SMBs Beware: Beef up the Defense against Security Breaches

SMBs Beware: Beef up the Defense against Security Breaches

Security Breaches

When the United States government is the victim of a cyberattack, millions of people can be affected. The same is true for the large business that have been the victims of cyberattacks. These stories make the headlines and create a buzz about the importance of keeping data that is stored on computers safe. The government or business will talk about who was affected and what they are doing to help those that have had their information compromised. They will talk about how they will continue to work to improve their security in the future. They will also invest the money needed to take care of anyone that has been damaged and to upgrade their security systems.

It is great that the governments and big businesses have the resource to react this way. It is vital that they keep private information they have stored safe and secure.  But these are not the only businesses that are at risk. Small to medium sized businesses are also collecting and storing private information. If their systems are the target of a cyberattack, the results can be problematic for many people. A SMB may not think they have the resources that the big business has to protect their information, but that does not remove the responsibility that they have to do this. It is up to every business that collects private information about people to take all the steps they can to make sure that it is safe. That means learning the best and most cost effective ways to secure business data. There are two basic areas that a business needs to work on to protect themselves from a cyberattack. Those two areas are people and technology.


Many of the cyberattacks against businesses are the results of an employee of the business opening the door in some way. They may download a virus through an email or when they are surfing the internet. They may not use a secure password for access to their computer or they may not change it frequently. There are many ways that a cyberattack can happen as the result of an employee making a mistake.

The SMB needs to invest in the training of their employees when it comes to security. They need to make everyone aware of and committed to following the security procedures of the business when it comes to private information. The training is something that should be ongoing. It needs to be for both new employees of a business and for established employees. The constant reinforcement is a good way to help people to remember the importance of security and can help prevent many of the cyberattacks.


If the door to a cyberattack is closed through vigilant employees, there is still the possibility of an attack through the vulnerability of the technology that a business uses. No matter how good the employees are, if they do not have the right tools to protect the information, they could be victimized. There are many different technologies that SMBs should have in place.

  • Antivirus Software - Antiviruses like Immunet and AVG should always be in place. Many cyberattacks are the result of viruses that infect the computer systems. With this type of software in place, the chance of a virus is diminished. The software not only needs to be in place, it should always be on and up to date. That will give a business the protection they need at all times.
    Watch out for Laptops and Mobile Devices - SMBs may rely on these technologies to compete, but they are also the most vulnerable. They can be lost or stolen or simply fall into the right hands. All information on these devices should use encryption software to protect it.
    Monitoring Software - A SMB should be able to monitor how their employees are using the technology and to make sure that employees are using the proper security methods that are in place. It is the responsibility of the business to make sure that the employees are always doing the right thing and monitoring software is one way to accomplish that.
    Secure Backup - despite the best efforts of a SMB, a cyberattack can still occur. If the attack manages to wipe out information a SMB that has a secure backup can retrieve whatever was lost.

Cybercriminals are no different than any other criminal. They are looking for the easiest targets that they can find. If a SMB puts up a good defense, the cyber attackers will go out looking for a business that is not being vigilant. The best way to prevent a cyberattack is not to become a target and taking a few steps is something that every business could and should do.


More Stories By Peter Davidson

Being a senior business associate, Peter Davidson strives to help different brands and start ups to make efficient business decisions and plan effective business strategies. With years of rich domain expertise, he loves to share his views on the latest technologies and applications through his well researched content pieces. Follow him on Google+ and Twitter.

Latest Stories
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"Codigm is based on the cloud and we are here to explore marketing opportunities in America. Our mission is to make an ecosystem of the SW environment that anyone can understand, learn, teach, and develop the SW on the cloud," explained Sung Tae Ryu, CEO of Codigm, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...