{"id":473,"date":"2023-01-24T22:06:19","date_gmt":"2023-01-24T22:06:19","guid":{"rendered":"https:\/\/twelve-minute.com\/blog\/?p=473"},"modified":"2023-02-06T21:14:48","modified_gmt":"2023-02-06T21:14:48","slug":"get-serious-about-cybersecurity","status":"publish","type":"post","link":"https:\/\/twelve-minute.com\/blog\/get-serious-about-cybersecurity\/","title":{"rendered":"Get Serious About Cybersecurity"},"content":{"rendered":"<p>At first, Erik was confused when neither he nor any of his four employees could access anything on his company&#8217;s computer network. &#8220;Nothing was working,&#8221; he says, &#8220;and then it became clear that a hacker had hijacked the network.&#8221;<\/p>\n<p><span data-preserver-spaces=\"true\">This was not a moment Erik had prepared for. In fact, he didn&#8217;t believe that a cyberattack would ever be something he needed to deal with. &#8220;I&#8217;ve seen the statistics that say small businesses are targeted by hackers,&#8221; he says, &#8220;but come on, I really didn&#8217;t think they would even stumble across us. We&#8217;re so small!&#8221;.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Erik&#8217;s belief that his company was too small for hackers to care about is one that many small business owners mistakenly hold. As a result, many are just like Erik\u2014unprepared for an event that has fast become a matter of when, not if, it will happen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">According to several studies, more than 46% of all cyber breaches targeted small businesses, and 82% of ransomware attacks targeted small businesses in\u00a0<a href=\"https:\/\/www.strongdm.com\/blog\/small-business-cyber-security-statistics\">2021<\/a>. All signs point to an escalation in these trends. This is because small businesses are soft targets. Most lack appropriate cyber defenses and are, therefore, low-hanging fruit for hackers.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">There are many ways a hacker could &#8220;stumble&#8221; across your business. The most likely way is that they&#8217;ll get ahold of your and\/or your employees&#8217; email addresses (which are almost certainly available on the dark web) and send an email that contains an infected link or attachment. This is called phishing, and hackers send an estimated\u00a0<a href=\"https:\/\/truelist.co\/blog\/phishing-statistics\/\">3 billion phishing emails\u00a0<em><strong>every day<\/strong><\/em><\/a>. The emails appear to come from a legitimate source such as Microsoft or Amazon and usually paint a scenario that requires your immediate attention so that you&#8217;ll click the link or open the attachment. Once you&#8217;ve done that, they&#8217;ve got you, and that&#8217;s very bad news.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">An astonishing 60% of small businesses shut down after experiencing a cyberattack. Why? Because the costs associated with stopping the attack, cleaning up your network, and recovering your data, plus the revenue losses due to your team being unable to get any work done, can easily run north of $50,000.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The good news is there&#8217;s a lot you can do to prevent a cyberattack. Here are a few steps to take right now:<\/span><\/p>\n<ol>\n<li><strong><span data-preserver-spaces=\"true\">Create and implement a cybersecurity policy<\/span><\/strong><span data-preserver-spaces=\"true\">: Your cybersecurity policy should outline your company&#8217;s approach to cybersecurity, including guidelines for employees and procedures for handling potential security incidents.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Train your employees<\/span><\/strong><span data-preserver-spaces=\"true\">: Employees should be trained on how to recognize and respond to cyber threats, such as phishing emails, and how to use security software and devices. This training should happen annually with short refreshers at least quarterly.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Use strong passwords<\/span><\/strong><span data-preserver-spaces=\"true\">: Passwords should be at least eight characters long and should include a combination of letters, numbers, and special characters.\u00a0<\/span><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/passphrase\"><span data-preserver-spaces=\"true\">Passphrases<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0are an excellent option. Passwords should also be changed regularly.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Keep software updated<\/span><\/strong><span data-preserver-spaces=\"true\">: Only 38% of small businesses update their software regularly. This creates a major vulnerability because software providers release updates to patch security vulnerabilities as they become aware of them. Ensure that all of your software and devices are updated with the latest security patches and updates.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Regularly back up data<\/span><\/strong><span data-preserver-spaces=\"true\">: Regularly backing up data can help you recover from a cyberattack or other data loss. After all, if a hacker locks you out of your data and you have a backup, you can quickly get your people back to work.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Use firewalls and antivirus software<\/span><\/strong><span data-preserver-spaces=\"true\">: Firewalls can help prevent unauthorized access to your company&#8217;s network, while antivirus software can detect and remove malware.<\/span><\/li>\n<\/ol>\n<p>A cyberattack is one of the most severe threats to your business&#8217;s stability and success. You need to get serious about protecting your company from this threat today.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span data-preserver-spaces=\"true\">Free Resource<\/span><\/strong><span data-preserver-spaces=\"true\">: Take my free\u00a0<strong>cybersecurity risk assessment<\/strong>\u00a0to learn what your vulnerabilities may be. You can\u00a0<a href=\"https:\/\/my.askcoda.com\/#\/guest-assessment\/2\/0\">access it here<\/a>. It takes about 10 minutes to complete.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span data-preserver-spaces=\"true\">Free Resource<\/span><\/strong><span data-preserver-spaces=\"true\">: For a limited time, take my free online course,\u00a0<strong>Cybersecurity Essentials for Small Business Owners<\/strong>, and access a ton of great resources to help you begin implementing cybersecurity in your business.\u00a0<a href=\"https:\/\/training.askcoda.com\/course\/view.php?id=19\">Enroll here<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At first, Erik was confused when neither he nor any of his four employees could access anything on his company&#8217;s computer network. &#8220;Nothing was working,&#8221; he says, &#8220;and then it became clear that a hacker had hijacked the network.&#8221; This was not a moment Erik had prepared for. In fact, he didn&#8217;t believe that a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":474,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/posts\/473"}],"collection":[{"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":3,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"predecessor-version":[{"id":491,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/posts\/473\/revisions\/491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/media\/474"}],"wp:attachment":[{"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/twelve-minute.com\/blog\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}