• About
  • Contact
  • Advertise
  • Resources

No Passive Income

Take Action, Build Your Business!

  • Small Business
  • Personal Finance
  • Online Marketing
  • Social Media
  • Blogging
  • SEO
  • Tools & Resources

Prepare Your SMB with These 5 Cybersecurity Questions

November 2, 2017 By admin

The vast majority of small- and medium-sized businesses (SMBs) do not hold anywhere near the volume of data that Equifax maintains, and in the event of a data breach, an SMB will not be in a position of having lost control of the personal and financial records of more than 143 million people.

Even so, the recent Equifax data breach is a stark reminder to all SMBs that they need to have their cybersecurity houses in order because any loss of data can result in expenses and liabilities as well a substantial loss of customer faith and trust in the SMB.

One of the greater problems that SMB managers face is that the cybersecurity world is evolving rapidly, and those managers do not have the knowledge or experience to ask the right questions about the SMB’s cyberdefenses.

These five questions are a good starting point for SMB managers to begin an assessment of the SMB’s cybersecurity strategy.

 

Table of Contents

  • 1. What type of data does the SMB hold and maintain, and how valuable is that data?
  • 2. How aware or involved are the SMB’s employees in its cybersecurity efforts?
  • 3. Does the SMB have a multi-layer cyber defense technology strategy?
  • 4. Could the SMB afford to rebuild internal systems and to reimburse customers in the event that customer data were lost in a data breach?
  • 5. What data backup procedures has the SMB implemented?
    • Wait! Before You Go, Read:

1. What type of data does the SMB hold and maintain, and how valuable is that data?

SMBs that conduct sales on credit or with credit or debit payment processing services inevitably hold their customers’ payment information, including bank accounts and credit and debit card numbers.

Even if the SMB does not store detailed financial data, it likely maintains records of the names of individuals and their places of employment, including whether they have authority to place orders. Hackers can use that identifying information to dig deeper into the internal processes of an SMB’s customer.

The absence of financial data does not eliminate the value of that data to a hacker. Apart from customer data, the SMB’s own financial records can be a gold mine for a determined hacker.

 

2. How aware or involved are the SMB’s employees in its cybersecurity efforts?

Do the SMB’s employees assume that an IT department or a third-party technology consultant will handle all cybersecurity matters, or are they vested in the SMB’s cybersecurity strategy?

If the SMB has established cybersecurity policies and procedures, determine if its employees have copies or are aware of those procedures and whether they have received instruction to follow them.

If employees use weak passwords, routinely click on email attachments, or log into the SMB’s networks through free public wifi, the SMB should revisit its policies and procedures in order to make its employees more engaged in the SMB’s cybersecurity.

 

3. Does the SMB have a multi-layer cyber defense technology strategy?

Does the SMB’s cyberdefense technology begin and end with a single firewall or does it have several layers of defenses, including multi-factor authentication (MFA) for logins, policies for regular software and operating system updates, and data storage segmentation to erect better protections around very sensitive data?

A single firewall is no longer effective in guarding an SMB’s information systems against hackers. Every SMB needs a coordinated cyberdefense technology strategy that embodies current tools and techniques to fend off cyberattacks.

 

4. Could the SMB afford to rebuild internal systems and to reimburse customers in the event that customer data were lost in a data breach?

Does the SMB have an incident response plan that will facilitate recovery of its operations and provide for payment of losses and liabilities associated with a breach?  Will a data breach do permanent damage to the SMB’s reputation? In many cases, even a lesser data breach can cost tens or hundreds of thousands of dollars.

Some SMBs are even out of business within six months after a breach because they do not have the financial resources to remediate all the damages caused by the breach. Cyber insurance can cover data breach losses and liabilities and allow an SMB to get back on its feet more quickly and with a minimum of damage to its reputation after the SMB loses data to hackers.

 

5. What data backup procedures has the SMB implemented?

SMBs are particularly susceptible to ransomware attacks that freeze access to systems and data and that effectively shut down the SMB’s operations until a ransom is paid to hackers.

SMBs with robust backup systems that are maintained separate and apart from the SMB’s primary network will be better able to recover frozen data and to resume operations without paying any ransom.

The SMB should regularly test and practice backup recoveries to avoid confusion  when the backup is actually needed.

Wait! Before You Go, Read:

How to Calculate Your Profit Margin High Touch Customer Service: Elevate Your Business Relationships 4 SEO Essentials That SMBs Needs To Push How Artificial Intelligence is Changing Email Marketing Generating Passive Income Online by Offering Services You Might Not Have Thought of Maximizing Efficiency: 5 Must-have Tools for Solopreneurs Traffic from Social NetworksSocial Network Sites – Which One is The Best for Traffic? A Comprehensive Guide to Emotional Marketing Default ThumbnailEssential Ways To Save Money As An Ecommerce Business How To Use A Trading Chatroom As Investors How to Choose a Web Hosting for Your Next Online Project How To Pay for Home Upgrades The Importance Of Text Messaging In Small Businesses 8 Tips For Beginners To Turn Their Business Into A Successful Startup How to Save Money On Smartphone Repairs Without Compromising Quality? Machine Learning and AI in Application Security How to Create a Strong Business Plan How Turbologo Helps Small Businesses Compete with Big Brands How to Become a Commercial Real Estate Broker How to Build A Website Like AlieExpress Quickly 4 Tips for Managing Your Millennial Marketing Team 6 Tips for Choosing the Best Personal Finance App business womanUnderstanding the Industry You’ll Be Entering gmail labsGmail Workspace Labs: The New Features With AI ERP Accounting Software: Preventing Fraud

Filed Under: Small Business Tips, Tools & Resources Tagged With: online security, small business

Comments

  1. Shantanu Sinha says

    November 3, 2017 at 9:55 am

    Hello Erik,

    Very informative post over here 🙂

    This topic is very new for me and getting to learn about this from this post of yours.

    As it stands for, the small and medium sized businesses or the SMBs are the very largely used by both the owners and the
    customers.
    People do shop with in these networks and as they make their payment, their every bank detail is being fitted in their
    servers. So its is a matter of concern that when these data are leaked then there is a question that what about the
    customers every confidential details.

    Thanks for sharing such an informative post among us.

    Shantanu.

  2. Reji Stephenson says

    November 4, 2017 at 9:31 am

    Hi Eric,

    This is a great article about the need for cyber security policies and procedures to follow in a small or medium scale businesses. You have provided really a great information that is very important for the small businesses. To avoid hacking efforts to steal the customers data especially the credit card , debit card, and financial transactions details including the confidential information of the company itself. Efficient cyber security policies and procedures , rigorously following them, back-up plan, after-attack procedures etc… are really good ideas.

    Thanks for sharing.

    Reji Stephenson

  3. Willie says

    November 10, 2017 at 3:18 am

    This is a great article about the need for cybersecurity policies and procedures to follow in a small or medium scale businesses. Thanks a lot for sharing.

  4. Tim says

    January 20, 2020 at 8:18 pm

    Great article! Cybersecurity is becoming a huge issue for online businesses, but most don’t seem to take much interest until a problem occurs.

    Especially if you’re an entrepreneur, or a business of 1, you have to wear so many hats that you as well as your business can even become a target!

Search

Recent Posts

  • 95+ Boutique Bio Ideas for Instagram (Be Creative)
  • 105 Solo Bio Ideas for Instagram (Be Unique)
  • TOP Shine Captions for Instagram: 60+ Bright Quotes
  • 100 Best Bodybuilder Bios for Instagram 💪 (Flex It)
  • What Does Consistency Look Like In Numbers? See It Through An Sip Calculator
  • Mega Casino World: A Trusted Betting Platform in Bangladesh
  • 100 Instagram Bio Ideas for Seafarers (For Sea Life) 🌊
  • How Smarter Transport Choices Can Save You Money
  • 65 Top Professional X (Twitter) Bio – Copy and Paste
  • How to Get More Done with Less: Tools and Team Models for Remote Success
  • Effective Tips to Format Instagram Captions
  • What You Need to Know Before Your First Crazy Time Game
  • +100 Top Comedy Captions for Instagram (Smile+Laugh) 😃😂
  • 70 Top Painful Captions for Instagram 🤕🌧️
  • Which Distribution Software Is Right for You?

Archives

Copyright © 2025 NoPassiveIncome - Privacy & Disclosure Policy