Tips for Avoiding Cyber Crime
- Author Dawn Brister
- Published August 8, 2010
- Word count 1,193
Editor's note: One-third of all data breaches occur in small businesses: the following piece provides excellent tips for protecting your small business. It was written by freelancer Jason Turbow for BizWise, the monthly Cisco newsletter for business owners.
In January, a credit card payment-processing company found malicious software on its network. It had compromised the private customer information held by more than 200 financial institutions. A month before that, a U.S. payment processor suffered cyber attacks on its ATM records that affected 1.1 million people and resulted in $9 million in customer losses. A cyber-crime battle has broken out across business networks nationwide, and it's not just enterprises in the line of fire. A study by Verizon Communications released in April found that one third of all 2008 data breaches came at the expense of businesses with 100 employees or less. The scale of these breaches might not compare with those at their enterprise counterparts, but for small businesses, the sting of malware, botnets and Trojan horses can be just as sharp.
"A small business' attention to customers has to remain paramount," says John N. Stewart, vice president and chief security officer at Cisco. "Security aimed at protecting your customers' information - as well as your own - must be an integral part of how you operate."
Even as threats grow more exotic, small business owners can take some basic steps to reduce the risk of falling victim.
Step 1: Treat Your Business Like a Business
For many small businesses without dedicated IT personnel, the answer to technological needs is often a trip to the local retail store for an easily deployed piece of hardware. This saves on installation hassles, but it can also open up sensitive information to outside intruders. As a whole, built-in security features on devices designed for home use don't come close to those made for even the smallest businesses.
"You can still walk into many small businesses and see an entry-level device that's fine for a home, but totally insufficient for a business entity," says Ryan Halper, president of Cynnex Networks, a technology-support company in Seattle. "You need to go one step beyond that if you have any type of business-critical, sensitive information to protect."
Even business-class hardware that doesn't provide security as a primary function - routers, for example - can provide important layers of protection when it comes to securing a network.
Step 2: Protect the Perimeter
An effective firewall essentially serves as a virtual barrier between your network and the outside world. "Firewall protection should be obvious, but with many of our small business customers we see less than what we consider to be minimum perimeter security," says Cynnex's Halper.
Even entry-level business-class firewalls provide essential security features such as packet inspection (to verify every piece of data that passes through them) and intrusion protection. Firewalls can also function on a "white-list" basis, allowing nothing but data from approved domains to enter the network. This is especially important when it comes to the subset of malware-infected sites and e-mail attempting to pass itself off as having come from a legitimate organization. "It doesn't matter what it looks like, it matters what it is," says Stewart, the Cisco chief security officer.
Step 3: Stay Updated
The people who create malware are both smart and relentless. Should new security technology effectively block their efforts, they simply adjust their tactics until they're able to avoid the existing traps. For an example, look no farther than spam. Just a couple years ago junk e-mail was among the top security issues facing business networks, until a spate of anti-spam vendors stepped in and eradicated much of the risk. Problem solved? Not quite. Spammers got more creative, and soon the anti-spam contingent was once again scrambling to keep up.
"I just need to look at my in-box for confirmation of this," says Charles Kolodgy, research director of security products for market research and analysis firm IDC. "I'll get a lot of items that should have been filtered, then three to five days later, my e-mail will go back to normal as the anti-spam programs figure out what this spam is doing and either block or quarantine it."
"If the company whose security measure you're using says there is a new version, you have to get it, evaluate it, and ideally, deploy it," says Stewart. "You absolutely have to keep your security posture current."
Step 4: Pay Attention
Botnets - collections of malware-infected machines that can be unwittingly controlled by a third party for nefarious activities such as mass spamming - are especially dangerous because there's often little tactile evidence they're even present. The best botnets work in the background, offering slightly slower processor speed as the primary clue to their activity.
"You really have to look at your logs, which is something small businesses aren't usually doing," says Kolodgy. "See what communications are going on. Look at network traffic going to strange IP addresses at various times during the day - places that a business might have no reason to contact, like Russia or China."
Numerous security companies have placed defense against botnets among their priorities, making updated anti-virus subscriptions and software patches all the more vital.
Step 5: Protect Yourself from the Inside
In January, a study from Purdue's Krannert School of Management quoted 46 percent of the American companies it surveyed saying that "laid-off employees are the biggest threat caused by the economic downturn." A prime example of this happened last year when Terry Childs, a disgruntled network administrator for the city of San Francisco, sat in jail for five days while refusing to divulge the passwords he used to effectively lock the government out of its own municipal data. Most small businesses don't have an employee with the same combination of knowhow and ill intentions, but that hardly grants them immunity from the problem. Cynnex's Halper recommends that companies employ a containment strategy, allowing employees to access only the portions of the network necessary to their duties. Similarly, network privileges can limit the types of tasks that can be executed from a given workstation, eliminating many options for those who seek to do something outside the scope of their regular job duties.
But it isn't just disgruntled employees who may create security breaches; employees who don't know how to properly protect assets can also pose a risk.
"The blending of work vs. home and public vs. private means that data can be accessed, transmitted, stored and stolen from anywhere at any time," said Stewart. "As a result, the approach to data protection must change."
That means businesses must foster a security-aware culture in which protecting data is a normal and natural part of every employee's job, providing the tools and education that employees need to keep their businesses secure.
"Everyone in the company has to understand why they're protecting what they're protecting," says Stewart. "It's one thing to tell everyone to lock the door on the way out, but they really have to understand why they're locking the door. They need to know that if we lose this data, it's business-impacting and possibly business-threatening. We must understand that we're not just protecting our customers - we're protecting ourselves."
Dawn Brister, Editorial Director of Cisco Innovators Forum, and her team of guest bloggers interviews experts, entrepreneurs and authors on how to run a small business better. To learn more about small business best practices and the technologies behind them, visit www.CiscoInnovators.com.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Using toe straighteners for foot problems
- Safety, Lifespan, And Performance: Key Considerations For Lithium Battery Use
- Antique Carved Doors and the Earthy Stillness of a Mountain Cabin
- Antique Indian Carved Doors for Home Yoga Studios: The Botanical Door Guide
- How Hotels Spec Carpet for Guest Rooms, Corridors, and Public Spaces
- Wool Carpet Pros and Cons: What Homeowners Should Know Before Buying
- What to Know Before Buying Wool Carpet for Your Home
- How to Choose the Right COREtec Floor for Busy Homes
- Getting Around Sydney Without Losing Your Mind: Why Some Visitors Are Quietly Switching to Chauffeur Cars
- Organic Maximalism: The Art of Botanical Carving in Antique Doors and Sunray Sideboards
- Barndominiums in 2026: Costs, Features, Trends & Real-World Examples
- Earthing the Body, Calming the Mind: Natural Wood and Tree of Life Yoga Spaces
- Why is a diesel mechanic certification crucial for your career
- The Financial Benefits Of AI-Driven POS Systems For Restaurants And Hotels
- In the Dark: The Bomb and the Plainness of Harry Truman.
- Simple. Fast. Stress-Free Modelo 210 Filing for Non-Residents in Spain
- Expert Drain Cleaning Services in Houston: Keep Your Pipes Flowing Smoothly
- Team Romines’ 2026 Essential Guide for First-Time Homebuyers
- The Plastic Paradox: Why The World’s Most Useful Material Is Also Its Most Controversial
- A Dramatic Kitchen Renovation Where Artistry in Wood Steals the Show
- The Unspoken Language of the Nikah Wear
- Why Most Vacuum Filters Fail Too Early — And How to Prevent It
- Bd Government Job Circular
- Understanding Ketamine and Ketamine Powder: Uses, Risks, and Current Research
- Elevate Your Yoga Studio with Hand-Carved Indian Doors
- Why Choose Certified Foot & Ankle Specialists for Your Foot and Ankle Needs
- casual dresses for women
- Lehngas for women
- How HCM Software Improves Employee Performance and Engagement
- From Fat to Fit: A Complete Weight Loss Roadmap