Tip of the Week: Improving Some Cybersecurity Basics

November 21, 2018

contact us


REQUEST AN ASSESSMENT



What are your chances of being hacked, or targeted by some kind of cyberattack? I hate to tell you this, but they’re probably a lot higher than you might think.

For instance, despite almost 90 percent of small business owners believing they’re safe, about half of all small businesses will suffer from a catastrophic cyber-attack.

Are you at risk of being part of the unfortunate half?

Fortunately, there is a lot that you can do to help reduce the chances that a cyberattack will successfully target you. This is a really good thing – not only will a hack damage your relationships with everyone involved with your business, half of the businesses that are attacked close up shop within six months.

I’ve seen it happen far too often to businesses that just weren’t prepared.

Here, I’ve compiled a few tips to help you improve the basics of your cybersecurity, reducing your risk of a successful attack:

  • Updates – We know how annoying those update notifications can be, but it is important to remember that the vast majority of them are meant to improve security in one way, shape, or form. Therefore, you should prioritize these updates whenever possible. It may prevent an attack from victimizing you.
  • Involve Your Employees – The unfortunate reality is that your employees can be the biggest vulnerability your business has. Properly educating them in cybersecurity best practices and holding them to these standards will help reduce the chances that one of them will inadvertently let in a threat. Training them in various security best practices and explaining why certain requirements are in place will help to motivate them to participate for the company’s benefit.
  • Limit Access – On the other side of the coin, the less an employee has access to, the fewer chances there are that one of them leaves you vulnerable in some way. The same can be said of your clients – regardless of how much someone is trusted, you shouldn’t allow them privileges beyond their role. Whether its role-specific resources, data, or other information, employees should be given individual login credentials to make assigning privileges easier. Your business Wi-Fi should also remain separate from the Wi-Fi made available to clients.
  • Backup, Backup, and Backup Again – If, despite all your preparations, you are still infiltrated, you want to have an extra copy of all of your important data somewhere else, safe and sound. This backup copy would ideally be stored offsite and securely encrypted.

As it happens, CTN Solutions is able to help you out with all of these measures, and many more.

If you want some added help with these cybersecurity basics, or want to do more to protect your operations, you can always lean on us. CTN Solutions is committed to ensuring that your technology allows your business to operate better, improved security being a major part of that goal. Reach out by calling us at (610) 828- 5500.

CONTACT US


Contact Us

7 + 4 =

CTN Solutions

Address: 610 Sentry Pkwy, Blue Bell, PA 19422

Phone: (610) 828-5500

 

Skip to content