Skip to main content

Is Your Business Safe From Internet Security Threats?
Spyware, malware, viruses, unauthorized network access, weak passwords and hacker attacks can be devastating to small businesses. Here's how to protect your company from internet security threats.

Keeping your networks secure and your data safe is critical to the success of your business. Which is why I always emphasize on attacking costs and complexities in implementing network security solutions that works without you having to painfully administer it.

Most small-medium business owners assume that large corporations are far more vulnerable to Internet security threats than they are. In reality, however, it's often the other way around! For example, the destructive Mydoom worm affected one out of three small and mid-sized businesses--but only one out of six large enterprises, according to the Internet Security Alliance, a non-profit organization that provides a forum for information security issues.

Because they have a false sense of security and assume they're not at risk, many small-medium business owners don't adequately protect their computers and networks from spyware, viruses, worms, hacker attacks, customer data theft and other security threats. In addition, with so many balls to juggle and hats to wear in their business, entrepreneurs often put computer security far down on their to-do lists--if it makes the list at all.

The result: Nearly half of all small and mid-sized businesses haven't taken the most basic security precautions, such as installing antivirus and anti-spyware programs, reports research firm AMI-Partners.

Why You're at Risk

There are several reasons why your computers, network and the data that resides on them are at greater risk now than ever before.

  • Enterprise network security is harder to breach. In recent years, many corporations, impacted by internet threats and in order to comply with strict security measures required by the Sarbanes-Oxley Act and other regulations, have significantly bolstered their network security. As a result, criminals are increasingly turning their attentions toward easier hacker targets--small businesses.
  • Unprotected systems are easier to find. Many hackers now have software tools that constantly search the internet for unprotected networks and computers. Once discovered, unprotected computers can be accessed and controlled by a hacker, who can use them to launch attacks on other computers or networks.
  • Computer security threats are more sophisticated--and more damaging. Spyware authors are busy creating pernicious programs that resist removal, perpetually mutate, and spread across the internet in minutes. Meanwhile, blended threats, which assume multiple forms and can attack systems in many different ways, are on the rise. Small businesses without adequate, updated security solutions can easily be victimized by these and other threats.
  • Threats often come from within. All too often, security breaches don't come from outside the company but from within, either intentionally or unintentionally. For example, an employee may unknowingly download spyware while playing an online game or visiting a website. Small-business systems are more vulnerable to employee tampering simply because they often lack the internal security precautions of a larger enterprise.
  • The resulting impact of a security attack is greater. Small businesses often lack the financial resources that large companies have to bounce back from security attacks. Suppose you're an online retailer and a hacker launches a denial-of-service attack against your website. Do you have the necessary insurance or funds to recover from the subsequent loss of revenue--not to mention the damage to your business's reputation?

What You Can Do

Fortunately, there are plenty of ways to protect your business from internet security threats.

  • Change your thinking. Internet security should be a fundamental part of your business survival/continuity plan. Think of it this way: Many small businesses have grown reliant on the internet for communicating with customers and partners; selling or marketing their products or services; and more. How will your business continue to perform those functions if your computers are affected by a devastating virus or a Denial of Service Attack or because a Microsoft SQL worm has propagated into your network?
  • Assess your needs. Do you have a full understanding of the security you need vs. what you currently have? If you're a harried small-business owner, chances are the answer's "no." The good news is, you may have more protection than you realize. For instance, most home office and small-business local area network (LAN) routers include a built-in firewall--technology that blocks intruders from accessing the computers on the network. However, don't be fooled that this is enough to protect your 20 plus something network computers!
  • Cover the basics. At a minimum, all your business computers should be protected by a hardware or software firewall and antivirus and anti-spyware programs. Some internet security suite solutions geared toward small businesses combine all three protections, as well as offer safeguards against identity theft, spam, phishing scams and more. The issue is, these firewalls can be complicated for the average user. Consider a broadband gateway firewall that provided Web content-filter, gateway firewall, intrusion detection and intrusion prevention with automatic updates and possibly VPN capability for secure remote access back to your office network when you are out of the office.
  • Get help. Does computer security seem like too a daunting task for you to handle? If so, hire a consultant to perform a security audit of your business systems and network and make recommendations. Your network equipment reseller or technology vendor can also help you determine the security solutions you need. Another option is to outsource the job. A managed service provider can design, implement and maintain your network security solution for a flat monthly fee.
  • Put it in writing. A detailed, written security plan that includes policies and procedures as well as technology requirements is particularly important for businesses with employees. If your security procedures aren't set down in writing, they're easy for an employee to dispute or disregard. If this sounds too dry and hard, call me!
  • Keep your security updated. New internet threats are emerging daily. Your security solutions won't be effective against new viruses, worms or spyware if they're not regularly updated. Fortunately, most antivirus software and other security solutions can be updated automatically.
  • Give wireless networks extra protection. On a wireless network, data is transmitted over radio waves, which can be easily intercepted. This means a wireless network is inherently less secure than a wired one. If you or your employees use a wireless connection to access company databases or files, consider taking additional security measures. For instance, a virtual private network (VPN) connection provides a secure way for mobile workers to wirelessly tap into a company's network.
  • Don't go overboard. A house without any windows or doors would be extremely secure--but who would want to live there? By the same token, the more secure your computer or network is, the more difficult it can be to use. Find the right balance between security and usability, and stick with it. The harder you try to implement security policies, the less easy it is for your users and employees to adapt and that will cost you lost of productivity time.
  • Prepare for the future. A secure network provides businesses with benefits beyond protection from internet threats. Inherently, a secure network is a robust network. And a robust network is an excellent foundation that can support new technologies, such as VoIP, that can greatly increase productivity and reduce operating costs.

Ultimately, when your business is secure, it's stronger and more agile--and definitely more competitive. So, don't wait till your business is affected by unauthorized network access, network breach or a virus outbreak!


Comments

Popular posts from this blog

In early April 2006, I sign-up for the Excellerated Business School for Entrepreneurs (BSE) after a preview session held in Singapore by Executive-Directions. The seminar was held from 15 April to 23 April 2006 in Subang Jaya Hotel in Kuala Lumpur, Malaysia. The BSE in KL was organized by GlobeSL Sdn Bhd. I left Singapore on 14 April via Transtar , the only 1st class coach service which has 16 seats to create a lot of room for your leg. They also provide hot meal during the journey with hot drinks on demand. The seats are equipped with a massage chair, a personal in-flight entertainment system on LCD screen, PC Games and the F&B Attendant will provide anything that you ask for. From newspaper, magazines, blanket, hot/cold drinks, a new set of earphones for the entertainment system... they have it all. They are most courteous and polite at all times. I truly enjoy the Transtar service. For SG$50 from Singapore to KL, it's worth it. I arrived in Subang Jaya Hotel at about 10p

From Toilet Cleaner to CEO

On 22-April-2012, my entrepreneurship journey story was published by The Sunday Times in Singapore by Mr. Wong Kim Hoh

Competition: How Eliminating This Word From Your Vocabulary Will Skyrocket Your Success

Competition: How Eliminating This Word From Your Vocabulary Will Skyrocket Your Success this essay is extracted from Rok SIVANTE's Facebook Notes . Click here for Rok SIVANTE Facebook Profile page. ---------------------------------------------------------------------------------------------------------------------------- Competition. How much of business & economic theory has been based around the concept? What’s happened to this economy of ours, based on the scarcity model of which competition is a core principle? (For anyone who hasn’t picked up a newspaper in the last year - it hasn’t exactly been doing as hot as most would like) What are the consequences of continuing to operate in the world from a belief system dictating there must be a winner and a loser in all outcomes? Are your results really dependent on how others around you conduct their lives? Your success in business has NOTHING to do with the “competition.” What any other company or person is doing has NOTHING to