Practical Layers of Business Security

Most business owners don’t have time to deal with the nuance’s of cyber security. Seen below is the typical depiction of how security is managed in businesses today.

There’s an easier way of looking at this.

Sure there’s lots that goes into a fully secured business but it doesn’t need to be hard and its nearly free for small or one man operations. Here’s our steps in securing the digital assets of our customers:

Time needed: 2 hours.

Secure your businesses computers, mobile devices and servers. We suggest allotting 2 hours for this stage, but it can often take much less time to launch.

  1. Sign up for Antivirus if you haven’t already!

    Our recommendation is Webroot Antivirus

  2. Install Antivirus on ALL devices, and we mean all your businesses devices

    The great thing about Webroot is you can manage all your devices from one console. You can easily download and install on both your computer and phone, just login to the console and download the application

  3. Once installed, you can refresh your console in Webroot to see the health and status of all your devices

    It’s as easy as 1-2-3. Your now protected against some of the nastiest and most used malware, trojans and computer viruses out there!

Now comes the more tedious part of making your small business secure for you and your clients… And that’s passwords.

Our suggestion for managing your businesses passwords is to use a password manager. Either hosted in the cloud or hosted on a local machine, but for a first time user, we suggest using a cloud based solution like LastPass since it’s easy to setup and use across multiple devices, seamlessly.

  1. Create an account with a Password Management Tool
  2. The password manager will ask you to create a Master Password, this should be long and hard to guess. NOT “Password12345!” or anything that could be connected to your personal life (some hackers will use personal information about you to hack into accounts, like your dogs name or the street you live on)
  3. After you’ve created your account we suggest taking the initial tour of the application, to learn the basics on how it manages your passwords
  4. Add all your account passwords to the “Vault”
  5. Download the mobile app (for using on your phone)
  6. Add the browser extension to your favorite browser (Chrome, Firefox, Safari, Explorer)
  7. Use the password manager to update / generate more secure passwords for your existing accounts
  8. Done

Our final suggestion for peace of mind is to use a backup tool to backup all your businesses critical data. For this you can use a variety of options, purely based on your preference and needs. We’ve listed some options below on how we backup our customers data. What this protects against is a worst case scenario, lets say a hacker gets access to one of your passwords or devices and they steal your data, holding it for a ransom payment. We’ll in this worst case scenario, you don’t have to pay, you’re not at the whims of a hacker, YOU have a backup! All you have to do is clean up the hack (change passwords and remove malware), then download your backup and you’re back in business.

  • Google Drive (backup & sync
    • 15 gigabytes free and it has a history tool which lets you pick the version of the documents you’d like to recover
    • Upgraded storage is affordable
  • Dropbox
    • Good alternative to Google Drive
  • Amazon S3
    • Gives you more control over how your data is backed up, can add redundancies in the event of a corrupt or lost backup.
    • Pay for what you need and not a penny more.
  • Window Backup (requires either a local server or local drive to backup to)
    • Less reliable but can definitely get the job done if you have the storage capacity.

That’s it, if you follow the above precautions you’ll be much more secure than before and at the lowest cost possible which is necessary for startups and small businesses alike. If you’d like help with the above for your business, give us a call, we’d love to be of assistance!

Please comment if you have any additions you’d like us to add. Share if it was helpful!

Share:

Facebook
Twitter
Pinterest
LinkedIn
On Key

Related Posts

email security stats

Why Email Security Matters in 2022

Small firms need to take email security seriously. When it comes to cybersecurity, small businesses are often too cautious about their email security. They generally opt for consumer-grade security services that don’t offer the protection they need. Cybersecurity statistics show that small businesses are lucrative targets for cybercriminals. In fact, small firms account for 13

digital marketing content strategy

Content Strategy 2022-2025

In this article, we’ll talk about how you can use digital marketing and video production to generate leads for your business. Content Strategy Through Digital Marketing Digital marketing is a great way to get your message out to the public. It’s cost-effective and easy to implement, with many options available for businesses of all sizes.

airexplorer to s3

How to Backup Personal Data or Business Data in AWS S3 2022

If you need a solution to store data in the cloud, then have I got the solution for you. For the past year, I’ve used AirExplorer to manage and upload backups and files to the Amazon S3 cloud for safekeeping. In comparison to the other tools I’ve used, AirExplorer works the best for most personal

mailbird vs. outlook scaled

Outlook vs. Mailbird

Microsoft Outlook is outdated and a pain in the butt to get to work in everyday businesses. Besides printers, I spend way too much time diagnosing and “fixing” issues/bugs with outlook only for the same dang issue to happen two days later. Ost, pst files, and error logs oh my. Why do companies insist on

sticky notes on screen password manager compressed scaled e1654126169635

Why You NEED a password manager in 2022 more now than ever

For decades, passwords have been the gatekeepers of our data from others. In an ever-evolving world, 2FA (2-factor authentication) is becoming more prevalent by the day. As a member of the internet, you must protect yourself from malicious entities such as hackers, overseas governments, and even joe shmo down the hall. With the processing power