Cybercriminals prey on SMBs
Corporations aren’t the only victims of cybercrime, hacking and data breaches. Small to medium size businesses (SMBs) are increasingly falling prey to crafty cybercriminals, having to cope with data loss, loss of productivity and the financial repercussions that linger on long after the event.
The Bring Your Own Device (BYOD) concept is popular in the SMB world, with more companies encouraging their employees to use their personal laptop, smartphone or tablet for work purposes. As liberating this may be for both management and staff, BYOD leaves SMBs vulnerable to cybercriminal activity if a sound and robust adherence policy is not enforced. Some companies don’t have any BYOD policies in place. Although SMBs have learnt to prioritise network security, many underestimate hackers and their ability to access networks via defenceless mobile technology.
Following a data breach, a SMB can acquire an irreparable blow to its brand and reputation as clients leave to find a more reliable and trustworthy supplier. In the worst case scenario, a significant data breach can result in bankruptcy for the already financially challenged small business. Even if a SMB doesn’t face closure, it may very well have to deal with lengthy and expensive litigation as part of a client reparation package.
Do more than talk
While management of many SMBs view their network and IT infrastructure security as a top priority, they fail to follow through and don’t implement a sustainable BYOD policy. A recent study revealed that less than 20% of SMBs have a BOYD strategy to counter potential hacking and data loss. The lack of clear BYOD user guidelines is exacerbated by the fact that less than 40% of mobility policies have a defined protocol for lost or stolen devices.
To further add to the problem, companies that do have a BYOD scheme in place often don’t consider all the angles covering essential aspects of mobile device security. SMB IT policy makers often omit critical components such as public Wi-Fi accessibility, secure data storage and transmission and limitations for personal use.
When SMBs do more than talk with respect to BYOD policy, they can be assured that their network and data will not fall into the hands of designing cybercriminals. An enlightened SMB will engage with the services of a Managed Service Provider (MSP) to apply effective BYOD in the workplace and monitor mobile device endpoints.
Setting the boundaries
A sound mobility policy is underpinned by acceptable and unacceptable user conduct. Your initial BYOD strategy doesn’t need to pin down every detail. Rather, to coin a cliché, start small and think toward a big future. Your policy will be modified as your business grows and technology evolves.
From the outset, set some fundamental user ground rules for BYOD. By easing your employees into vigilance regarding mobile device security and risks means you’ll get less opposition and more support. As time goes by, you can introduce additional user restrictions without being thought of as a tyrant.
Here are some BYOD user principles that should form the basis of your policy:
- indicate which devices employees can use and which are not permissible
- show your staff how to select strong passwords; encourage them to change these regularly
- set restrictions for downloading third party apps
- define which data is company property
- explain how company data is to be edited, saved, transmitted and shared
- highlight the repercussions and disciplinary action for those who abuse the policy
Mobile device management
Mobile Device Management (MDM) services are available through your MSP and won’t put you out of pocket. The MDM services are proactive and will ensure that your IT department efficiently manages and monitors mobile devices accessing your network. The BYOD management is centralised, meaning that devices are appropriately configured for business operations, and data sharing and modification is secure.
MDM services encompass:
- specifying password policy
- enforcing encryption settings
- remotely locating, locking and wiping out stolen or lost devices
- removing company data without compromising personal files
- enabling real diagnosis of device and user issues
- applying real time resolution of device and user issues
Stay safe and secure
Keeping your network and data safe and secure is prerequisite for your business to thrive. Forget that adage ‘it’ll never happen to us’ – nobody is immune to cybercrime. Partnering with an experienced and resourceful MSP means comprehensive MDM that will all but eradicate the risk of hacking and data loss. Be proactive, enjoy BYOD but impose a mandatory user policy.
24/7 MAC & PC SUPPORT
With our unique zero minute response, direct-to-engineer support model we have a 99.9% client retention rate since 2006.
With face to face strategy and account management, we are a trusted extension of your business. We remove the blame shifting culture, by dealing with third-party providers on your behalf and provide simplified jargon-free solutions at predictable rates with our flat free unlimited support and services model.
Some of our clients include Edmond De Rothschild, Smart Meter GB and FMB.
#ZheroIT
#weloveIT
High IT Cost? #ZheroIT
Cyber Security Concern? #ZheroIT