Small Business Cybersecurity Readiness Checklist

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Small Business Cybersecurity Readiness Checklist-5 Next

Do you or your employees use Wi-Fi?

Wi-Fi can be yet another point of exposure if not properly secured. It's critical that businesses understand the risks of Wi-Fi and how to properly secure it. Be sure to use WPA2 to secure your network and use a strong password. In addition, it's a best practice to create a separate Wi-Fi login for quests logging onto your network. This helps reduce exposure of your regular work Wi-Fi network. In addition, many public Wi-Fi hotspots are easy targets for hackers, and often people don't protect or use the highest level of protection on their home Wi-Fi. It is all the more reason that you should ensure that all employees protect their mobile devices and networks used for work and personal use.

Small and medium-sized businesses (SMBs), vital to the U.S. economy, are vulnerable when it comes to cybersecurity. Small business owners often make the mistake of thinking that their data will have little value to hackers. Yet, financial accounts and employee, customer or partner information are all appealing to cyber criminals, and if SMBs are unprepared, even more accessible.

The cybersecurity experts over at F-Secure have compiled the following information to help small and medium-sized business owners assess their exposure to cyber threats.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.