Proton

The key to small business cyber security is a culture of security awareness

Small business cybersecurity is often overlooked, either due to a lack of expertise or funding. This is a mistake. Cyberattacks are costly to mitigate but potentially more costly to recover from after they occur.

There are two things cybercriminals want to steal from your employees: your organization’s data and its money. To get either of those things, usually all they have to do is invent a sufficiently persuasive con.

As a manager, your challenge is to increase the likelihood that, when confronted with, say, a phishing attempt or a fraud email, your employees will be able to recognize the attack and report it. The cost of data breaches and cybercrime is growing(neues Fenster), and data protection regulations—from the GDPR(neues Fenster) to its possible US counterpart(neues Fenster)—now have more teeth(neues Fenster).

Fortunately, there are simple ways to stay ahead of the cybercriminals. As a data security company, we are uniquely predisposed to having a culture of cybersecurity. Even so, we have instituted policies, conducted cybersecurity awareness training sessions, and implemented systems to reinforce this culture.

In this guide, we’ll share some of our tricks and best practices that we hope can help your organization as well.

Empower a cybersecurity officer and make a plan

As with most projects in any organization, the first step is to designate someone responsible for making sure the job gets done. This person could be from your IT staff, but which department they are from matters less than their willingness to learn about cybersecurity and hold team members accountable for completing training sessions and implementing digital safety practices. The first thing your cybersecurity officer should do is conduct a threat and risk assessment. It should include a detailed overview of:

Assets —  Employee data, client credit cards, trade secrets, money, etc. List the things of value your company holds, where and how they’re stored, and who has access to them currently.

Threats — Hackers, disgruntled employees, competitors, cybercriminals, governments, etc. Be as inclusive and imaginative as possible. You’ll rank these threats later when assessing risks.

Vulnerabilities — Human error, unsecured communications, poor network security, unencrypted service providers, etc. Your past experiences, knowledge of your own systems, and existing research about data breaches can help you here.

Risk — Which teams are more susceptible to threats? Which assets are most valuable? This analysis will help you decide where to focus the most energy.

Countermeasures — Cybersecurity awareness training, end-to-end encryption, access controls, data minimization, etc. Based on the information you’ve already compiled above, you can determine how to mitigate risk.

Armed with a better understanding of the assets, threats, and vulnerabilities within your organization, you can begin implementing countermeasures.

Create a cybersecurity policy and use it regularly

Your small business’s cybersecurity policy should include basic guidelines that all employees must follow. We will go into more detail about cybersecurity policies in future articles, but this should include everything from recommendations about using secure web browsers, email safety tips, VPN requirements, anti-phishing best practices, password recommendations, and more.

As part of your employee onboarding process, everyone on your team should receive a copy. However, to maintain a culture of cybersecurity awareness, cybersecurity officers should regularly refer to this document and issue periodic reminders of its contents. Managers should talk about the cybersecurity policy, too, to emphasize its importance. Your cybersecurity policy isn’t just another boilerplate HR document. Understanding it and following it is part of everyone’s job.

Related article: A cyber security guide for small businesses(neues Fenster)

Hold regular cybersecurity awareness training sessions

These training sessions should happen soon after a new employee starts and then be updated periodically. The training should emphasize the most important aspects of the cybersecurity policy while also giving employees an understanding of the specific threats your management team has identified. These should be specific to your organization and to your industry. For example, if there are known threats targeting companies similar to yours through certain attack vectors, these training sessions are an excellent opportunity to educate your staff about preventing such attacks.

There are also third-party cybersecurity firms that can help you here. For instance, Sophos offers anti-phishing training simulations(neues Fenster). Your cybersecurity officer should be tasked with researching and proposing a cost-benefit analysis for contracting outside security vendors.

Some teams or individuals may be more vulnerable to attack than others based on their specialty or level of access. Network administrators, managers, and anyone handling payroll or customer data may need additional training and attention.

3 major cybersecurity best practices

There are a handful of cybersecurity practices that are so important and basic that they should be mandatory in your organization.

Use two-factor authentication (2FA)

— Turning on 2FA for every account that offers it (whether it’s your company Slack or your employee’s Proton Mail account) can help prevent account takeover, which is a major problem for companies and a common source of data exposure.

Be alert for phishing

Phishing attacks(neues Fenster) use social engineering to entice users to click links, download attachments, or divulge login credentials in efforts to compromise their device or your network. Your employees should be trained to recognize common phishing strategies, to report suspicious emails to your small business’s cybersecurity team, and to always verify emails before clicking a link or responding.

Use strong passwords

— It’s important to use strong passwords that are less likely to be decrypted by hackers in a data breach. We have published information about how to choose a strong password(neues Fenster) for more details.

Conclusions

The most important thing to remember is that creating a workplace culture of cybersecurity awareness requires buy-in from employees at every level. If management doesn’t view cybersecurity as a priority, then lower-level employees won’t either.

Entry-level employees are often an easy target for hackers and cybercriminals because they have less training and deal with less sensitive information. Yet the information they have in their accounts can be used to devise more damaging social engineering attacks. Junior employees with access to funds can also be more easily tricked into wiring money on behalf of a fake boss(neues Fenster) or paying bogus invoices.

The primary way to confront these threats is to ensure your employees are always on guard. If you demonstrate that cybersecurity is a priority in your organization, they will be.

Best Regards,
The Proton Mail Team

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(neues Fenster) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan or donate. Thank you for your support.

Verwandte Artikel

Smart glasses that have been modified for facial surveillance and dox you in real time, finding your personal information after seeing your face.
en
Students modified smart glasses to find someone’s personal data after just looking at them. This is why we must minimize data collection.
The cover image for a blog explaining what password encryption is and how Proton Pass helps users with no tech experience benefit from it
en
Password encryption sounds complicated, but anyone can benefit from it. We explain what it is and how it’s built into Proton Pass for everyone to use.
How Proton can help with DORA compliance
en
We look at how DORA will affect your organization and how Proton’s services can help you meet its compliance requirements.
European politicians and a smartphone showing data protected from the dark web.
en
We searched the dark web for Spanish and Italian politicians’ official email addresses. Compared to other politicians, they’ve had fewer breaches.
why are my emails going to spam
en
Why do some emails go to spam? This article explores practical solutions to improve your email deliverability and avoid the spam folder.
What is NIS2?
en
We look at how NIS2 will affect your organization, and at how Proton’s services can help it meet its compliance requirements.