Cybersecurity Tips for Employees

Comment

Cybersecurity Tips for Employees

In this eBook, we explore the need for employees to practice strict and secure cyber-security habits— not only to thwart digital attacks, but also to prevent someone from simply walking by their desk (in the office or at home) and picking up a device or document that contains sensitive information. We also present the key steps SMB business owners can take to educate their employees to help secure their company’s data and intellectual property.

Comment

U.S. Small Business Administration recommends the following best practices,  For education and cyber-prevention

Comment

U.S. Small Business Administration recommends the following best practices, For education and cyber-prevention

  • Establish security practices and policies to protect sensitive information

  • Educate employees about cyberthreats and hold them accountable

  • Require employees to use strong passwords and to change them often

  • Employ best practices on payment cards

  • Make backup copies of important business data and information

  • Create a mobile device action plan

  • Protect all pages on your public-facing websites, not just the checkout and sign-up pages

    The survey also found:

    • 65 percent of business owners admit they have been victim of a cyberattack; computer virus attacks are the top type of attack reported at 33 percent, phishing is number two at 29 percent.

    • 86 percent of business owners believe that digital risk will continue to grow.

    • 30 percent of companies with 11-50 employees do not provide any type of formal training on cybersecurity.

    • Despite the simplicity of regularly updating software, seven percent of companies still fail to take that step.

    • Reputational risk is among the top reasons (45 percent) why business owners would consider investing in or purchasing a cybersecurity policy.

    • 35 percent of business owners who have never experienced a cyberattack are unaware of the financial cost to recover, highlighting a dangerous gap in knowledge from the implications.

Comment