According to a report from Verizon, 58% of malware attack victims are categorized as small businesses. According to a report by Ponemon, cyber attacks cost small and medium-sized businesses an average of more than $2 million. Some small businesses don’t survive the negative impact of a security issue, either due to cost alone or damage to their reputation.
Cybersecurity is one of the biggest threats to small businesses. It’s no longer a question of if a small business will be subject to a cyber attack, but rather a question of when.
Conducting regular security audits can help reduce the risk of a crippling issue. Let’s take a look at what you should consider when conducting a security audit.
Know your risks
What security risks exist for your business, both routine and unexpected? This should include everything from malware to hackers to an employee who leaves their laptop or company-issued cell phone at a coffee shop or on a plane.
What are the internal threats? What are the external threats? What’s at stake if any of those threats were to occur? A company that stores social security numbers and dates of birth for all clients is going to have different areas of risk than one with a significant amount of intellectual property, but both areas of risk are important for those individual companies.
Document who can access what
During a security audit, it’s important to document the various permissions and levels of access that exist. Can every employee access every file on the server? What options do employees have for accessing work files remotely if they’re traveling or are at home sick for a few days? If something goes wrong on the network or an individual computer, who has access to fix it and minimize the threat?
Review your policies and procedures
What policies and procedures do you have in place for your employees as related to IT resources and security? If your employees do a lot of online research, they’re eventually going to encounter a hacked website or potential malware. What’s the protocol when they do?
What if they accidentally open an attachment from an unknown sender via email? How often are employees required to change their passwords? Can an employee access the internet through a free (unprotected) wifi network on their company computer? All of these potential risks should be addressed in your policies and procedures.
Prioritize your risks and your response
Based on the information you’ve gathered, prioritize how you’ll respond to reduce risk in key areas. Look at two areas: those that represent a significant risk for your business and those that are relatively easy to fix overall. You’ll certainly want to close any gaps that present a significant risk, but don’t overlook something that seems small but would be an easy fix.
Have an incidence response plan
What will you do when you experience an attack? Do you have a plan for recovering your IT systems and data from a breach? Do you have the resources to remediate the problems that allowed the breach? How will you communicate with partners, customers, and employees to restore confidence?
Protect your business with cybersecurity insurance
Does your business insurance adequately cover the potential loss of a cybersecurity attack? Has it been updated to the latest requirements of your insurer?
The world of cybersecurity is constantly changing, so it’s important to stay aware of evolving threats over time and adjust as needed. Investing in regular security audits can help, and it might save your business one day.
Subscribe to Email Updates
SubscribeGet Edmond Business news in your inbox.
About Davis Merrey
Davis, is Owner/CEO of TeamLogic IT of Oklahoma City, part of an international network of franchisees providing IT support for businesses. He brings many years of experience in a variety of technology related industries, leading teams in providing technical solutions that respond to critical customer needs. The company culture is defined by its Mission Statement: “To help our fellow employees and clients be successful”.
Davis earned a BS in Electrical Engineering from the Virginia Military Institute and an MBA in Management from Golden Gate University in San Francisco. He serves on several business related and non-profit boards of directors.