Blog Layout

How to Protect Your Small Business from Cyberattacks

Gordon Povey • Mar 09, 2020
Picture Credit : Pixabay

This is a guest post by Clara Ellington from  Broadbandsearch.net. The views and opinions expressed by the author do not necessarily reflect those of Trisent or its staff.

Did you know that as a small business owner, you are one of the primary targets for cyberattacks? Cybercriminals are everywhere, and there are more and more ways in which they can prey on you.

We all have vulnerabilities, and we can all be victims, but that doesn’t mean that we should just lay in waiting. There are things you can do to protect yourself and your business. Here are a few tips on how you can ward against cyberattacks.

Internet connection

Do this: Your internet connection should always be trustworthy. When you’re at the office or in the comfort of your own home, you’re probably connected to your own network. On the go and in public places, however, you rely on Wi-Fi.

Always make sure to connect to networks that are trusted and password protected. If you do not have access to protected networks in places like coffee shops or airports, ask an employee for the password. That way, you make sure that any information you are exchanging is completely secure.

In absence of access to a secure network, use your phone to create a hotspot with the data on your device. It’s expensive, but it’s worth the protection.

Not that: You will be tempted to connect to random open Wi-Fi networks that are not password protected. That could be a massive mistake. You see, anyone can connect and gain access to the information you are sending via this channel.

Important information such as passwords and personal data can be intercepted and used for nefarious purposes, such as theft, impersonation, blackmail, etc. It seems very convenient to just connect to the free airport Wi-Fi, but this can be the precise moment when someone takes advantage of your vulnerability and steals valuable company info.

Websites

Do this: Thankfully, Google does some of the heavy lifting for you and clearly flags trustworthy websites and risky ones. Google gives priority ranking to websites that are safe and SSL-protected.

You can recognize secure sites, because they will typically have a padlock on the left-hand side of the search bar. That will indicate that you can trust this site, that it’s encrypted, and that any information you share will be in safe hands.

Not only that, but you can rest assured that you won’t pick up any weird malware or trojans while you’re browsing and clicking away.


Not that: On the opposite end of the spectrum, a red, crossed out padlock indicates a website that is not properly secured. Google cannot ensure your safety when navigating to this page and will issue advertisements about the potential risks.

If you do venture onto pages like this, you do so at your own risk. It’s not indicated to ever access this kind of page, much less provide them with information about yourself, your clients, or your business. Every click or download can be suspicious, so it’s best to refrain and look for a more trustworthy source.

Passwords

Do this: You probably know by now that passwords are becoming easier and easier to crack, so you need to really reinforce them. That means that you have to get serious about setting strong passwords. Here are some tips:

  • Pick a password that does not make any logical sense. It should be a combination of random characters, including both uppercase and lowercase letters, numbers, and special symbols.
  • Pick a unique password. It must not be a password that you’ve already had, that you set for another account, or that someone else has.
  • When it comes to answers to secret questions, don’t make the answers straight-forward. That makes it easy for other people to guess or find out. Instead, make up completely off-the-wall, random answers. For example: Q: What is your mother’s maiden name? A: Dinosaur.


Not that: Stay away from the passwords that are easy to guess, find out, or hack. Here’s what you should be avoiding:

  • Don’t choose 1234567, “guest”, “password”, and other basic, easy to guess passwords. It’s like not having a password at all.
  • Avoid easy to guess information. Don’t make your password your name, your kids’ names, your spouse’s birthday, your pet’s name, etc.
  • Don’t tell anyone your password, and don’t write it down. Yes, it’s harder to remember that way, but you also run less of a risk of having a security breach.

Devices

Do this: We’re using so many different devices for work nowadays, and it’s super important to protect them all. There are some good practices that you should be using to make sure that you are not experiencing any loss of data.

  • Password-protect your devices – all of your work devices should be protected with passwords or even more advanced security measures, such as fingerprint scan or facial recognition.
  • Do not share devices – your work devices should be yours and no one else’s. Granting access to anyone else can mean compromising important data.
  • Do not use the same devices for work and play – it seems easier to just use the same phone and laptop for all of your personal and work endeavors, but that actually makes it more likely that you will slip up and compromise data.


Not that: Sometimes, working in public places like coffee shops and such is unavoidable. What is avoidable, however, is leaving your devices on the table while you go to the bathroom or out to take a call or a smoke break. The same goes even if you’re working in an office, or at home.

It’s not just about strangers breaking into your work computer, but about co-workers mistakenly seeing something they shouldn’t, or kids playing on your laptop and inadvertently deleting something important, etc.

Sensitive data

Do this: Okay, but what do you do when it comes to data storage? Especially when you’re dealing with sensitive information, or client data, you need to find a way to store this info as securely as possible. While keeping information on an external hard drive (especially if it’s encrypted) or on a USB stick is adequate enough, cloud storage is the safest solution.

Cloud storage allows you to keep information outside your office or your own devices, so you don’t need the physical space. It’s the most secure storage solution. It’s easy to set up: you just need to pay for the service and upload your files and voila – they are perfectly secure.


Not that: Whatever you do, do not keep this type of data on your hard drive. You’ll also not want to keep physical files in your office, or CDs lying around. Basically, any type of medium that can become easily compromised or stolen is a bad idea.

If you do have data that you store on CDs, for example, be sure to upgrade this storage solution as soon as possible. CDs are known to deteriorate after a certain amount of time, especially if the storage conditions are improper (for example, exposed to sunlight).

Final thoughts

As a small business owner, you must be on the lookout for cyberattacks. Small businesses are less likely to have proper security set in place, so cybercriminals take advantage of that and try to hack into your system and wreak havoc. But that doesn’t mean you can’t protect yourself. There are lots of ways to minimize the risks and fend off prying eyes. A lot of it is a matter of exercising safety practices and learning to protect your devices, your information, and the way you go about working, both remotely and at the office.

by Gordon Povey 12 Mar, 2020
Better Internet Search Ltd has a license to use the 1-timeline technology developed by Trisent. They have just announced that the second alpha version of their alternative search engine is to be launched on 18th March. This version includes general web searches plus news, images, video, maps and shopping. The development has been supported by […] The post Better Internet Search – Alpha 2 appeared first on Trisent.
by Gordon Povey 09 Mar, 2020
Did you know that as a small business owner, you are one of the primary targets for cyberattacks? Cybercriminals are everywhere, and there are more and more ways in which they can prey on you. We all have vulnerabilities, and we can all be victims, but that doesn’t mean that we should just lay in […] The post How to Protect Your Small Business from Cyberattacks appeared first on Trisent.
by Gordon Povey 04 Oct, 2019
New start-up company, Better Internet Search Ltd, is revealed through an article in the Herald. The new company is based on technology developed by Trisent Ltd. The post Better Internet Search Ltd is announced. appeared first on Trisent.
by Gordon Povey 06 Sept, 2019
Trisent is looking for talented software developers to join and exciting project. A full-stack developer is needed immediately and they are also looking for skills in a number of other areas too. The post Hiring Software Developers Now appeared first on Trisent.
by Gordon Povey 25 Jul, 2019
Currently, the predominant business model for commercial search engines is advertising. The goals of the advertising business model do not always correspond to providing quality search to users The post Search engine bias is particularly insidious appeared first on Trisent.
by Gordon Povey 01 Mar, 2019
TRISENT is strengthening its collaboration with Edinburgh Napier University through two student projects supported by the Erasmus Programme. Two final-year students from Spain are coming to Edinburgh in March as part of the European Erasmus Programme. They will both be working with Trisent Ltd and Edinburgh Napier University on Proof-of-Concept projects which demonstrate the benefits that […] The post Trisent is to benefit from the European Erasmus Programme appeared first on Trisent.
by Gordon Povey 05 Feb, 2019
This is a guest blog post by Jack Warner of TechWarn. The French government bids farewell to Google and adopts Qwant. At the end of last year, the French National Assembly announced that they are not going to use Google anymore. All the devices belonging to the French government will adopt a new search engine […] The post Goodbye Google, Hello Qwant! appeared first on Trisent.
by Gordon Povey 19 Dec, 2018
Blockchain and smart contracts cannot be inherently trusted – they must establish trust in the architects, the coders the participants, and anyone involved in the implementation and operation of the system. However, the transparency and consensus mechanisms built into the technology are a significant aid to building that trust. The post Can blockchain solve the problem of trust? appeared first on Trisent.
by Gordon Povey 29 Nov, 2018
In 1998 a colleague introduced me to the Google search engine and as a result I made the shift from my previously preferred search engine, Alta Vista, to Google. Twenty years on, despite trying many others, I still use Google regularly. I was delighted by the Google experience 20 years ago, but today I dislike Google search for several reasons. However, I have yet to find a noticeably better alternative. The post When will Google’s search engine monopoly be broken? appeared first on Trisent.
by Gordon Povey 01 Oct, 2018
For those not familiar with the ‘Filter Bubble’, the term was coined by Internet activist Eli Pariser around 2010 and refers to a state of intellectual isolation resulting from personalisation applied to the delivery of web content. The suggestion is that users become separated from information that disagrees with their viewpoints. This effectively isolates individuals within their […] The post Avoiding the Filter Bubble appeared first on Trisent.
More posts
Share by: