Cybersecurity Basics
Total Page:16
File Type:pdf, Size:1020Kb
CYBERSECURITY FOR SMALL BUSINESS CYBERSECURITY BASICS Knowing some cybersecurity basics and Cyber criminals target putting them in practice will help you protect your business and reduce the risk companies of all sizes. of a cyber attack. PROTECT YOUR FILES & DEVICES Update your software Secure your files Require passwords This includes your apps, web Back up important files offline, Use passwords for all laptops, browsers, and operating on an external hard drive, or in tablets, and smartphones. systems. Set updates to the cloud. Make sure you store Don’t leave these devices happen automatically. your paper files securely, too. unattended in public places. Encrypt devices Use multi-factor authentication Encrypt devices and other media that Require multi-factor authentication to access areas contain sensitive personal information. of your network with sensitive information. This This includes laptops, tablets, requires additional steps beyond logging in with a smartphones, removable drives, backup password — like a temporary code on a smartphone tapes, and cloud storage solutions. or a key that’s inserted into a computer. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS PROTECT YOUR WIRELESS NETWORK Secure your router Change the default name and password, turn off remote management, and log out as the administrator once the router is set up. Use at least WPA2 encryption Make sure your router offers WPA2 or WPA3 encryption, and that it’s turned on. Encryption protects information sent over your network so it can’t be read by outsiders. MAKE SMART SECURITY YOUR BUSINESS AS USUAL Require strong passwords Train all staff Have a plan A strong password is at least Create a culture of security Have a plan for saving data, 12 characters that are a mix of by implementing a regular running the business, and numbers, symbols, and capital schedule of employee training. notifying customers if you lowercase letters. Update employees as you experience a breach. The FTC’s Never reuse passwords and find out about new risks and Data Breach Response: A Guide don’t share them on the phone, vulnerabilities. If employees for Business gives steps you in texts, or by email. don’t attend, consider blocking can take. You can find it at their access to the network. FTC.gov/DataBreach. Limit the number of unsuccessful log-in attempts to limit password-guessing attacks. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS Understanding THE NIST CYBERSECURITY FRAMEWORK You may have heard about the businesses of all sizes better understand, manage, and reduce their cybersecurity risk NIST Cybersecurity Framework, and protect their networks and data. The Framework is voluntary. It gives your business but what exactly is it? an outline of best practices to help you decide where to focus your time and money for And does it apply to you? cybersecurity protection. NIST is the National Institute of Standards and You can put the NIST Cybersecurity Framework Technology at the U.S. Department of Commerce. to work in your business in these five areas: The NIST Cybersecurity Framework helps Identify, Protect, Detect, Respond, and Recover. 1. IDENTIFY 2. PROTECT Make a list of all equipment, software, and data • Control who logs on to your network and uses you use, including laptops, smartphones, tablets, your computers and other devices. and point-of-sale devices. • Use security software to protect data. Create and share a company cybersecurity policy that covers: • Encrypt sensitive data, at rest and in transit. • Conduct regular backups of data. Roles and responsibilities for employees, vendors, and • Update security software regularly, automating anyone else with access to those updates if possible. sensitive data. • Have formal policies for safely disposing of electronic files and old devices. Steps to take to protect against • Train everyone who uses your computers, an attack and limit the damage if devices, and network about cybersecurity. one occurs. You can help employees understand their personal risk in addition to their crucial role in the workplace. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS 3. DETECT Monitor your computers Check your network Investigate any unusual for unauthorized personnel for unauthorized activities on your network access, devices (like USB users or connections. or by your staff. drives), and software. 4. RESPOND Have a plan for: • Notifying customers, employees, and others • Investigating and containing an attack. whose data may be at risk. • Updating your cybersecurity policy and • Keeping business operations up and running. plan with lessons learned. • Reporting the attack to law enforcement and • Preparing for inadvertent events other authorities. (like weather emergencies) that may put data at risk. Test your plan regularly. 5. RECOVER After an attack: Repair and restore the Keep employees and customers equipment and parts of your informed of your response and network that were affected. recovery activities. For more information on the NIST Cybersecurity Framework and resources for small businesses, go to NIST.gov/CyberFramework and NIST.gov/Programs-Projects/Small-Business-Corner-SBC. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS PHYSICAL SECURITY An employee accidentally leaves a flash drive Cybersecurity begins with on a coffeehouse table. When he returns hours strong physical security. later to get it, the drive — with hundreds of Social Security numbers saved on it — is gone. Lapses in physical security can expose Another employee throws stacks of old company sensitive company data to identity theft, bank records into a trash can, where a criminal with potentially serious consequences. finds them after business hours. For example: A burglar steals files and computers from your office after entering through an unlocked window. HOW TO PROTECT EQUIPMENT & PAPER FILES Here are some tips for protecting information in paper files and on hard drives, flash drives, laptops, point-of-sale devices, and other equipment. Store securely Limit physical Send reminders Keep stock When paper files or access Remind employees to Keep track of and electronic devices When records or put paper files in locked secure any devices contain sensitive devices contain file cabinets, log out that collect sensitive information, store sensitive data, of your network and customer information. them in a locked allow access only to applications, and never Only keep files and cabinet or room. those who need it. leave files or devices data you need and with sensitive data know who has access unattended. to them. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS HOW TO PROTECT DATA ON YOUR DEVICES A burglary, lost laptop, stolen mobile phone, or misplaced flash drive — all can happen due to lapses in physical security. But they’re less likely to result in a data breach if information on those devices is protected. Here are a few ways to do that: Require complex passwords Require passwords that are long, complex, and unique. And make sure that these passwords are stored securely. Consider using a password manager. Use multi-factor authentication Require multi-factor authentication to access areas of your network with sensitive information. This requires additional steps beyond logging in with a password — like a temporary code on a smartphone or a key that’s inserted into a computer. Limit login attempts Limit the number of incorrect login attempts allowed to unlock devices. This will help protect against intruders. Encrypt Encrypt portable media, including laptops and thumb drives, that contain sensitive information. Encrypt any sensitive data you send outside of the company, like to an accountant or a shipping service. Include physical security in your regular employee trainings and TRAIN communications. Remind employees to: YOUR EMPLOYEES Shred documents Promote security practices Always shred documents in all locations with sensitive information Maintain security practices even if working before throwing them away. remotely from home or on business travel. Erase data correctly Know the response plan Use software to erase data All staff should know what to do if before donating or discarding equipment or paper files are lost or old computers, mobile devices, stolen, including whom to notify and digital copiers, and drives. what to do next. Use Data Breach Don’t rely on “delete” alone. Response: A Guide for Business for help That does not actually remove creating a response plan. You can find it the file from the computer. at FTC.gov/DataBreach. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS RANSOMWARE Someone in your company The attackers ask for money or cryptocurrency, but even if you pay, you don’t know if the gets an email. cybercriminals will keep your data or destroy your files. Meanwhile, the information you It looks legitimate — but with one click on need to run your business and sensitive a link, or one download of an attachment, details about your customers, employees, everyone is locked out of your network. That and company are now in criminal hands. link downloaded software that holds your data Ransomware can take a serious toll on your hostage. That’s a ransomware attack. business. HOW IT Criminals can start a ransomware HAPPENS attack in a variety of ways. Scam emails Server with links and attachments that vulnerabilities put your data and network at risk. which can be exploited These phishing emails make up by hackers. most ransomware attacks. Infected websites Online ads that automatically download that contain malicious code malicious software onto — even on websites you your computer. know and trust. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS HOW TO PROTECT YOUR BUSINESS Have a plan How would your business stay up and running after a ransomware attack? Put this plan in writing and share it with everyone who needs to know. Back up your data Regularly save important files to a drive or server that’s not connected to your network.