{"id":1079,"date":"2020-06-17T12:51:00","date_gmt":"2020-06-17T12:51:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1079"},"modified":"2020-11-20T19:22:46","modified_gmt":"2020-11-20T19:22:46","slug":"smbs-10-cyber-security-tips-that-make-you-a-tougher-target","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/","title":{"rendered":"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">From data security to automation, we\u2019ve got the scoop from 14 cybersecurity and small business experts on the 10 steps to cyber security that you can implement for your small to midsize business<\/h2>\n\n\n\n<p>Although SMBs are commonly the targets of various types of cyber attacks, they typically lack the budget, personnel and technical expertise that enterprises have available to defend against such attacks. That\u2019s why we\u2019ve decided to put together a list of the best cyber security tips for small businesses possible for 2020.<\/p>\n\n\n\n<p>Workplaces are changing, and even employees at small businesses are now working from home as a result of the COVID-19 pandemic. So, in addition to the \u201cusual\u201d threats that SMBs face on a daily basis, now they also must contend with additional threats that stem from remote work environments.<\/p>\n\n\n\n<p>Whether you want to consider these suggestions as 10 steps to better cyber security or something else, the point here is that this list of IT and cyber security tips are those that small and midsize businesses like yours can perform that will still make you a tougher target for cybercriminals. These tips come from 14 IT and cybersecurity experts from around the world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">10 Steps to Cyber Security: The Best Cyber Security Tips That You Can Implement Now<\/h2>\n\n\n\n<p>When you look for cyber and IT security tips for small businesses, you\u2019re likely looking for cost-effective solutions and processes that you can implement without an entire team of IT pros (and without breaking the bank). That\u2019s likely because you don\u2019t have a massive budget like enterprises and other large organizations. So, is this a hopeless cause?<\/p>\n\n\n\n<p>Of course not. There are several ways that you can make every cent of your cybersecurity budget count while alleviating stress for your IT staff. Here are the 10 steps to cyber security that you can implement immediately to make your small or mid-size business more secure:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #1: Secure Your Data and Communications<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/secure-communications-and-data.png\" alt=\"\" class=\"wp-image-1080\" width=\"272\" height=\"176\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/secure-communications-and-data.png 736w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/secure-communications-and-data-300x195.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/secure-communications-and-data-560x364.png 560w\" sizes=\"auto, (max-width: 272px) 100vw, 272px\" \/><figcaption>Securing data and communications is essential to the health and success of any small or midsize business.<\/figcaption><\/figure><\/div>\n\n\n\n<p>One of the most important cyber security <a href=\"https:\/\/sectigostore.com\/blog\/how-to-protect-your-phone-from-hackers\/\">tips we can offer is to protect your data<\/a> at all costs. Your data includes everything from sensitive customer information (PII and financial info alike) to proprietary information like intellectual property and product pricing information. You know, the kind of data that you\u2019d <em>never<\/em> want to see fall into the hands of your competitors or cybercriminals.<\/p>\n\n\n\n<p>Dr. Al Marcella, president of <a href=\"https:\/\/audit4security.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Automation Consultants, LLC<\/a>, and an IT consultant with 38 years of experience in cybersecurity, risk management and risk mitigation. He says that using cryptographic tools and protocols is a must for small businesses:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cImplement and consistently use strong encryption protocols on all organization sensitive, critical and essential data as well as associated, operational infrastructure. This includes desktops, laptops, tablets, smartphones, removable drives, backup tapes, and cloud storage solutions.\u201d<\/em> <\/p><cite><strong>\u2014 Dr. Al Marcella, president of Business Automation Consultants, LLC<\/strong><\/cite><\/blockquote>\n\n\n\n<p>Basically, data encryption helps you to secure your data no matter whether it\u2019s at rest (sitting on a server somewhere) and in transit (transmitting between two endpoints):<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Use the HTTPS protocol to secure in-transit data that\u2019s sent to your website.<\/strong> Since data transmits between a user\u2019s browser (client) and your website (server) in plaintext \u2014 meaning that it\u2019s readable to those who know how to look \u2014 it means that you must protect the transmission channel. Installing an <a href=\"https:\/\/sectigostore.com\/ssl-certificates\">SSL\/TLS certificate<\/a> on your web server helps you to secure the data that transfers between web client and your website. It does this by creating a secure, encrypted channel between the two devices that prevents cybercriminals from \u201creading\u201d or otherwise accessing that information.<\/li><li><strong>Use encryption to secure at-rest data while it sits on your server.<\/strong> Whether you\u2019re looking to secure data that sits on your email server or in cloud storage, it\u2019s essential that you encrypt it before sending or uploading it. This way, if a bad guy somehow gets access to your accounts and steals your files, they won\u2019t be able to read or access the data without a digital key.<\/li><\/ul>\n\n\n\n<p>You may be surprised to learn that using encryption isn\u2019t as complicated as it may seem. You don\u2019t have to calculate any complex mathematical equations or perform any complicated processes \u2014 you simply install some digital certificates (either on your web server or your email client), make a few selections, and you\u2019re set. The digital certificates handle the rest for you.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #2: Make Remote Access as Secure (and Easy) as Possible for Users<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"818\" height=\"402\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-use-vpn.png\" alt=\"\" class=\"wp-image-1082 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-use-vpn.png 818w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-use-vpn-300x147.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-use-vpn-560x275.png 560w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><figcaption>Make the use of a virtual private network mandatory for all of your employees.<\/figcaption><\/figure><\/div>\n\n\n\n<p>As you\u2019ll see, some of these cyber security tips are especially important during the ongoing Coronavirus pandemic in particular. With employers reporting that more than half of their workforces (53%) of full-time employees are working remotely due to COVID-19, according to a survey from <a href=\"https:\/\/www.willistowerswatson.com\/en-US\/News\/2020\/05\/three-in-four-employers-adjust-workplaces-in-response-to-covid-19-wtw-survey-finds\" target=\"_blank\" rel=\"noreferrer noopener\">Willis Towers Watson<\/a>, the need for secure remote access has never been more important. This is where strong <a href=\"https:\/\/sectigostore.com\/blog\/12-network-security-best-practices-to-secure-your-business\/\">network security and authentication measures<\/a> can really shine.<\/p>\n\n\n\n<p>This means that to keep your business safe and its data secure, you need to take steps to mitigate risks and eliminate any remote connection vulnerabilities. But the tricky part is doing so without making it overly complicated for your users. If you make the security processes or tools too challenging or frustrating for users, they\u2019ll be resistant to using them.<\/p>\n\n\n\n<p>A good place to start is to remind your employees to change their personal Wi-Fi passwords. People frequently use the default passwords that are set by their internet service providers (ISPs), which gives cybercriminals an easy avenue of attack. Limit the number of users who can access remote desktop. Also, make sure that their computers and devices are up to date and don\u2019t allow anyone to directly connect to your network without the use of a VPN.<\/p>\n\n\n\n<p>Jacob Ansari, Senior Manager of <a href=\"https:\/\/www.schellman.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Schellman &amp; Company, LLC<\/a>, a global independent security and privacy compliance assessor, says that there are several other ways you can make remote connections more secure:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cIdentify all of your remote access mechanisms, like VPNs, RDP, and maybe old-school stuff left floating around like VNC. Disable anything you don&#8217;t need. Set up multi-factor authentication for those that you do. Make use of MFA services like Duo or Google Authenticator or Auth0, which have low- or no-cost options for small numbers of users. Disable user accounts that aren&#8217;t used. If you rely on third parties for IT support, make sure they have to follow the same rules.\u201d<\/em> <\/p><cite><strong>\u2014 Jacob Ansari, senior manager of Schellman &amp; Company, LLC.<\/strong><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #3: Use Authentication Tools to Prove Your Identity<\/h3>\n\n\n\n<p>To kick off the third item on our list of IT and cyber security tips, let\u2019s take a moment to recognize how important a small business\u2019s identity and reputation are integral to its success. Much like with situations of personal identity theft, if your business\u2019s identity is compromised, it can deal a devastating blow. If a criminal is doing business in your name and the trust that customers place in your business is breached, you\u2019ve got a long road ahead to recovery. (That is, if your business recovers at all.)<\/p>\n\n\n\n<p>Cybercriminals can create fake websites that look like yours to trick users into providing their personal information. They can also use phishing emails that appear to come from you or your company to deceive users into doing the same. This is why it\u2019s so essential for you to protect your identity.<\/p>\n\n\n\n<p>But how do you stop them? This cyber security tip focuses on how you can use various authentication tools to assert your identity in different ways and prove that you are who you say you claim to be:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Install Personal Authentication Certificates for Your Employees<\/h4>\n\n\n\n<p>This type of certificate, also known as a client certificate or an <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">S\/MIME certificate<\/a>, is useful for authenticating a specific user. Depending on how you choose to use it, this type of certificate serves a few different purposes for both email communications and website access:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>For email, it enables you to digitally sign your emails using a digital signature. This helps you to show your recipient that you are who you claim to be and also indicates that the sensitive contents of your message haven\u2019t been tampered with since it was signed.<\/li><li>For email, it also allows you to encrypt your messages and any attachments. This means that before you even hit \u201csend\u201d on an email, your message is scrambled and becomes unreadable to anyone aside from your intended recipient.<\/li><li>For website security, this type of digital certificate can also be used to give access to restricted areas of your website. For example, let\u2019s say you want to allow only specific users to access a portal or area of your website. If they have this type of certificate installed, the server will be able to authenticate them and give them access.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">Sign All Software Using a Code Signing Certificate<\/h4>\n\n\n\n<p>A <a href=\"https:\/\/sectigostore.com\/code-signing\">code signing certificate<\/a> enables software developers and manufacturers to prove their identities. If your software isn\u2019t signed, Windows pops up a warning message showing that your software is from an unknown publisher. When you sign your software while using a code signing certificate, you\u2019re validating your identity with a reputable third party (a commercial certificate authority) that can attest to the fact that you are who you claim to be. &nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Install a Website Security Certificate (AKA an SSL\/TLS Certificate) on Your Web Server<\/h4>\n\n\n\n<p>We mentioned this type of certificate in our first cyber security tip. It\u2019s useful for protecting data in transit, meaning when it\u2019s transferred between two endpoints (typically, a user\u2019s web browser and your web server).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #4: Authenticate All Users and Restrict Access<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"242\" height=\"253\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/biometric-authentication-cyber-security-tips.png\" alt=\"\" class=\"wp-image-1083\"\/><figcaption>Examples of biometric authentication<\/figcaption><\/figure><\/div>\n\n\n\n<p>When it comes to providing access to any of your systems, including your network, you need to make sure that you can verify whether the person connecting is who they say they are. One type of tool that several of the experts we consulted sang the praises of is <a href=\"https:\/\/sectigostore.com\/blog\/what-is-multi-factor-authentication-and-how-does-it-differ-from-2fa-sfa\/\">multi factor authentication<\/a> (MFA). This technology, which authenticates a user through two or more types of data, can include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Something you know (such as a password or PIN),<\/li><li>Something you have (such as an HSM, token, or mobile app), and<\/li><li>Something you are (a biometric such as a fingerprint, facial scan or retinal scan).<\/li><\/ul>\n\n\n\n<p>Alex Vovk, CEO and co-founder of <a href=\"https:\/\/www.action1.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Action1 Corporation<\/a>, is one of those experts who says that two-factor authentication (2FA), a type of MFA, and secure passwords make a great pair. He offers the following as one of his cyber security tips:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cTwo-factor authentication is an obvious yet tremendously effective way to secure company assets. In many small and midsize companies, 2FA is neglected since the work environment is friendly and informal. That often results in identity theft \u2014 an external intruder steals user credentials and gains access to company data and resources. Enforce two-factor authentication and password complexity &amp; expiration policies to avoid credentials abuse. Don&#8217;t leave the door wide open for attackers and rogue users!\u201d<\/em><\/p><cite><strong>\u2014 Alex Vovk, CEO and co-founder of Action1 Corporation<\/strong><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #5: Use a Multi-Layered Approach to Cyber Security<\/h3>\n\n\n\n<p>Next on our list of cyber security tips: The best way to defend your small or mid-size business from cyber threats is to take a multi-layer approach. This should include the right mix of tools, processes, and people to operate them. Some of the basic cyber security tools include endpoint and network firewalls and antivirus solutions. However, you need to go beyond the basics and implement security measures like:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>DNS- and IP-based web filtering,<\/li><li>Email filtering, penetration testing,<\/li><li>Intrusion detection systems (IDS),<\/li><li>Unified threat management (UTM) tools, <\/li><li>Automation solutions like PKI certificate managers and patch management tools, and<\/li><li>Regular data backups.<\/li><\/ul>\n\n\n\n<p>Marty Puranik, president &amp; CEO of <a href=\"https:\/\/www.atlantic.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">atlantic.net<\/a>, a web hosting solution, says that SMBs should also take advantage of behavior-based detection tools:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThese tools are more advanced than your traditional antivirus solutions. Things like endpoint detection and response can actually narrow down threats in real-time, prior to your information being compromised.\u201d<\/em><\/p><cite><strong>\u2014 Marty Puranik, president and CEO of Atlantic.net<\/strong><\/cite><\/blockquote>\n\n\n\n<p>But that sounds like it can be a bit pricey \u2014 and depending on the tool you choose, it can be. So, what\u2019s a more cost-effective approach for SMBs who have big security aspirations but not a big budget to match them?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cOrganizations should look to investing in a user-friendly unified security platform to easily manage all their security efforts. Complete visibility is a must for SMBs that can\u2019t afford to use SIEM solutions. In order to respond in real-time, they have to adopt a solution that detects anomalous in the network and monitors their user\u2019s activity.\u201d <\/em><\/p><cite><strong>\u2014 Sivan Tehila, Director of Solution Architecture of <\/strong><a href=\"https:\/\/www.perimeter81.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Perimeter 81<\/a><\/cite><\/blockquote>\n\n\n\n<p>But cybersecurity tools aren\u2019t an end-all-be-all solution. <a href=\"https:\/\/www.dgregscott.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Greg Scott<\/a>, a long-time cybersecurity professional and published author says that there\u2019s one more important thing for your cyber toolkit that can\u2019t be purchased.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cTech tools count, but vigilance counts more. Firewalls, antivirus, web and spam filtering, and other technology are helpful, but attackers are clever and no substitute will ever exist for old-fashioned human vigilance.\u201d <\/em><\/p><cite><strong>\u2014 Greg Scott, cybersecurity professional and author<\/strong><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #6: Keep Your Software, Hardware and Firmware Current<\/h3>\n\n\n\n<p>Stacy Clements, a retired Air Force cyber operations officer and owner of <a href=\"https:\/\/milepost42.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Milepost 42<\/a>, says that it\u2019s critically important to keep your systems patched.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cCyber criminals are constantly finding new vulnerabilities in software, so keeping systems patched is critically important.&nbsp;Most cyber breaches are on systems which have known vulnerabilities, and just haven&#8217;t been patched.&nbsp;Keep software up to date on servers, computers, and mobile devices.\u201d<\/em> <\/p><cite><strong>\u2014 Stacy Clements, owner of Milepost 42<\/strong><\/cite><\/blockquote>\n\n\n\n<p>In his cyber security tips, Puranik also says that while having the right tools in place is important, they\u2019re virtually useless if you don\u2019t keep them patched and up to date via manufacturer updates:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cBegin by making sure any software your employees use is up to date. A lot of software creators provide security updates for when vulnerabilities are discovered. If you&#8217;re using outdated software, you run the risk of opening the door for threats.\u201d<\/em> <\/p><cite><strong>\u2014 Marty Puranik, president and CEO of Atlantic.net<\/strong><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #7: Prepare for the Worst, Hope for the Best<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/checklist.png\" alt=\"Graphic of a checklist\" class=\"wp-image-1085\" width=\"129\" height=\"167\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/checklist.png 274w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/checklist-232x300.png 232w\" sizes=\"auto, (max-width: 129px) 100vw, 129px\" \/><\/figure><\/div>\n\n\n\n<p>One of the biggest mistakes that small businesses tend to make when it comes to cybersecurity is that they\u2019re so busy trying to focus on the technical side of things that they forget the bigger picture: What is it that you need to make sure that your business stays operational?<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Perform Regular Vulnerability and Risk Assessments<\/h4>\n\n\n\n<p>Knowing where your business stands in terms of its <a href=\"https:\/\/www.bmc.com\/blogs\/risk-assessment-vs-vulnerability-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\">security vulnerabilities and risks<\/a> is invaluable. Performing regular vulnerability assessments can help you to identify vulnerabilities and help to protect your network from common security breaches. Risk assessments help you identify any potential risks that stem from an activity or process that you can mitigate.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Maintain Current Data Backups<\/h4>\n\n\n\n<p>Sure, you need cybersecurity tools and software that can help you stay ahead (or at least keep up with) cybercriminals. But one of the most essential things you need is your data: your intellectual property, customer information, and other sensitive data.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cBackups are crucial to restoring business operations in the event of a successful breach.&nbsp;Use the backup rule of three \u2014 have at least three copies of essential data, on two different media, and at least one copy offsite.&nbsp;Also, be sure to test your backups regularly \u2014 a backup does you no good if it&#8217;s been corrupted.\u201d<\/em> <\/p><cite><strong>\u2014 Stacy Clements, owner of Milepost 42<\/strong><\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">Develop, Execute and Enforce Cybersecurity Strategies and Policies<\/h4>\n\n\n\n<p>Having (and enforcing) great policies are a core element of any strong cybersecurity strategy. Part of this entails having strong cyber policies like BYOD and computer use policies, as well as a policy of least privilege.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cWhile no single strategy fits all, practicing basic cyber hygiene would address or mitigate a vast majority of security breaches. Being prepared if an intrusion occurs is also critical and having a communications method for response, actively monitoring centralized host and networks, and including an enhanced monitoring to detect known security events is a must. With a well-oiled cyber policy, you can mitigate outsiders significantly.\u201d<\/em> <\/p><cite><strong>\u2014 Braden Perry, a litigation, regulatory, and government investigations attorney with <\/strong><a href=\"https:\/\/kennyhertzperry.com\/\"><strong>Kennyhertz Perry, LLC<\/strong><\/a><\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">Have Plans and People in Place to Respond When Things Go Wrong<\/h4>\n\n\n\n<p>When crap hits the proverbial fan, who are you going to call? I assure you that the Ghostbusters aren\u2019t going to be of any assistance to you. Only you can save yourself, which means that you need to have <a href=\"https:\/\/www.thesslstore.com\/blog\/in-case-of-emergency-a-disaster-recovery-plan-checklist-for-data-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">preparedness plans<\/a> in place that can be put into action at a moment\u2019s notice. Key components of this type of planning includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>An incident response (IR) plan<\/li><li>A business continuity (BC) plan<\/li><li>A disaster recovery (DR) plan<\/li><li>A team roster with a breakdown of roles and responsibilities<\/li><li>An outline of post-incident investigations and activities<\/li><\/ul>\n\n\n\n<p>Run through exercises with your team to ensure that everyone understands their roles. Be sure to use different scenarios. This way, they know what they\u2019re responsible for doing in a variety of emergency situations.<\/p>\n\n\n\n<p>Braden Perry<strong>, <\/strong>a litigation, regulatory, and government investigations attorney with Kennyhertz Perry, LLC, says that being proactive makes all the difference in the world for SMBs when it comes to response and mitigation for <a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"cyber attacks\">cyber attacks<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cIn the event of a malicious attack, a company should have systems in place to keep operational or at least backups where the company is not affected or very slightly affected. In the event of a total disruption of the business, it is too late to mitigate and you will likely see dramatic costs to the business. Being proactive rather than reactive is the key.\u201d<\/em> <\/p><cite><strong>\u2014 Braden Perry, a litigation, regulatory, and government investigations attorney with Kennyhertz Perry, LLC<\/strong><\/cite><\/blockquote>\n\n\n\n<p>Collin Varner, senior associate at Schellman &amp; Company, LLC, says that when it comes to protecting your organization, repetition is key to helping your team build essential habits.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cAn incident response plan can address issues related to cyber attacks, data loss, and other events that bode risk to all organizations. Ensure responsibilities are defined and designated to the roles tasked with detecting and responding to security events. Frequent testing of a variety of scenarios can be carried out, allowing the individuals to be more knowledgeable in how to react when an incident occurs.\u201d <\/em><\/p><cite><strong>\u2014 Collin Varner, senior associate at Schellman &amp; Company, LLC<\/strong><\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">Consider Cyber Insurance (But Don\u2019t Substitute It for Good Cyber Security Practices)<\/h4>\n\n\n\n<p><a href=\"https:\/\/www.thesslstore.com\/blog\/cyber-insurance\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber security insurance<\/a> can be a really great investment for many businesses. Considering that SMBs are the primary target of most cyber attacks, it never hurts to have that extra layer of protection. (Hence why it\u2019s on our list of cyber security tips.) However, buying good insurance shouldn\u2019t be the only protection that businesses have.<\/p>\n\n\n\n<p>Steve Durbin, managing director of the <a href=\"http:\/\/www.securityforum.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Security Forum<\/a> in London, says that cyber insurance is a great investment but that SMBs should take the time to familiarize themselves with the particulars of each plan.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cData breach liabilities are spreading quickly. As a result, I&#8217;m seeing more SMBs respond by purchasing cyber insurance, which has become a practical choice for a growing range of organizations and industry sectors. However, it is no replacement for sound cyber security and cyber resilience practices. On the contrary, well-resourced and industry and standards compliant practices can oftentimes positively reduce the associated premiums for cyber insurance.<\/em><\/p><p><em>Secondly, SMBs should certainly look cautiously at the small print. With each class action lawsuit prompted by data breach damages, case law precedents change and insurance companies adjust policies accordingly.\u201d<\/em> <\/p><cite><strong>\u2014 Steve Durbin, managing director of the Information Security Forum<\/strong><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #8: Assess and Know Your Third-Party Risks<\/h3>\n\n\n\n<p>It\u2019s common for cybersecurity companies to talk about risk assessments \u2014 but what if those risks are coming from external sources such as third-party vendors? Collin Varner says that says that one of the best cyber security tips he can offer relates to third parties. Understanding what dependencies you may have of outsourced service vendors is prudent to managing an effective cybersecurity program:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThe attacker&#8217;s game is to exploit weak links in the operation, which may sit outside the organization&#8217;s control; therefore, remember to ensure protection of assets that are accessible by suppliers. Perform frequent security reviews in how your data is being managed and maintain an agreed level of information security standards within your agreements. It&#8217;s common practice to require your suppliers to undergo third party assessments of security performance, such as the obtainment of a SOC 2 or ISO 27001 certification.\u201d<\/em> <\/p><cite><strong>\u2014 Collin Varner, senior associate at Schellman &amp; Company, LLC<\/strong><\/cite><\/blockquote>\n\n\n\n<p>And if you don\u2019t think that giving third parties access to your network or other systems is risky, think again. Remember the <a href=\"https:\/\/www.computerworld.com\/article\/2487425\/target-breach-happened-because-of-a-basic-network-segmentation-error.html\" target=\"_blank\" rel=\"noreferrer noopener\">Target data breach of 2013<\/a>? In that data breach, the personal and credit card data of 40 million customer accounts was exposed when the retail giant\u2019s POS system was breached using a third-party vendor\u2019s stolen credentials. Basically, the attacker used an HVAC vendor\u2019s login info to access Target\u2019s network.<\/p>\n\n\n\n<p>The bottom line here is to make sure that any vendors you work with and give any level of access to takes security seriously. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #9: Train Employees to Recognize Threats<\/h3>\n\n\n\n<p>Probably one of the most important (and recommended) cyber security tips that we were given relates to education. Cyber awareness training teaches your employees how to recognize a variety of cybersecurity threats and how to operate safely online. But what should that kind of training entail for small businesses?<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cYour company should plan a training program that helps the employees to understand the mechanism of spam, phishing, ransomware, malware, and many other forms of cyberattacks. One such attack is triggered then the knowledge in their day-to-day job will help them to resolve. Educating new employees and continuing to educate all employees about the Cybersecurity with educational videos, infographics, about recent breaches, etc. can help to understand it better.\u201d<\/em> <\/p><cite><strong>\u2014 Shagun Chauhan, Business Consultant, <a href=\"https:\/\/www.ifourtechnolab.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">iFour Technolab Pvt Ltd<\/a><\/strong><\/cite><\/blockquote>\n\n\n\n<p>Part of this training should include showing how <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a> aren\u2019t all just poorly written, typo-filled ramblings. Cybercriminals create simple yet effective phishing emails that appear legitimate through the use of social engineering techniques. They apply new approaches to old methods; essentially, they just put a new shade of lipstick on a pig.<\/p>\n\n\n\n<p>Cindy Murphy, president of digital forensics at <a href=\"https:\/\/www.tetradefense.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tetra Defense<\/a>, says that it\u2019s not so much the attack methods that are changing as it is the messaging cybercriminals are using:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cScammers are still predominantly using email to deceive their victims. What\u2019s new in this era is the fraudulent messaging within the emails: the CDC asks for donations in Bitcoin. Your COVID-19 Tax Relief Documents are available on this (fake) website. A doctor from the World Health Organization has \u2018drug advice\u2019 if you click here. This is social engineering at its worst \u2014 and unfortunately, it\u2019s more likely to work in these uncertain times.<\/em><\/p><p><em>People haven\u2019t become more gullible in the past three and a half months; they\u2019ve become used to big changes in small messages. When the next news headlines could be a matter of safety or sickness, it\u2019s much easier to believe information that appears right in your inbox.\u201d<\/em> <\/p><cite><strong>\u2014 Cindy Murphy, president of digital forensics at Tetra Defense<\/strong><\/cite><\/blockquote>\n\n\n\n<p>But what are the biggest challenges facing SMBs regarding cyber awareness training? Alan Duric, co-founder and CTO of <a href=\"https:\/\/wire.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wire<\/a> says that it\u2019s helping employees connect the dots between what they learn and how it applies to their daily work lives.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThere is a common disparity between perceived security and actual security in day-to-day business interactions. This is often due to a knowledge gap for non security professionals \u2014 in fact a survey found that <\/em><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/conference-calls-security-gap-in\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>70% of business professionals<\/em><\/a><em> said it was normal to discuss company confidential information on calls, despite the fact that many popular solutions don\u2019t offer end-to-end encryption by default.\u201d<\/em> <\/p><cite><strong>\u2014 Alan Duric, co-founder and CTO of Wire<\/strong><\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Tip #10: Invest in Your IT Team<\/h3>\n\n\n\n<p>Making the decision about whether to outsource your cybersecurity needs or hire someone in house is a choice that\u2019s very specific to your company\u2019s needs. In their cyber security tips, some experts might argue that outsourcing your IT and cybersecurity needs to a third-party vendor is the best option for small businesses because you\u2019re paying less to get access to more. However, there\u2019s a lot of debate within the industry about whether this type of generalization should be painted in such broad strokes.<\/p>\n\n\n\n<p>In our last of the 10 steps to better cyber security, we share a suggestion from a security analyst and ethical hacker, Chelsea Brown. As the CEO and founder of <a href=\"https:\/\/www.digitalmomtalk.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Mom Talk<\/a>, brown is quick to argue that you may be doing your business more harm than good in the long run by outsourcing your IT team:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cDespite what any business thinks, outsourcing your entire IT department over the long haul is not good. A better option is to take the IT employees you currently have and help them get the training they need to better protect your growing enterprise. By investing in your current employees, many become loyal to you and you can see a bigger return on your investment over time. Help these employees become more valuable to your organization by giving them the training they need to better protect your business from the cyber threats.\u201d<\/em> <\/p><cite><strong>\u2014 Chelsea Brown, CEO and founder of Digital Mom Talk<\/strong><\/cite><\/blockquote>\n\n\n\n<p>Brown also mentions several great certifications that can help your team improve their security knowledge and skills, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/sectigostore.com\/blog\/open-source-intelligence-what-is-osint-how-does-it-work\/\">Open Source Intelligence<\/a> (OSINT),<\/li><li>Offensive Security Certified Professional (OSCP),<\/li><li>Cyber Security Analyst (CySA+), and<\/li><li>Security+.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on These IT and Cyber Security Tips for Small Businesses<\/h2>\n\n\n\n<p>SMBs have a lot going for them \u2014 their smaller sizes make them more agile and adaptive to making changes than larger enterprises. They can choose to operate fully online or in a face-to-face setting. But where they\u2019re lacking compared to their corporate giant counterparts is in terms of budgets and resources for managing risks.<\/p>\n\n\n\n<p>Alex Vovk sums up this challenge succinctly: \u201cWhen it comes to operational decisions, security implications aren&#8217;t taken into account and the IT risks are underestimated. That makes SMBs easy targets for cybercriminals.\u201d This is why implementing these cyber security tips and best practices sooner rather than later is key to keeping your small or midsize business safe.<\/p>\n\n\n\n<p>The knowledge, actions and behaviors of your employees matter, and they can either be your organization\u2019s greatest cybersecurity risks or assets. Your willingness to invest both in the necessary tools and your employees can be the difference between your business being an easy or a tough nut for cybercriminals to crack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From data security to automation, we\u2019ve got the scoop from 14 cybersecurity and small business experts on the 10 steps to cyber security that you can implement for your small&#8230;<\/p>\n","protected":false},"author":8,"featured_media":1087,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[14,15],"class_list":["post-1079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-small-business","tag-smb","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020 - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"You&#039;re not helpless when it comes to cybersecurity \u2014 Here are the 10 cyber security tips for small &amp; midsize businesses to know to make you a tough target.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020 - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"You&#039;re not helpless when it comes to cybersecurity \u2014 Here are the 10 cyber security tips for small &amp; midsize businesses to know to make you a tough target.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-17T12:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-20T19:22:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-for-smbs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020\",\"datePublished\":\"2020-06-17T12:51:00+00:00\",\"dateModified\":\"2020-11-20T19:22:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/\"},\"wordCount\":4491,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cyber-security-tips-for-smbs.jpg\",\"keywords\":[\"Small Business\",\"SMB\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/\",\"name\":\"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020 - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cyber-security-tips-for-smbs.jpg\",\"datePublished\":\"2020-06-17T12:51:00+00:00\",\"dateModified\":\"2020-11-20T19:22:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"You're not helpless when it comes to cybersecurity \u2014 Here are the 10 cyber security tips for small & midsize businesses to know to make you a tough target.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cyber-security-tips-for-smbs.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cyber-security-tips-for-smbs.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Cyber Security and Digital Data Protection Concept. Icon graphic interface showing secure firewall technology for online data access defense against hacker, virus and insecure information for privacy.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020 - InfoSec Insights","description":"You're not helpless when it comes to cybersecurity \u2014 Here are the 10 cyber security tips for small & midsize businesses to know to make you a tough target.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/","og_locale":"en_US","og_type":"article","og_title":"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020 - InfoSec Insights","og_description":"You're not helpless when it comes to cybersecurity \u2014 Here are the 10 cyber security tips for small & midsize businesses to know to make you a tough target.","og_url":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/","og_site_name":"InfoSec Insights","article_published_time":"2020-06-17T12:51:00+00:00","article_modified_time":"2020-11-20T19:22:46+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-for-smbs.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"22 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020","datePublished":"2020-06-17T12:51:00+00:00","dateModified":"2020-11-20T19:22:46+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/"},"wordCount":4491,"image":{"@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-for-smbs.jpg","keywords":["Small Business","SMB"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/","url":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/","name":"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020 - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-for-smbs.jpg","datePublished":"2020-06-17T12:51:00+00:00","dateModified":"2020-11-20T19:22:46+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"You're not helpless when it comes to cybersecurity \u2014 Here are the 10 cyber security tips for small & midsize businesses to know to make you a tough target.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-for-smbs.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/cyber-security-tips-for-smbs.jpg","width":1600,"height":1000,"caption":"Cyber Security and Digital Data Protection Concept. Icon graphic interface showing secure firewall technology for online data access defense against hacker, virus and insecure information for privacy."},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/smbs-10-cyber-security-tips-that-make-you-a-tougher-target\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1079"}],"version-history":[{"count":8,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1079\/revisions"}],"predecessor-version":[{"id":1814,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1079\/revisions\/1814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1087"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}