Do you need help with something?

Share this article

Protecting your business from cyber and fraud risks

Articles
20 Jul 2021

Three essentials of cyber security to keep your business protected

It’s a great feeling as a business when your customers really trust you. And in the digital age, that trust also depends on knowing that you’re keeping their data safe.

Right now, it can feel like a daunting task, with employees working remotely and cybercriminals attempting to exploit small businesses that are not fully prepared for the new norm.

But now is the perfect time to ensure that you have the right defences in place, so that your customers continue to have the confidence in your small business that their data is in safe hands.

This article will explore three components that can keep small businesses secure: VPNs, Mobility and Device Management, and educated employees often referred to as the human firewall.

1. The Virtual Private Network (VPN)

Remote working by its nature involves all employees accessing and sending data outside the protective perimeter of the office.

With employees relying on their own web connections, it’s important for smaller businesses to protect against their data being compromised or stolen – which is where the VPN can come in.

What is it?

A virtual connection between your computer and a remote location, which allows data to be shared securely – as if you were in the office.

How does it work?

VPNs enable users to access a private network securely. The data is encrypted so it can't fall into the wrong hands while it is transferred. Equally, the user’s IP address and location are hidden. Whether you’re accessing company data from an exotic location, or working from the coffee shop down the road, VPNs ensure you have the level of access required to get the job done, anywhere.

Why does my business need it?

  • For employees to securely access company data from a remote location

  • To secure your data traffic

  • To ensure employees can't be traced or identified on third party websites

  • To avoid employees being censored and blocked from services at their remote location

How do I set one up?

Speak to one of our advisors for guidance on deploying a VPN for your staff.

A diagram showing how a VPN operates between you and the internet and regulates all the activity in between, including hackers, ISP, websites and corporate.

2. Mobility and Device Management

With the rise of remote working, many businesses have chosen to allow employees to use their own devices for work.

But with phishing attacks against personal devices trebling in 2019 alone, it’s vital for you to protect every device accessing the network, including mobiles, through Mobility and Device Management.

What is it?

A policy for ensuring your employees can work effectively outside of the office – whether at a customer site, on a business trip, or at home – whilst keeping your company data secure.

Why do I need it?

Employees may be using their own devices or ones provided by your company: either way, these devices need to be protected against cyber threats.

How do I make my business’ devices secure?

There are multiple options for devices, depending on your operating systems:

  • Network-based security solutions can protect devices against viruses, malware and phishing. Not sure what any of these terms mean? Use our Free Smart Search tool to help you cut through the tech lingo by helping you build your digital knowledge.

  • Device management systems allow you visibility and control of devices from a central portal, whether it’s to update software or wipe devices remotely.

  • On-device security services (such as Lookout Mobile Security and Norton Mobile security) can prevent, detect and remediate against threats on your mobile and tablet devices.

3. Educated employees aka Human firewall

Employees have always been one of the most powerful cyber defences for a business. Having a team that’s security-literate becomes even more important when everyone is working remotely.

With the lines between personal and work devices now more blurred than ever, it can be useful to agree on security principles for any device accessing company data. This might include:

Whether personal devices – or only company-issued devices – will be allowed to access company data.

Which operating systems and applications should be allowed to access data.

The minimum-security controls that should be in place, such as passwords, encryption or VPN.

Establishing an IT safety policy, and then running a session that sets out the best security practices for your remote workforce, can help to remind teams of the rules – and why they’re needed to keep the business safe.

Combatting the risks

Smaller organisations have always enjoyed closer relationships with their customers – and that bond can be cemented by knowing that you’re protecting their data. Reassuring customers through your customer communication touchpoints is a great way to for small businesses to display their leadership when it comes to cybersecurity.

A final thought

Being able to log off at night, safe in the knowledge that you have the tools in place to protect your business from cyberattacks and fraud, is a great feeling. If you have any doubts about your cybersecurity approach, take our free business assessment and get recommendations on which areas to improve.

For more detailed information on the tools and technologies you can deploy to keep your business safe, let one of our trusted advisors call you back.

Next Read: Protect your business from email spoofing

More news and insights