Small Businesses Do To Protect Themselves

Comments · 60 Views

Anyone in Connecticut with a computer and an internet connection is at risk of being a victim of cybercrime. When cybercriminals are thinking about their next attack, they’re looking for the easiest money.

When cybercriminals are thinking about their next attack, they’re looking for the easiest money. Individuals probably won’t pay up to get their stolen data back, and big corporations are well protected by full-time computer security people. Who does that leave as the most vulnerable? Small to medium businesses with no full time IT staff and who would be willing to pay to get their data back just to stay in business.

  • Provide a clear understanding of all the different ways cybercriminals will try to infiltrate your business – Malware, Phishing, Social Engineering
  • Teach best practices – passwords, email, physical access, how to work safely and securely
  • Test your knowledge through simulated scenarios
  • Hold employees accountable to do better when they don’t pass the test
  • Password best practices – why good passwords are important, common ways hackers exploit passwords, how to create strong memorable passwords
  • Email and browser security – how to spot suspect phishing emails, how to use browser protection, how to identify malware and viruses
  • How to avoid malicious downloads – protecting yourself through antivirus, and what to do if your system is compromised
  • Social engineering – what it is and how it works, and what questions to ask to protect yourself

A lot of the topics in Security Awareness Training bleed over into employees’ lives outside of work - passwords, social media, mobile devices. Giving them something they can use at home will help keep their attention.In general, people want to do the right thing, and don’t realize the impact of their bad cyber security habits. Explain how failing to keep good security practices can lead to hurting the company.

More info: Office 365 Migration Services

Comments