Small Businesses Encouraged to ‘Take the Pledge’ to Get Educated on Cybersecurity

Kim Mays
Slide Show

Six Security Predictions and Tips for SMBs in 2015

While reading through my Twitter feed, I noticed a post from small business evangelist Ramon Ray to join him and @NortonOnline by pledging to improve your small business’ cybersecurity efforts for 2015. Since it’s still January, and we just kicked off a fresh, New Year, I felt it was a good time to encourage small to midsize businesses (SMBs) to do just that.

In his post on SmallBizTechnology, Ray explains that it’s easy for businesses to get on Twitter and follow the hashtag #CSPledge to read more about how to beef up online security in your small business. Twitter users can also follow @NortonOnline for tips and information on cybersecurity from Norton by Symantec.

The campaign originally started when Norton teamed up with Staples during Cybersecurity Awareness month back in October. However, Ray has begun a fresh partnership with Norton to help SMBs start their year on the right foot, security wise.

BeforeItsNews reported that a Staples survey found that one in four small businesses have no response plan to mitigate damage or loss from a data breach. Considering that the average cost due to loss from a cyberattack is more than $8,000, most small businesses could be one breach away from catastrophe.

Ray says that though data breaches have become all too familiar in the business world, many small businesses think it only happens to large enterprises—not to them. They shouldn’t wait until a breach becomes reality to take steps to prevent attacks and deter significant damage. Norton understands this, says Ray:

Knowing how detrimental the effects of a cyber-attack can be on a small business, Norton wants to go the extra step to help them understand the risks and how they can better protect themselves.

This is a month-long campaign that small businesses really should follow. Through Twitter, many tips and articles will be shared on how your small business can protect itself from cyberattacks.

Kim Mays has been editing and writing about IT since 1999. She currently tackles the topics of small to midsize business technology and introducing new tools for IT. Follow Kim on Google+ or Twitter.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.