SlideShare a Scribd company logo
1 of 10
Download to read offline
TOP6THINGS
SMALLBUSINESSES
NEEDTOKNOWABOUT
CYBERSECURITY
There’s nothing “small” about the small business sector. According to
the U.S. Small Business Administration, the 23 million small businesses
in America account for 54% of all U.S. sales, provide 55% of all jobs,
and have created 66% of all net new jobs since the 1970s1
—not bad for
what the agency defines as “a business that is not dominant in its field.”
Although your data is critical to your success and you are integral to the
success of the U.S. economy, many startups and small businesses let
cybersecurity slip through the cracks. There is no shortage of negative
news stories about business data breaches and it isn’t just the large
corporations. “The U.S. Department of Homeland Security reports
31% of all cyberattacks are directed at businesses with less than 250
employees.”2
Small businesses often lack the budget, staff, and sophistication to
assemble strong defenses, making them an easy target where the
chances of thieves getting caught is much lower. No company is “too
small to be worthwhile” for the bad guys. Making sure your business
is adequately protected can seem like an overwhelming undertaking.
We’ve compiled a list of the top things startups and small businesses
need to know about cybersecurity and created this eBook to help you
get started.
1. Small Business Trends, SBA.gov, U.S. Small Business Administration
2. Daily World, Small businesses frequent targets of cyberattacks, February 2015
Cybercrime is a Big Problem
for Small Business
Cyberthreats to your business are usually blamed on outsiders, but
sometimes the threat actually originates from within. Within a small
business, employees are usually wearing many hats. More potential for
human error means more vulnerability to known, unknown and advanced
threats. It’s important to create a cybersecurity employee education plan
that includes the following:
•	 Explain the potential impact a cyberincident may have on business
operations and spell out specific rules for email, web browsing,
mobile devices and social networks.
•	 Have regular, focused sessions with employees to explore different
types of cyberattacks and test their security knowledge.
•	 Include cybersecurity training in onboarding activities for new
employees.
1 Educate employees as a
first line of defense
•	 Make training useful, relevant, and responsive to real world
examples.
•	 Train employees to recognize an attack and have policies in place
that assume you’ll be infiltrated. Communicate step-by-step
instructions about what to do in case of a cyberincident.
Since the list of “The 25 Most Popular Passwords of 2014” was widely
published, the fact that “123456” and “password” are still in the top
two slots is probably not wasted on cybercriminals.3
The White House
and others would suggest that the answer is to “kill the password,”4
but, in the meantime, there are simple steps to keep your
business safe:
•	 Use a unique password for each account
•	 Change passwords often
•	 Use a mix of letters, numbers and symbols
3. Gizmodo, The 25 Most Popular Passwords of 2014: We’re All Doomed, January 2015
4. The Hill, White House Goal: Kill the Password, February 2015.
•	 Avoid the use of personal information or common word as a
password
•	 Make sure your password backup options are up to date
•	 Keep your passwords complex and unique, and use a password
manager to keep them secure
•	 Select options for two-factor authentication, and require
security questions
2 Use strong passwords,
two-factor authentication,
and/or a password
manager
Securing IT infrastructure is often an afterthought for solo startups or
businesses with very few employees. But this is a mistake. According
to a report from the Ponemon Institute, more than half of U.S. small
businesses surveyed have experienced at least one data breach.5
But
when entrepreneurs decide to take steps to secure their new business,
too often they can’t afford to purchase and install multiple pieces of
complex software that are designed for much larger enterprises. Even if
they have the budget, they’ll struggle to properly utilize and manage it.
Small businesses should select software or select vendors that are well
known for providing intuitive, comprehensive security software to small
businesses in order to avoid the trap of paying too much for something
they will struggle to use. Starting with anti-malware software designed
for a small business is the best first move.
5. Ponemon Institute, 2013 Cost of Data Breach
3 Safeguard important
data (no matter how
small your business)
With almost everyone now utilizing smartphones and/or tablets, it
is inevitable that your corporate data will end up on a device that
can easily be lost or stolen. Furthermore, most mobile devices have
weak security, so it is incredibly easy for criminals to compromise
these devices and gain access to not only the data on the device, but
also your entire business network. With so many people dependent
on smartphones and tablets, it’s not surprising that the bad guys are
targeting these vulnerable devices and that mobile malware is on the
rise. For small businesses, mobile security and device management
capabilities should be highly considered when creating security for
your organization.
At the end of 2013, there were 200,000 unique mobile malware code
samples and a further 175,000 in the first half of 2014.6
Mobile security
is no longer optional for businesses that use their mobile devices
to conduct business. And, according to Constant Contact, of those
surveyed in March 2013, 66% report currently using a mobile device,
including smartphones and tablets, or a solution, like mobile-optimized
websites and text message marketing.7
6. B2B International & Kaspersky Lab, 2014 Global IT Risk Report, October 2014
7. Constant Contact, Inc., Constant Contact Mobile Technology Survey, 2013.
4 Protect mobile devices, too
It may seem like overkill at first, but as soon as you start processing and
storing payment or other confidential information of your customers,
encryption is vital. If an employee laptop gets stolen, unencrypted
customer information can lead to crippling fines from regulatory
agencies and, equally bad, a loss of trust from your customers.
Also, data encryption is actually a requirement once you start setting up
Point of Sale terminals (fancy language for cash registers) that accept
credit cards. If you plan on having a storefront—physical or online­—
you need to familiarize yourself with Payment Card Industry security
standards and the risks of violating these rules.
5 Think about encryption
Implementing a security solution that’s managed through a single
console makes sense, especially for small companies that may not have
dedicated IT security staff, much less an entire IT department. Because
complexity is the enemy of security, it’s critical that you choose
cyberprotection that allows you to set, deploy and monitor a single
policy across your entire IT infrastructure, including all devices, systems
and platforms. As a small business, you likely don’t have the expertise,
time or budget of a large enterprise, so finding a single solution that
meets your anti-malware, mobile security and encryption needs will
be much easier to manage than tying together multiple products from
different vendors. In short, look for one product that solves all of your
needs and allows you to focus on what you do best—running and
growing your business.
Install a multi-layered,
integrated security
solution
6
JOIN THE CONVERSATION.
Watch us on
YouTube
Like us on
Facebook
Review
our blog
Follow us
on Twitter
Join us on
LinkedIn
TRY KASPERSKY LAB
Discover how Kaspersky Lab’s premium security can
protect your business from malware and cybercrime with a
no-obligation trial. Register today to download full product
versions and evaluate how successfully they protect your IT
infrastructure, endpoints and confidential business data.
Get Your Free Trial Today
Learn more at
http://usa.kaspersky.com/business-security
ABOUT KASPERSKY LAB
Kaspersky Lab is one of the world’s fastest-growing cybersecurity companies
and the largest that is privately-owned. The company is ranked among the
world’s top four vendors of security solutions for endpoint users (IDC, 2014).
Since 1997, Kaspersky Lab has been an innovator in cybersecurity and provides
effective digital security solutions and threat intelligence for large enterprises,
SMBs and consumers. Kaspersky Lab is an international company, operating in
almost 200 countries and territories across the globe, providing protection for
over 400 million users worldwide. Learn more at www.kaspersky.com.
© 2015 AO Kaspersky Lab. All rights reserved. Registered
trademarks and service marks are the property of their
respective owners.
Contact Kaspersky Lab today to learn more about
Kaspersky Endpoint Security for Business and our
other IT security solutions and services:
http://usa.kaspersky.com/business-security
(866) 563-3099
corporatesales@kaspersky.com

More Related Content

What's hot

Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportJeremiah Grossman
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Andrew Manoske
 
Customer Centric Innovation in a World of Shiny Objects
Customer Centric Innovation in a World of Shiny ObjectsCustomer Centric Innovation in a World of Shiny Objects
Customer Centric Innovation in a World of Shiny ObjectsJoAnna Cheshire
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target Raleigh ISSA
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackImperva
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 

What's hot (20)

Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics Report
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Customer Centric Innovation in a World of Shiny Objects
Customer Centric Innovation in a World of Shiny ObjectsCustomer Centric Innovation in a World of Shiny Objects
Customer Centric Innovation in a World of Shiny Objects
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 

Viewers also liked

Audio Visual Pintrest Inspiration
Audio Visual Pintrest Inspiration Audio Visual Pintrest Inspiration
Audio Visual Pintrest Inspiration Maya Jearey
 
Abece reforma tributaria_2016
Abece reforma tributaria_2016Abece reforma tributaria_2016
Abece reforma tributaria_2016ERICA RODRIGUEZ
 
Anemia de la enfermedad crónica
Anemia de la enfermedad crónicaAnemia de la enfermedad crónica
Anemia de la enfermedad crónicaSARA CHONTAL
 
Sortides pels voltants de l'escola
Sortides pels voltants de l'escolaSortides pels voltants de l'escola
Sortides pels voltants de l'escolaNúria Rubio
 
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsCNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsSam Bowne
 
3Com 3C8844
3Com 3C88443Com 3C8844
3Com 3C8844savomir
 
Manual de capacitación para capacitadores
Manual de capacitación para capacitadoresManual de capacitación para capacitadores
Manual de capacitación para capacitadoresruthsita09
 
Jesbiangner J. Acosta M.
Jesbiangner J. Acosta M.Jesbiangner J. Acosta M.
Jesbiangner J. Acosta M.Javier Acosta
 
Type de toiture terrasse et étanchéité
Type de  toiture terrasse  et  étanchéitéType de  toiture terrasse  et  étanchéité
Type de toiture terrasse et étanchéitéILYES MHAMMEDIA
 
How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...
How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...
How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...Catherine Morido
 
Cartilla de acogida a la comunidad educativa para el reinicio de clases.
Cartilla de acogida a la comunidad educativa para el reinicio de clases.Cartilla de acogida a la comunidad educativa para el reinicio de clases.
Cartilla de acogida a la comunidad educativa para el reinicio de clases.Marly Rodriguez
 
TH3 Professional Developper CEH denial of service
TH3 Professional Developper CEH denial of serviceTH3 Professional Developper CEH denial of service
TH3 Professional Developper CEH denial of serviceth3prodevelopper
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingth3prodevelopper
 
TH3 Professional Developper CEH hacking email accounts
TH3 Professional Developper CEH hacking email accountsTH3 Professional Developper CEH hacking email accounts
TH3 Professional Developper CEH hacking email accountsth3prodevelopper
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Révision II - Introduction
Révision II - IntroductionRévision II - Introduction
Révision II - IntroductionPierrot Caron
 

Viewers also liked (20)

Audio Visual Pintrest Inspiration
Audio Visual Pintrest Inspiration Audio Visual Pintrest Inspiration
Audio Visual Pintrest Inspiration
 
Abece reforma tributaria_2016
Abece reforma tributaria_2016Abece reforma tributaria_2016
Abece reforma tributaria_2016
 
Anemia de la enfermedad crónica
Anemia de la enfermedad crónicaAnemia de la enfermedad crónica
Anemia de la enfermedad crónica
 
Sortides pels voltants de l'escola
Sortides pels voltants de l'escolaSortides pels voltants de l'escola
Sortides pels voltants de l'escola
 
CNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection MechanismsCNIT 127 14: Protection Mechanisms
CNIT 127 14: Protection Mechanisms
 
3Com 3C8844
3Com 3C88443Com 3C8844
3Com 3C8844
 
Manual de capacitación para capacitadores
Manual de capacitación para capacitadoresManual de capacitación para capacitadores
Manual de capacitación para capacitadores
 
Jesbiangner J. Acosta M.
Jesbiangner J. Acosta M.Jesbiangner J. Acosta M.
Jesbiangner J. Acosta M.
 
Type de toiture terrasse et étanchéité
Type de  toiture terrasse  et  étanchéitéType de  toiture terrasse  et  étanchéité
Type de toiture terrasse et étanchéité
 
How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...
How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...
How to Use Canva to Create Beautiful Graphic Images-CatherineMorido-theRockst...
 
Cartilla de acogida a la comunidad educativa para el reinicio de clases.
Cartilla de acogida a la comunidad educativa para el reinicio de clases.Cartilla de acogida a la comunidad educativa para el reinicio de clases.
Cartilla de acogida a la comunidad educativa para el reinicio de clases.
 
Portifolio
PortifolioPortifolio
Portifolio
 
Trabajos incluidos en el blog
Trabajos incluidos en el blogTrabajos incluidos en el blog
Trabajos incluidos en el blog
 
Mantenimiento de artefacto tecnológico
Mantenimiento de artefacto tecnológicoMantenimiento de artefacto tecnológico
Mantenimiento de artefacto tecnológico
 
TH3 Professional Developper CEH denial of service
TH3 Professional Developper CEH denial of serviceTH3 Professional Developper CEH denial of service
TH3 Professional Developper CEH denial of service
 
TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishing
 
TH3 Professional Developper CEH hacking email accounts
TH3 Professional Developper CEH hacking email accountsTH3 Professional Developper CEH hacking email accounts
TH3 Professional Developper CEH hacking email accounts
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Révision II - Introduction
Révision II - IntroductionRévision II - Introduction
Révision II - Introduction
 
1º Bachillerato: Doctrina social de la iglesia
1º Bachillerato: Doctrina social de la iglesia1º Bachillerato: Doctrina social de la iglesia
1º Bachillerato: Doctrina social de la iglesia
 

Similar to Top 6 things_small_businesses_q12015

Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
The Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceThe Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceAhad
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 

Similar to Top 6 things_small_businesses_q12015 (20)

Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
The Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceThe Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat Intelligence
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 

Recently uploaded

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 

Recently uploaded (20)

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 

Top 6 things_small_businesses_q12015

  • 2. There’s nothing “small” about the small business sector. According to the U.S. Small Business Administration, the 23 million small businesses in America account for 54% of all U.S. sales, provide 55% of all jobs, and have created 66% of all net new jobs since the 1970s1 —not bad for what the agency defines as “a business that is not dominant in its field.” Although your data is critical to your success and you are integral to the success of the U.S. economy, many startups and small businesses let cybersecurity slip through the cracks. There is no shortage of negative news stories about business data breaches and it isn’t just the large corporations. “The U.S. Department of Homeland Security reports 31% of all cyberattacks are directed at businesses with less than 250 employees.”2 Small businesses often lack the budget, staff, and sophistication to assemble strong defenses, making them an easy target where the chances of thieves getting caught is much lower. No company is “too small to be worthwhile” for the bad guys. Making sure your business is adequately protected can seem like an overwhelming undertaking. We’ve compiled a list of the top things startups and small businesses need to know about cybersecurity and created this eBook to help you get started. 1. Small Business Trends, SBA.gov, U.S. Small Business Administration 2. Daily World, Small businesses frequent targets of cyberattacks, February 2015 Cybercrime is a Big Problem for Small Business
  • 3. Cyberthreats to your business are usually blamed on outsiders, but sometimes the threat actually originates from within. Within a small business, employees are usually wearing many hats. More potential for human error means more vulnerability to known, unknown and advanced threats. It’s important to create a cybersecurity employee education plan that includes the following: • Explain the potential impact a cyberincident may have on business operations and spell out specific rules for email, web browsing, mobile devices and social networks. • Have regular, focused sessions with employees to explore different types of cyberattacks and test their security knowledge. • Include cybersecurity training in onboarding activities for new employees. 1 Educate employees as a first line of defense • Make training useful, relevant, and responsive to real world examples. • Train employees to recognize an attack and have policies in place that assume you’ll be infiltrated. Communicate step-by-step instructions about what to do in case of a cyberincident.
  • 4. Since the list of “The 25 Most Popular Passwords of 2014” was widely published, the fact that “123456” and “password” are still in the top two slots is probably not wasted on cybercriminals.3 The White House and others would suggest that the answer is to “kill the password,”4 but, in the meantime, there are simple steps to keep your business safe: • Use a unique password for each account • Change passwords often • Use a mix of letters, numbers and symbols 3. Gizmodo, The 25 Most Popular Passwords of 2014: We’re All Doomed, January 2015 4. The Hill, White House Goal: Kill the Password, February 2015. • Avoid the use of personal information or common word as a password • Make sure your password backup options are up to date • Keep your passwords complex and unique, and use a password manager to keep them secure • Select options for two-factor authentication, and require security questions 2 Use strong passwords, two-factor authentication, and/or a password manager
  • 5. Securing IT infrastructure is often an afterthought for solo startups or businesses with very few employees. But this is a mistake. According to a report from the Ponemon Institute, more than half of U.S. small businesses surveyed have experienced at least one data breach.5 But when entrepreneurs decide to take steps to secure their new business, too often they can’t afford to purchase and install multiple pieces of complex software that are designed for much larger enterprises. Even if they have the budget, they’ll struggle to properly utilize and manage it. Small businesses should select software or select vendors that are well known for providing intuitive, comprehensive security software to small businesses in order to avoid the trap of paying too much for something they will struggle to use. Starting with anti-malware software designed for a small business is the best first move. 5. Ponemon Institute, 2013 Cost of Data Breach 3 Safeguard important data (no matter how small your business)
  • 6. With almost everyone now utilizing smartphones and/or tablets, it is inevitable that your corporate data will end up on a device that can easily be lost or stolen. Furthermore, most mobile devices have weak security, so it is incredibly easy for criminals to compromise these devices and gain access to not only the data on the device, but also your entire business network. With so many people dependent on smartphones and tablets, it’s not surprising that the bad guys are targeting these vulnerable devices and that mobile malware is on the rise. For small businesses, mobile security and device management capabilities should be highly considered when creating security for your organization. At the end of 2013, there were 200,000 unique mobile malware code samples and a further 175,000 in the first half of 2014.6 Mobile security is no longer optional for businesses that use their mobile devices to conduct business. And, according to Constant Contact, of those surveyed in March 2013, 66% report currently using a mobile device, including smartphones and tablets, or a solution, like mobile-optimized websites and text message marketing.7 6. B2B International & Kaspersky Lab, 2014 Global IT Risk Report, October 2014 7. Constant Contact, Inc., Constant Contact Mobile Technology Survey, 2013. 4 Protect mobile devices, too
  • 7. It may seem like overkill at first, but as soon as you start processing and storing payment or other confidential information of your customers, encryption is vital. If an employee laptop gets stolen, unencrypted customer information can lead to crippling fines from regulatory agencies and, equally bad, a loss of trust from your customers. Also, data encryption is actually a requirement once you start setting up Point of Sale terminals (fancy language for cash registers) that accept credit cards. If you plan on having a storefront—physical or online­— you need to familiarize yourself with Payment Card Industry security standards and the risks of violating these rules. 5 Think about encryption
  • 8. Implementing a security solution that’s managed through a single console makes sense, especially for small companies that may not have dedicated IT security staff, much less an entire IT department. Because complexity is the enemy of security, it’s critical that you choose cyberprotection that allows you to set, deploy and monitor a single policy across your entire IT infrastructure, including all devices, systems and platforms. As a small business, you likely don’t have the expertise, time or budget of a large enterprise, so finding a single solution that meets your anti-malware, mobile security and encryption needs will be much easier to manage than tying together multiple products from different vendors. In short, look for one product that solves all of your needs and allows you to focus on what you do best—running and growing your business. Install a multi-layered, integrated security solution 6
  • 9. JOIN THE CONVERSATION. Watch us on YouTube Like us on Facebook Review our blog Follow us on Twitter Join us on LinkedIn TRY KASPERSKY LAB Discover how Kaspersky Lab’s premium security can protect your business from malware and cybercrime with a no-obligation trial. Register today to download full product versions and evaluate how successfully they protect your IT infrastructure, endpoints and confidential business data. Get Your Free Trial Today Learn more at http://usa.kaspersky.com/business-security
  • 10. ABOUT KASPERSKY LAB Kaspersky Lab is one of the world’s fastest-growing cybersecurity companies and the largest that is privately-owned. The company is ranked among the world’s top four vendors of security solutions for endpoint users (IDC, 2014). Since 1997, Kaspersky Lab has been an innovator in cybersecurity and provides effective digital security solutions and threat intelligence for large enterprises, SMBs and consumers. Kaspersky Lab is an international company, operating in almost 200 countries and territories across the globe, providing protection for over 400 million users worldwide. Learn more at www.kaspersky.com. © 2015 AO Kaspersky Lab. All rights reserved. Registered trademarks and service marks are the property of their respective owners. Contact Kaspersky Lab today to learn more about Kaspersky Endpoint Security for Business and our other IT security solutions and services: http://usa.kaspersky.com/business-security (866) 563-3099 corporatesales@kaspersky.com