Cybersecurity, Part II

Last time, we looked at some reasons to start thinking about cybersecurity for your business. You may have found yourself asking, ā€œOk, how can I protect myself?ā€ Below is a high-level overview of three fundamental aspects of cybersecurity, as well as some resources for further study. This technology doesnā€™t take a genius to understand, just a little patience and willingness to learn. Your businessā€™s survival may depend on it.

Firewalls

ā€œFirewallā€ may be a term we are all familiar with, but many of us donā€™t know what exactly a firewall is. According to cisco.com, ā€œA firewall is a network security device that monitors incoming and outgoing network traffic based on a defined set of security rules.ā€ Basically, a firewall will use filters to keep certain pieces of information out of your network. Most firewalls will let you choose which filters you want. In a post on their website, Comodo explains that firewalls can be configured to ā€œprevent access to certain websites,ā€ ā€œprevent employees from sending certain types of emails,ā€ and ā€œprevent outside computers from accessing computers inside the network.ā€ Some operating systems have firewalls built-in, including Mac OSX and Microsoft Windows. According to Microsoft, setting up a firewall is ā€œthe most effective and important first step you can take to help protect your computer.ā€

Firewalls can often act as your router, and even have ā€œmore advanced features that are designed to offer a superior level of [defense],ā€ as opposed to a normal router, according to Manx Technology Group. For this reason, they recommend a firewall for a small business, rather than a traditional router. MTG goes on to list various features you will want when choosing a firewall. These include:

  • ā€œInternet connection supportā€
  • ā€œWireless supportā€
  • ā€œAntivirusā€
  • ā€œIntrusion Prevention Serviceā€
  • ā€œWeb filteringā€
  • ā€œReportingā€
  • ā€œVirtual Private Networks (VPN)ā€
  • ā€œTechnical supportā€

Popular vendors of firewalls include Cisco, Fortinet, and Sophos.

Antivirus software

Geeks On Site offer the following explanation of antivirus software: ā€œAntivirus software, sometimes known as anti-malware software, is design to detect, prevent and take action to disarm or remove malicious software from your computer such as viruses, worms, and Trojan horses.ā€ They go on to list the three scanning detection processes antivirus software uses:

Specific Detection, Generic Detection, and Heuristic Detection. Specific Detection ā€œworks by looking for known malware by a specific set of characteristics.ā€ Generic Detection ā€œlooks for malware that are variants of known ā€˜families,ā€™ or malware related by a common codebase.ā€ Heuristic Detection ā€œscans for previously unknown viruses by looking for known suspicious behavior or file structures.ā€

In a March 2007 article for TechRepublic, Erik Eckel lists 10 thing to look for in an antivirus application. These were:

  • ā€œPotencyā€
  • ā€œLow overheadā€
  • ā€œCentralized administrationā€
  • ā€œEmail protectionā€
  • ā€œCompatibilityā€
  • ā€œEffective reporting toolsā€
  • ā€œTechnical supportā€
  • ā€œCertificationā€
  • ā€œSimplified licensingā€
  • ā€œReasonable costā€

Techradar offers suggestions on which antivirus software to use for your business: http://www.techradar.com/news/best-business-antivirus-8-top-paid-security-tools-for-small-businesses

Data backup

Losing data can be the ultimate business killer. According to atlantatech.net, ā€œthe cost of lost or stolen data access is estimated at $1.7 billion per year,ā€ industry-wide. Backing up your data is the simplest step you can take to avoid these huge costs. In a 2014 article for CIO, Paul Mah advises that businesses use the ā€œ2+1ā€ strategy. ā€œFor critical data,ā€ he says, ā€œbusinesses should make two full copies, maintained on separate physical devices. In addition, a third copy should be kept offline, preferably stashed at another location.ā€ He points out that having one copy in a different location ā€œprotects a business from fires, floods and other localized natural disasters.ā€

Cloud backup solutions are gaining traction among small business owners these days, with companies like Carbonite, CrashPlan, and Backup Blaze being major players in the field. The previously mentioned Atlanta Tech article gives the following as factors to consider when choosing a cloud backup provider:

  • ā€œIs Public, Private, or Hybrid Cloud the Best Bet for Your Business?ā€
  • ā€œWhich Type of Backup Schedule is Best for You?ā€
  • ā€œDo They Offer Sufficient Flexibility for Your Storage and Scalability Needs?ā€
  • ā€œHow are Their Uptime Guarantees?ā€
  • ā€œDo They Offer Sufficient Data Security and Compliance?ā€
  • ā€œDo You Have Adequate Bandwidth?ā€
  • ā€œIs There an Opportunity for Unified Business Communications?ā€

While cloud backup is the hip thing to use, Paul Mah recommends tape storage technology for your backup.

There are plenty of options out there for Cybersecurity. It all may seem a little overwhelming at first, but the important thing to do is educate yourself. Below, Iā€™ve listed some resources that can be very useful in learning what security you need, how that security works, and what the options available are. Be sure to check them out, and ask your SBDC counselor about the Cybersecurity Workbook.

For further reading:

https://www.cio.com/article/2378019/small-business/how-to-build-a-storage-and-backup-strategy-for-your-small-business.html

https://www.techrepublic.com/article/10-things-to-look-for-in-an-antivirus-application/

http://www.techrepublic.com/blog/10-things/10-things-to-look-for-in-a-hardware-based-firewall/

https://www.comodo.com/resources/home/how-firewalls-work.php

Scroll to Top