SHARE
Facebook X Pinterest WhatsApp

Three Quick Security Tips for Small Businesses

Small businesses often find themselves in the unenviable position of not having IT employees who are trained in security matters. This puts them in a vulnerable position to hackers, who may exploit weaknesses that would have been immediately obvious to someone in the know. Today, I want to highlight some recurrent mistakes that I see […]

Written By
thumbnail
Paul Mah
Paul Mah
Oct 26, 2012

Small businesses often find themselves in the unenviable position of not having IT employees who are trained in security matters. This puts them in a vulnerable position to hackers, who may exploit weaknesses that would have been immediately obvious to someone in the know.

Today, I want to highlight some recurrent mistakes that I see being made by SMBs. If they apply to your organization, acting on my recommendations should serve to bolster the overall security of your organization.

Use WPA or WPA2 encryption for Wi-Fi

Because wireless signals are omnidirectional, they necessitate the use of encryption to prevent other computers from listening in. There have been a number of schemes developed for Wi-Fi encryption over the years, namely WEP, WEP 2, WPA and WPA2. In a nutshell, the WEP and WEP 2 protocols are trivial to crack with tools that are freely available, with even WPA with the TKIP algorithm considered weak.

As such, only WPA with the AES algorithm and the WPA 2 protocols should still be used today. Moreover, it is highly recommended that businesses use a passcode that is longer than the minimum 8-character requirement – at least 20 characters would be ideal.

I have written extensively on the topic of deploying and harnessing Wi-Fi in my SMB Tech blog due to the pivotal role of wireless networking in BYOD (bring your own devices). Two recent blogs about wireless networking that you may want to read up on are Why it makes sense for SMBs to deploy 802.11n Wi-Fi and Upgrading your Wi-Fi network to 802.11n.

Insist on two-factor authentication for Internet banking

The number of financial institutions yet to implement proper two-factor authentication never fails to amaze me.

At a time when one can purchase automated off-the-shelf malware toolkits designed to circumvent certain two-factor implementations, SMBs should not even consider using the Internet banking facilities of a bank that doesn’t offer a second-factor passcode delivered using a hardware token or as a text message.

Check out my post on Three online banking tips for SMBs for more information on this front.

Switch away from Windows XP

If you still have desktops that run Windows XP in your SMB, it is high time to plan for its retirement. The reason is simple: Windows XP will exit all support when it receives its final security update come April 8, 2014.

That’s less than 18 months from now, which isn’t a lot of time for figuring out how to replace those cryptic in-house applications that will only run on Windows XP and for which the original source code has long been lost. Even if that’s not the case, you should consider permanently switching it off, too, due to its poor security features compared to Windows 7 and Windows 8.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.