by Mike Yoon
“Most people think that finding a cyber security solution is unnecessary, even unreasonable —due to the cost and the burden of slowing down workflow.”
Cyber security is a concern for everyone. And yet, business owners and managers still overlook this area. However, the reality is that every good business must have strategic cyber security measures in place because clients and customers expect their information to be protected. Even so, cyber attacks will only become more rampant, sophisticated, and complex—which means things are only going to get worse from here on out.
The following are three common myths that business owners believe about cyber security:
Myth #1: “I have antivirus, so I’m protected.”
No, you’re not. There are so many viruses that exist and new ones are created everyday. So, each antivirus software is only able to recognize known viruses from their incomplete database. Plus, by the time the software detects an infection on your computer, it’s too late. The virus is already on your computer. Even worse, the virus may have installed remote access software, giving a hacker complete control over your computer.
Myth #2: “I’m a small business, so no one will target me.”
Nowadays, hackers don’t go phish with just one line. They cast out huge nets to everyone, small and large businesses alike. Big companies tend to have better security, so small and mid-sized companies are more prone to cyber attacks because they are seen as low hanging fruit.
Myth #3: “I use MAC’s, so I don’t need to worry.”
MAC’s used to make up less than 10% of the world’s computer operating systems, but their popularity in the workplace is rapidly growing—so much so, that they’ve become appealing to hackers. Today, the number of viruses created specifically for MACs has risen dramatically. MAC users are often caught off guard – when a virus hits, it hits hard.
3 Helpful Tips for Business Owners:
Passwords should not contain names or words that can be found in the dictionary. A good password should be at least 9 characters made from a combination of uppercase and lowercase letters, numbers, and special characters.
Two factor authentication
On all cloud services, enable two factor authentication. It adds an additional layer of security by requiring a second code before accessing online services. This is usually sent to the user via text or email and is a successful method in securing your online accounts.
Educate your employees
Users are the weakest point of entry in any IT security. Remind employees to be cautious before opening any attachments or clicking any suspicious links. Take the time to educate users on the latest phishing schemes. If they need training, they should contact their IT partner.
It’s true that cyber security can seem over-complicated and troublesome, but you get to determine the short- and long-term security plan for your business. The most important thing about your business’ cyber security is that you have a plan and that you stay knowledgeable. The stress of potentially getting hacked, which lingers in the back of every business owner and manager’s mind, can be taken care of in the hands of the right IT professionals. Business Computing stays current with technology trends, the latest cyber attacks and other IT news to help clients build and refine their custom-designed cyber security plan. If you have any questions about this article, or about how to keep your business cyber safe, feel free to contact us!
Mike Yoon (email@example.com) is the founder of Business Computing (www.buscomp.com), an IT company that delivers superior IT support to small and mid-sized businesses to increase their competitive advantage and grow their business.
Before devoting his work full-time to Business Computing, Mike served/worked as an IT manager for 10 years at a leading law firm in California. He carries over 20 years of professional IT experience, having served clients in numerous industries. While earning his Bachelor’s degree in Business Administration from San Jose State University, he accepted a position at Stanford University in both their Operations Department and their Graduate School of Business. Mike saw the way how this $5.9 billion enterprise utilized IT to scale and grow their own successful organization and was passionate about replicating it to help other companies leverage technology to grow. The move to starting his own IT company was a natural fit. In his free time, Mike loves visiting Lake Tahoe with his wife Amanda. He also enjoys playing volleyball and is fascinated with real wood furniture.