Five Ways Small Businesses Can Combat Cyber Crime

0 Views      
What do you think about this article? Rate it using the stars above and let us know what you think in the comments below.
Small business owners should create a ''culture of security.''

As small businesses increasingly rely on new Internet technologies to remain competitive within the local and global marketplace, they are also becoming more susceptible to cyber crime attacks.

Cyber crime can have a devastating impact on a small business, which often lacks the in-house technical expertise and resources to quickly and fully recover from cyber attacks. Small businesses can also even unknowingly aid in cyber crime by using unsecured computers, which cyber criminals can hijack and use to attack other online businesses or even our nation's critical infrastructure.

While there are numerous technological steps that small businesses can take to better secure their environments, IT infrastructure and controls alone are not effective in combating cyber fraud. Small business owners must also take steps to create a "culture of security" among both their employees and customers.



Unfortunately, many small business owners are not currently taking such measures. In fact, only a little more than half of small business owners require employees to sign security policies, according to a survey by the National Cyber Security Alliance and Cisco Small Business.1

By requiring employees to sign security policies, small business owners can establish expectations with employees about their role in protecting customer and company data. In addition, they can set the tone for a "culture of security" in the workplace.

Below are five technological and cultural adjustments small business owners can make to better defend themselves against the myriad threats posed by cyber crime.
  1. Assess Risk and Identify Weaknesses
    Small business owners should analyze both online systems and operating systems to determine the areas most at risk. For example, is your customer data, internal accounting information, and other sensitive data linked to the Internet?

    As part of this risk assessment, you should also ensure that updated anti-virus programs, anti-spyware programs, and firewalls are installed on all computers and that employees are required to change their passwords every 60 to 70 days.

  2. Back-Up Critical Information
    You should establish a schedule to perform critical data backups and system upgrades on a regular basis throughout the year. Creating back-ups on a regular basis ensures that critical data is not lost in the event of a cyber attack or natural disaster. Store all backup copies in remote locations away from the office, such as on an external hard drive, and encrypt any sensitive data about your company or customers.

  3. Create a Contingency Plan
    You should also draft a contingency plan to follow if the business suffers a cyber attack. This plan should include steps about how to continue business operations at an alternate location if necessary. Be sure to test the plan annually.

  4. Educate Employees
    In order to create a culture of security, you must demonstrate to employees and customers that cyber fraud is a concern you take seriously. This involves training employees on proper Internet practices and technology solutions, as well as encouraging customers to protect themselves, as consumers, against cyber fraud. You should also integrate a cyber security rollout plan within the yearly business plan. This plan should also include steps for measuring success.

  5. Implement a Security Agreement
    You should require employees to sign a security agreement to demonstrate that they are active participants in helping to maintain a secure online environment. This agreement also should require employees to report any suspicious online activity or known Internet crime to the proper authorities.

    If fraud or criminal intent is suspected, you should report it to the local law enforcement agencies, the local Federal Bureau of Investigation, Secret Service, or State Attorney General's offices. Some states also require business owners to notify their customers if criminals have had access to customers' unencrypted personal information.
Cyber Security is Good for Business.

Not only are you, as a small business owner, obligated to inform your customers if their personal information has been compromised, but you can also earn their respect as a trusted business partner by promoting the security practices that you have implemented to protect their data.

Consumers are starting to take notice of how businesses secure their data, and they are more willing to trust and reward businesses for good security practices. In fact, nearly 85 percent of consumers in a recent survey said they would increase their shopping at a store known for good cyber security practices, while only 20 percent said they would continue shopping at a store that had a recent data breach, according to market research firm Javelin Strategy & Research.2

The losses resulting from cyber crimes, which can severely damage a businesses' reputation, often outweigh the costs associated with the implementation of a simple security program. By implementing a security program that involves both technical controls and cultural adjustments, you, as a small business owner, can take a big step in fighting cyber crime.



12007. NCSA and Cisco Small Business Survey. "Study Reveals Insight, Opportunity for IT to Protect Mobile Wireless Users," InsightExpress.
newsroom.cisco.com/dlls/2007/prod_082107b.html.
22006. "Fraud Survey Report," Javelin Strategy & Research, January 2006.
If this article has helped you in some way, will you say thanks by sharing it through a share, like, a link, or an email to someone you think would appreciate the reference.

Popular tags:

 engineering  experts  businesses  employers  security  accounting  expectations  operations  data  small businesses


EmploymentCrossing is great because it brings all of the jobs to one site. You don't have to go all over the place to find jobs.
Kim Bennett - Iowa,
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
BusinessDevelopmentCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
BusinessDevelopmentCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 BusinessDevelopmentCrossing - All rights reserved. 168