Is your small business secure? Better think again.

Small-to-medium sized businesses (SMB) assume because they are a small organization that hackers and cybercriminals will overlook them. This is an extremely bad thing to presume. Most SMB assume that have taken acceptable precautions to protect themselves.

Security is an issue for all businesses. The challenges faced by SMBs are unique and significant. While larger businesses have substantial resources to defend against security threats, all businesses face the same significant and constant risks. A large business can afford to dedicate staff security, or hire an outside firm, but SMBs (generally) cannot. The issue at hand is that SMBs rely on technology and networks as much as any business.

From worms, malware, viruses to trojan-horses there are countless ways a company can be compromised.

Here are some statistics released by Tech Republic that might surprise you.

66% of SMB depend on the Internet for day-to-day business
72% of known breaches are directed at SMB with 100 employees or less
61% of SMB do not use anti-virus on desktops
47% of SMB do not use any security on mail servers
77% of SMB do not have a written Internet security policy
56% of SMB do not have policies defining what websites are appropriate
63% of SMB do not have policies defining how employees use social media
60% of SMB will permanently close their doors after an intrusion becomes public.

What are hackers and cybercriminals after?

  1. Credit card numbers
  2. Login credentials
  3. Copyrighted materials
  4. Classified documents
  5. Medical records
  6. Bank account details
  7. Personal information
  8. System Information
  9. Sensitive company data
  10. Trade secrets

So what can a SMB do? Securing your technology, computers, servers and data can be intimidating. You cannot bury your head in the sand, doing so will only lead to major trouble and headaches.

First and foremost make sure every computer, including desktops, servers, tablets, smartphones and any other device that connects to your network and the internet have adequate anti-virus and it is up-to-date. Stick to the well-known AV companies like McAfee, Symantec or others. These companies have a threat team that works around the clock and follows the sun from time zone to time zone. Next make sure that each computer has a personal firewall installed and activated.  From this point I would advise you to contact your security consultant or specialist for a more detailed plan that is specific to your organization.

You need to understand that putting security in place does cost money and you should have this built into your budget or P&L. Discuss with your consultant what that number should like, each company will have different needs and therefore different budgets. If you are not sure where to start, fill out our free technical assessment found below and we can point you in the right direction.

I am interested in hearing what you have implemented in your organization and how you handle security. Please feel free to comment.

If you would like, we provide a Free Technical Assessment, this can be beneficial to new and startup companies that are not sure where to start. You can always find our cloud and hosted services in the right column of this page or by simply going to our website at Raven Cloud Computing

, , , , , , , , , , , , , , , ,

About Barry Bestpitch

Barry Bestpitch has helped a wide range of businesses launch, re-brand, and flourish. Barry has worked in various business development , marketing positions and executive staff positions, he is experienced in all media and in small and large scale marketing. He is strong at writing business plans and proposals as well as aiding with your funding search. Barry has acted as a coach and mentor to many business owners and executives.

View all posts by Barry Bestpitch


Subscribe to our RSS feed and social profiles to receive updates.

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: