Thinking like a Cyber Criminal: Strategies to Keep Small Businesses Secure
MUST-DO #3: Protect Your Passwords
Look to employ a strong employee password management policy to protect your company against attacks. Consider investing in a password manager and multifactor authentication solution to hold employees accountable in creating strong passwords and provide a secondary checkpoint when an employee needs to access sensitive data.
In addition, it is critical to change default passwords on devices with an IP address. Most devices when purchased use a default password that cyber criminals exploit. Therefore, it is essential to change these default passwords while installing any device with an IP address.
MUST-DO #4: Educate Your Users
Cyber criminals will attempt to abuse the trust of your end users in order to gain access to your network. Therefore, it is essential to establish and educate your end users on protocols that they should follow for requests involving passwords or sensitive data.
For example, a cyber criminal may attempt to abuse tax season by emailing an HR representative pretending to be someone else in the company who needs sensitive employee data to process a request. The cyber criminal will then process employee tax returns as their own. Companies can avoid falling victim to this type of attack by having protocols in place, such as checking with a manager, prior to sending confidential data.
Preventing cyber crime can be overwhelming for a small business. However, by taking time to familiarize yourself with the motivations and security must-dos, you can set your small business up to be much more secure.
If you’re interested in hearing Attila talk about this topic in depth and getting more advanced security tips, please watch our on-demand webinar here.
Rebecca Stone is a Product Marketing Manager at LogMeIn. Her work focuses on understanding the IT solution market, specifically remote monitoring and management software for internal IT and MSPs. She comes from a background in market research consulting and tech, and she’s passionate about exploring the future of IT solutions.
This guest blog is part of a Channel Futures sponsorship.
- Page 1
- Page 2