Small business cyber security is often overlooked, either due to a lack of expertise or funding. This is a mistake. Cyberattacks are costly to mitigate but potentially more costly to recover from after they occur. Managers can improve their small business’s cyber security by creating a security-conscious culture in the workplace.
There are two things cybercriminals want to steal from your employees: your organization’s data and its money. To get either of those things, usually all they have to do is invent a sufficiently persuasive con.
As a manager, your challenge is to increase the likelihood that, when confronted with, say, a phishing attempt or a fraud email, your employees will be able to recognize the attack and report it. The cost of data breaches and cybercrime is growing, and data protection regulations—from the GDPR to its possible US counterpart—now have more teeth.
Fortunately, there are simple ways to stay ahead of the cybercriminals. As a data security company, we are uniquely predisposed to having a culture of cyber security. Even so, we have instituted policies, conducted cyber security awareness training sessions, and implemented systems to reinforce this culture.
In this guide, we’ll share some of our tricks and best practices that we hope can help your organization as well.
Empower a cyber security officer and make a plan
As with most projects in any organization, the first step is to designate someone responsible for making sure the job gets done. This person could be from your IT staff, but which department they are from matters less than their willingness to learn about cyber security and hold team members accountable for completing training sessions and implementing digital safety practices. The first thing your cyber security officer should do is conduct a threat and risk assessment. It should include a detailed overview of:
Assets — Employee data, client credit cards, trade secrets, money, etc. List the things of value your company holds, where and how they’re stored, and who has access to them currently.
Threats — Hackers, disgruntled employees, competitors, cybercriminals, governments, etc. Be as inclusive and imaginative as possible. You’ll rank these threats later when assessing risks.
Vulnerabilities — Human error, unsecured communications, poor network security, unencrypted service providers, etc. Your past experiences, knowledge of your own systems, and existing research about data breaches can help you here.
Risk — Which teams are more susceptible to threats? Which assets are most valuable? This analysis will help you decide where to focus the most energy.
Countermeasures — Cyber security awareness training, end-to-end encryption, access controls, data minimization, etc. Based on the information you’ve already compiled above, you can determine how to mitigate risk.
Armed with a better understanding of the assets, threats, and vulnerabilities within your organization, you can begin implementing countermeasures.
Create a cyber security policy and use it regularly
Your small business’s cyber security policy should include basic guidelines that all employees must follow. We will go into more detail about cyber security policies in future articles, but this should include everything from recommendations about using secure web browsers, email safety tips, VPN requirements, anti-phishing best practices, password recommendations, and more.
As part of your employee onboarding process, everyone on your team should receive a copy. However, to maintain a culture of cyber security awareness, cyber security officers should regularly refer to this document and issue periodic reminders of its contents. Managers should talk about the cyber security policy, too, to emphasize its importance. Your cyber security policy isn’t just another boilerplate HR document. Understanding it and following it is part of everyone’s job.
Hold regular cyber security awareness training sessions
These training sessions should happen soon after a new employee starts and then be updated periodically. The training should emphasize the most important aspects of the
There are also third-party cyber security firms that can help you here. For instance, Sophos offers anti-phishing training simulations. Your cyber security officer should be tasked with researching and proposing a cost-benefit analysis for contracting outside security vendors.
Some teams or individuals may be more vulnerable to attack than others based on their specialty or level of access. Network administrators, managers, and anyone handling payroll or customer data may need additional training and attention.
Make certain things mandatory and be strict
There are a handful of cyber security practices that are so important and basic that they should be mandatory in your organization.
Use two-factor authentication (2FA) — Turning on 2FA for every account that offers it (whether it’s your company Slack or your employee’s ProtonMail account) can help prevent account takeover, which is a major problem for companies and a common source of data exposure.
Be alert for phishing — Phishing attacks use social engineering to entice users to click links, download attachments, or divulge login credentials in efforts to compromise their device or your network. Your employees should be trained to recognize common phishing strategies, to report suspicious emails to your small business’s cyber security team, and to always verify emails before clicking a link or responding.
Use strong passwords — It’s important to use strong passwords are less likely to be decrypted by hackers in a data breach. We have published information about how to choose a strong password for more details.
The most important thing to remember is that creating a workplace culture of
Entry-level employees are often an easy target for hackers and cybercriminals because they have less training and deal with less sensitive information. Yet the information they have in their accounts can be used to devise more damaging social engineering attacks. Junior employees with access to funds can also be more easily tricked into wiring money on behalf of a fake boss or paying bogus invoices.
The primary way to confront these threats is to ensure your employees are always on guard. If you demonstrate that cyber security is a priority in your organization, they will be.
The ProtonMail Team
You can get a free secure email account from ProtonMail here.
We also provide a free VPN service to protect your privacy.