10 simple cybersecurity tips for SME businesses

ramsac blog 10 cybersecurity tips

For SME businesses, managing effective cybersecurity might seem like a challenge. Antivirus software is expensive. Training costs time as well as money. Just knowing what you need to protect yourself against can be difficult.

But there’s no doubt about it, you need to protect your business from cyber threats.

In today’s digital world, it isn’t a question of “if”, it’s a question of “when” you are going to be attacked. Almost two-thirds of UK companies employing between 10 and 49 people – the equivalent of 130,000 businesses nationwide – fell victim to some form of cyber crime last year.

The average cost of a cyber attack to small businesses is £65,000. This cost comes in the form of damaged assets, financial penalties and business downtime.

What can you do to protect your business?

Here are 10 tips any SME business can use to improve their cybersecurity.

Online security

1. Trust your instincts online

Even if you don’t consider yourself a “digital native”, trust your gut. If it looks dodgy, it probably is. If it looks too good to be true, it definitely is. Be wary of pop-ups and don’t click on links or enter personal details into them.

2. Be email-wary

Learn how to spot spoofed emails and be on the lookout for them. Be especially cautious of messages that:

  • are from unfamiliar senders,
  • request personal or financial information over the internet,
  • aren’t personalised,
  • try to force you into hasty action with frightening or upsetting information.

3. Don’t ignore updates

Keep web browsers and operating systems up to date. Most updates are rolled out to combat a new cyber attack or patch a recently discovered vulnerability.

4. Practice good password management

Consider using a password management tool to create and secure your logins. If you don’t want to invest in a tool, use strong passwords.

2019’s most common passwords you should NOT use

  • 123456
  • 123456789
  • qwerty
  • password
  • 1111111
  • 12345678
  • abc123
  • 1234567
  • password1
  • 12345

In the office

5. Be aware of who is entering and exiting your workplace

Many thieves and scammers succeed by exploiting social behaviour such as compassion and politeness. Brazen thieves have been known to simply walk into an office as if they belong there and remove items unchallenged.

If you have the infrastructure to support it, protect your office by implementing a mandatory sign-in and name badge policy for visitors

Be vigilant to strangers – a simple “excuse me, can I help you?” can help verify identities, without any risk of causing offence.

6. Secure your workspace

Don’t leave valuables in clear view or in unlocked drawers. Close and lock doors and windows before leaving a room empty for any length of time. Clear meeting rooms and wipe whiteboards/flipcharts after use. And remember the big 3:

  • Don’t share your office ID or leave it lying around
  • Lock your PC screen whenever you leave your desk
  • Don’t write down passwords and leave them lying around

On the go

7. Keep your devices secure

Don’t take a for-business device with you when travelling unless you are sure you need it. When travelling, keep your device with you at all times. Don’t leave it in a car or hotel room.

Avoid rooting or “jailbreaking” your devices. This can cause them to become vulnerable to attack. You should also be mindful of what you put in your devices.

Do not trust or use any USB devices without first having it checked and given the all-clear by your IT department.

8. Remember, there’s data on your phone too!

Back up your data, lock your phone, make use of apps such as “Find My iPhone” or “Android Lost” and enable remote access to protect and preserve your information if your phone or tablet is lost or stolen.

Clear all data before exchanging, selling or disposing of your device.

9. Be smart about apps

Only download apps from a legitimate app store and only download apps you need. App malware is a rarely considered but serious issue affecting mobile devices. Check reviews and seek advice from people you trust before downloading a new app.

10. Only connect to trusted networks

Never use public Wi-Fi or computers when you are handling or working with sensitive information. Use a virtual private network (VPN) if possible and adjust your device’s security settings to limit access.

VPNs

VPN stands for virtual private network. It extends a private network across a public one enabling users to send and receive data safely.

VPNs provide:

  • confidentiality
  • authentication
  • message integrity

Protect your business with ramsac

As one of the most trusted providers of cybersecurity solutions and support across London and the South East, we offer you protection and peace of mind.

We will help you carry out a thorough cybersecurity risk assessment and then plan and implement a proportionate response to the results. We also educate end-users and implement internal policies for the safest use of technology and the protection of your data.

Related Posts

  • Celebrating 20 Years of Cybersecurity Awareness Month

    Celebrating 20 Years of Cybersecurity Awareness Month

    Cybersecurity

    October is Cybersecurity awareness month, follow us on LinkedIn or Twitter for daily tips on how you can protect your organisation against Cybercrime. [...]

    Read article

  • How much should businesses invest in cyber resilience? 

    How much should businesses invest in cyber resilience? 

    Cybersecurity

    In this blog we explore how much organisations should invest in cyber resilience to protect against cybercrime [...]

    Read article

  • What is cyber resilience? A complete guide

    What is cyber resilience? A complete guide

    Cybersecurity

    Firewalls and anti-virus software are just the first steps in protecting your organisation from cyber threats (this is cybersecurity). However, you need more than that and this is where [...]

    Read article

  • The cybersecurity risks of remote working

    The cybersecurity risks of remote working

    CybersecurityRemote working

    Remote workers are under increasing levels of threat from advanced cyber criminals. It is vital to protect your workforce from cyberattacks. Discover more here. [...]

    Read article

  • What is Mobile Application Management: streamlining app deployment and security

    What is Mobile Application Management: streamlining app deployment and security

    Cybersecurity

    Mobile Application Management helps organisations to manage, secure, and distribute mobile applications within their environment. In this blog we explain what MAM is and the benefits of implementing it. [...]

    Read article

  • The importance of effective Supplier Data Security

    The importance of effective Supplier Data Security

    Cybersecurity

    In this blog post, we will explore essential considerations and questions to ask your suppliers about the protocols they have in place that keep you, and any shared data, [...]

    Read article