Proton

The key to small business cyber security is a culture of security awareness

Small business cybersecurity is often overlooked, either due to a lack of expertise or funding. This is a mistake. Cyberattacks are costly to mitigate but potentially more costly to recover from after they occur.

There are two things cybercriminals want to steal from your employees: your organization’s data and its money. To get either of those things, usually all they have to do is invent a sufficiently persuasive con.

As a manager, your challenge is to increase the likelihood that, when confronted with, say, a phishing attempt or a fraud email, your employees will be able to recognize the attack and report it. The cost of data breaches and cybercrime is growing(nouvelle fenêtre), and data protection regulations—from the GDPR(nouvelle fenêtre) to its possible US counterpart(nouvelle fenêtre)—now have more teeth(nouvelle fenêtre).

Fortunately, there are simple ways to stay ahead of the cybercriminals. As a data security company, we are uniquely predisposed to having a culture of cybersecurity. Even so, we have instituted policies, conducted cybersecurity awareness training sessions, and implemented systems to reinforce this culture.

In this guide, we’ll share some of our tricks and best practices that we hope can help your organization as well.

Empower a cybersecurity officer and make a plan

As with most projects in any organization, the first step is to designate someone responsible for making sure the job gets done. This person could be from your IT staff, but which department they are from matters less than their willingness to learn about cybersecurity and hold team members accountable for completing training sessions and implementing digital safety practices. The first thing your cybersecurity officer should do is conduct a threat and risk assessment. It should include a detailed overview of:

Assets —  Employee data, client credit cards, trade secrets, money, etc. List the things of value your company holds, where and how they’re stored, and who has access to them currently.

Threats — Hackers, disgruntled employees, competitors, cybercriminals, governments, etc. Be as inclusive and imaginative as possible. You’ll rank these threats later when assessing risks.

Vulnerabilities — Human error, unsecured communications, poor network security, unencrypted service providers, etc. Your past experiences, knowledge of your own systems, and existing research about data breaches can help you here.

Risk — Which teams are more susceptible to threats? Which assets are most valuable? This analysis will help you decide where to focus the most energy.

Countermeasures — Cybersecurity awareness training, end-to-end encryption, access controls, data minimization, etc. Based on the information you’ve already compiled above, you can determine how to mitigate risk.

Armed with a better understanding of the assets, threats, and vulnerabilities within your organization, you can begin implementing countermeasures.

Create a cybersecurity policy and use it regularly

Your small business’s cybersecurity policy should include basic guidelines that all employees must follow. We will go into more detail about cybersecurity policies in future articles, but this should include everything from recommendations about using secure web browsers, email safety tips, VPN requirements, anti-phishing best practices, password recommendations, and more.

As part of your employee onboarding process, everyone on your team should receive a copy. However, to maintain a culture of cybersecurity awareness, cybersecurity officers should regularly refer to this document and issue periodic reminders of its contents. Managers should talk about the cybersecurity policy, too, to emphasize its importance. Your cybersecurity policy isn’t just another boilerplate HR document. Understanding it and following it is part of everyone’s job.

Related article: A cyber security guide for small businesses(nouvelle fenêtre)

Hold regular cybersecurity awareness training sessions

These training sessions should happen soon after a new employee starts and then be updated periodically. The training should emphasize the most important aspects of the cybersecurity policy while also giving employees an understanding of the specific threats your management team has identified. These should be specific to your organization and to your industry. For example, if there are known threats targeting companies similar to yours through certain attack vectors, these training sessions are an excellent opportunity to educate your staff about preventing such attacks.

There are also third-party cybersecurity firms that can help you here. For instance, Sophos offers anti-phishing training simulations(nouvelle fenêtre). Your cybersecurity officer should be tasked with researching and proposing a cost-benefit analysis for contracting outside security vendors.

Some teams or individuals may be more vulnerable to attack than others based on their specialty or level of access. Network administrators, managers, and anyone handling payroll or customer data may need additional training and attention.

3 major cybersecurity best practices

There are a handful of cybersecurity practices that are so important and basic that they should be mandatory in your organization.

Use two-factor authentication (2FA)

— Turning on 2FA for every account that offers it (whether it’s your company Slack or your employee’s Proton Mail account) can help prevent account takeover, which is a major problem for companies and a common source of data exposure.

Be alert for phishing

Phishing attacks(nouvelle fenêtre) use social engineering to entice users to click links, download attachments, or divulge login credentials in efforts to compromise their device or your network. Your employees should be trained to recognize common phishing strategies, to report suspicious emails to your small business’s cybersecurity team, and to always verify emails before clicking a link or responding.

Use strong passwords

— It’s important to use strong passwords that are less likely to be decrypted by hackers in a data breach. We have published information about how to choose a strong password(nouvelle fenêtre) for more details.

Conclusions

The most important thing to remember is that creating a workplace culture of cybersecurity awareness requires buy-in from employees at every level. If management doesn’t view cybersecurity as a priority, then lower-level employees won’t either.

Entry-level employees are often an easy target for hackers and cybercriminals because they have less training and deal with less sensitive information. Yet the information they have in their accounts can be used to devise more damaging social engineering attacks. Junior employees with access to funds can also be more easily tricked into wiring money on behalf of a fake boss(nouvelle fenêtre) or paying bogus invoices.

The primary way to confront these threats is to ensure your employees are always on guard. If you demonstrate that cybersecurity is a priority in your organization, they will be.

Best Regards,
The Proton Mail Team

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(nouvelle fenêtre) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan or donate. Thank you for your support.

Articles similaires

laptop showing Bitcoin price climbing
en
  • Guides vie privée
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
pixel tracking: here's how to tell which emails track your activity
en
Discover what pixel tracking is and how it works, how to spot emails that track you, and how to block these hidden trackers.
A cover image for a blog describing the next six months of Proton Pass development which shows a laptop screen with a Gantt chart
en
  • Nouveautés produits
  • Proton Pass
Take a look at the upcoming features and improvements coming to Proton Pass over the next several months.
The Danish mermaid and the Dutch parliament building behind a politician and an unlocked phone
en
We searched the dark web for Danish, Dutch, and Luxembourgish politicians’ official email addresses. In Denmark, over 40% had been exposed.
Infostealers: What they are, how they work, and how to protect yourself
en
Discover insights about what infostealers are, where your stolen information goes, and ways to protect yourself.
Mockup of the Proton Pass app and text that reads "Pass Lifetime: Pay once, access forever"
en
Learn more about our exclusive Pass + SimpleLogin Lifetime offer. Pay once and enjoy premium password manager features for life.