you leave your devices vulnerable; and one or more device could become compromised.  More than likely, it will cost you more in the long run to remove any threats from your devices than to be proactive and keep up with the latest updates.

 

Make difficult passwords and update passwords consistently

Ensure that your passwords are difficult to “crack”.  You can make a password out of your favorite quote or sentence; but substitute symbols or numbers for certain alpha characters to make the passwords easier to remember.  Also, do not set the same password for all your accounts.  Once a hacker “cracks” one account, they can determine what other types of accounts you may have and hack into those as well.  But how do you remember all these passwords?  There is technology referred to as a Password Vault/Manager to store all your passwords.  With the Password Vault/Manager, you only have to recall one password to the vault while the vault contains the passwords to all of your other accounts.

 

Changing up your account passwords on a consistent basis (i.e. once every thirty days or 60 days) would help reduce the risk of your device or accounts from being compromised.  This includes rotating the password for your internal network.  Employees come and go.  Thus, to reduce the risk of ex-employees having access, rotating passwords on your network and certain systems would combat a security threat.

 

The techniques mentioned are a starting point; and should be low cost, easy to implement and easy to practice on a consistent basis.  With the introduction of the 5G network and many more devices and technology that utilize the network, such as Alexa, Google Home, cars, smart watches, cryptocurrency, etc., security threats are expected to significantly increase over time.  It is important to keep abreast of the latest trends in cybersecurity and how it could impact your business.  Your business is your “baby”.  Be proactive in protecting it.

 

Jamita Machen of The Software Vault Named Volunteer of the Year at Women’s Business Council – Southwest Annual Awards Gala

Dallas, TX – The Women’s Business Council – Southwest (WBCS), recently named Jamita Machen the Women’s Business Enterprise (WBE) Volunteer of the Year, an award recognizing a WBE owner or employee who has given his or her time and energy to helping further the mission of the Council. The 2020 WBCS award winners were unveiled at the annual Parade of Stars Awards Gala on February 4th in Dallas, Texas.

 

I am truly honored to be recognized as a WBE volunteer of the year!  WBCS is an amazing organization; and it is my pleasure to give back“, said Jamita Machen, CEO, The Software Vault, LLC.

Jamita Machen, president of The Software Vault, is a newer WBCS member who has hit the ground running with her involvement. She has served on several committees, been a speaker at events on behalf of the Council, and introduced several new women owned businesses to membership.  

Congratulations to Jamita Machen for winning WBE Volunteer of the Year,” said Debbie Hurst, President and CEO of the Women’s Business Council – Southwest. “Jamita has been an asset to our team of volunteers and consistently goes above and beyond to support the Council and the mission of growing women-owned businesses. I cannot wait to see more of her involvement in the future”.

The Software Vault has been a certified WBE member of the Women’s Business Council – Southwest since 2018.

 

About The Software Vault

The Software Vault, LLC is a boutique technology consulting firm located in Cedar Hill, TX.  In addition to mobile application design and implementation services, The Software Vault, LLC is your “streamline expert” specializing in developing technology solutions to simplify your business and increase overall operational efficiency.  The Software Vault, LLC provides global consulting and delivers quality technology services that scale and are a return on your investment. The Software Vault’s primary areas of expertise extends from small to mid-sized companies, as well as travel, government, education, non-profit and retail entities.

About WBCS

Celebrating 25 years, the Women’s Business Council – Southwest (WBCS) is dedicated to increasing mutually beneficial procurement opportunities between certified women-owned businesses, corporations, businesses, government entities, institutions, and other organizations. Headquartered in Irving, Texas, WBCS has more than 1,200 Women’s Business Enterprise (WBE) Members and over 80 Sustaining (Corporate) Members. WBCS administers the national certification on behalf of the Women’s Business Enterprise National Council (WBENC) for north and central Texas, Oklahoma, Arkansas, and New Mexico. To find out more about WBCS, please visit www.wbcsouthwest.org.

Skip to content