Cyber crime is an epidemic. Cyber thieves prey particularly on small business because their computer, network and WiFi security measures are often vulnerable. IBM Chairman Ginni Rometty states – “We believe that data is the phenomenon of our time. It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true – even inevitable – then cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”
Yet computer, network, and WiFi security options are more cost effective than breach recovery. Listen to how you can protect your business from cyber thieves.
WHAT YOU’LL LEARN FROM BENSON WRIGHT, STRATEGIC NETWORKING CONSULTANT AT BRIGHTISYS.
HOW SECURE ARE OFFICES CONNECTED THROUGH WI-FI? (1:27 in)
In Benson’s words – These systems are low lying fruit for cyber criminals.
Tip – Determine whether your Wi-Fi network is open, connected to your server, and can be easily accessed by an unwanted outsider.
WHAT SHOULD BUSINESS DO TO MAKE THESE WI-FI NETWORKS MORE SECURE? (2:07 in)
In Benson’s words – Look at a new type of threat management solution that is comprehensive to your entire network, one that includes PCs, laptops and smartphones.
Tip – Look for a system that will do anti-virus scanning and malware scanning and be able to be customized to fit your business activity needs. These systems can protect remote as well as in house traffic.
DO COMPANIES DO ENOUGH TO EDUCATE EMPLOYEES ABOUT POTENTIAL HACKING THREATS FROM CYBER THIEVES? (5:59 in)
In Benson’s words – Most people don’t understand the level of sophistication of these threats.
Tip – Have a policy that requires periodic changing of passwords. Have an IT tech check the employee’s personal devices for anti-virus and malware software. Block certain categories of sites from access to your network.
SHOULD ALL BUSINESS BE MOVING DATA TO THE CLOUD? (9:10 in)
In Benson’s words – Businesses should have a cloud footprint somewhere, somehow at this point.
Tip – Double check that being in the cloud doesn’t compromise privacy regulations.
HOW SHOULD A COMPANY RESPOND TO A DATA BREACH? (10:28 in)
In Benson’s words – Make sure it is documented for HR (human relations) purposes. Then the authorities can be notified if necessary.
Tip – Be able to track logins, IP addresses, capture communication packets and isolate the cyber threat. Compare the cost of purchasing a unified threat management router with protection software to the hours of time and dollars that would have to be spent to restore a compromised network.
WHY DON’T MORE PEOPLE STEP UP TO PROTECT THEMSELVES? (14:53 in)
In Benson’s words – Most of it is the standard old – it’s not going to happen to me. People don’t know what to do.
Tip – Compare the cost of purchasing a unified threat management router with protection software to the hours of time and dollars that would have to be spent to restore a compromised network.