{"id":40676,"date":"2021-07-22T20:07:48","date_gmt":"2021-07-23T00:07:48","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?page_id=40676"},"modified":"2025-10-10T10:33:03","modified_gmt":"2025-10-10T14:33:03","slug":"budget-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com\/blog\/budget-cybersecurity\/","title":{"rendered":"Low Budget Hub"},"content":{"rendered":"<p><script async=\"\" defer>\nconst sections = [\n    {\n        title: `How to spend less on IT`,\n        description: `Free and inexpensive alternatives to well-known software, signs of mining, outsourcing vs. in-house expertise.`,\n        elementId: \"section-how-to-spend-less-on-it\",\n        cards: [\n            {\n                title: ` How to use free alternatives to popular software`,\n                desktopElementId: \"card-11\",\n                elementId: \"card-use-free-alternatives\",\n                shortText: `<\/script><\/p>\n<ul>\n<li>Free office applications: <a href=\"https:\/\/www.openoffice.org\/\" target=\"_blank\" rel=\"noopener nofollow\">OpenOffice<\/a>, <a href=\"https:\/\/www.libreoffice.org\/discover\/libreoffice-vs-openoffice\/\" target=\"_blank\" rel=\"noopener nofollow\">LibreOffice<\/a>, iWork.<\/li>\n<li>Free <a href=\"https:\/\/www.kaspersky.com\/blog\/collaboration-solutions\/35740\/\" target=\"_blank\" rel=\"noopener nofollow\">cloud-based products<\/a>, such as Google Docs, but with privacy settings.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>For working with documents, consider free office suites such as <a href=\"https:\/\/www.openoffice.org\/\" target=\"_blank\" rel=\"noopener nofollow\">OpenOffice<\/a>, <a href=\"https:\/\/www.libreoffice.org\/discover\/libreoffice-vs-openoffice\/\" target=\"_blank\" rel=\"noopener nofollow\">LibreOffice<\/a> and iWork for macOS, or the online alternative, <a href=\"https:\/\/www.kaspersky.com\/blog\/collaboration-solutions\/35740\/\" target=\"_blank\" rel=\"noopener nofollow\">Google Docs<\/a>. Like their premium siblings, they work with text, tables, presentations, and images (just don't leave files accessible through links, which also leaves them open to Internet searches);<\/li>\n<li>Automate work with clients using free CRM systems with limited functionality such as <a href=\"https:\/\/www.hubspot.com\/products\/crm\" target=\"_blank\" rel=\"noopener nofollow\">HubSpot<\/a> and <a href=\"https:\/\/www.agilecrm.com\/pricing\" target=\"_blank\" rel=\"noopener nofollow\">Agile<\/a>.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to spend less on security`,\n                desktopElementId: \"card-12\",\n                elementId: \"card-spend-less\",\n                shortText: `<\/p>\n<ul>\n<li>Install free security solutions from the <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-free-goes-global\/17811\/\" target=\"_blank\" rel=\"noopener nofollow\">developers' official websites<\/a>.<\/li>\n<li>Consider special offers for small businesses.<\/li>\n<li>Use the free trial.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Choose free security solutions based on <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-awards-2020\/39110\/\" target=\"_blank\" rel=\"noopener nofollow\">independent testing<\/a>, and download them <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-awards-2020\/39110\/\" target=\"_blank\" rel=\"noopener nofollow\">directly from the developer's site<\/a>. They'll have fewer functions or limited options in comparison with paid products, but they're loads better than no security at all;<\/li>\n<li>Read up on what's available for small businesses. Solutions for SMBs aren't free, but they come with more features than the free alternatives do \u2014 and exactly the ones small companies need;<\/li>\n<li>Download and evaluate the trial version before committing to a paid security solution.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to use pirated software safely`,\n                desktopElementId: \"card-13\",\n                elementId: \"card-use-pirated-software\",\n                shortText: `<\/p>\n<ul>\n<li>You cannot. <a href=\"https:\/\/www.kaspersky.com\/blog\/how-pirates-hook-gamers\/25634\/\" target=\"_blank\" rel=\"noopener nofollow\">Cracked software is not safe to use<\/a>.<\/li>\n<li>Do not download.<\/li>\n<li>Do not use.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-pirates-hook-gamers\/25634\/\" target=\"_blank\" rel=\"noopener nofollow\">You can't<\/a>;<\/li>\n<li>Don't download pirated copies, which often contain <a href=\"https:\/\/www.kaspersky.com\/blog\/hidden-miner-nhash\/20598\/\" target=\"_blank\" rel=\"noopener nofollow\">Trojans and miners<\/a>;<\/li>\n<li>Don't use hacked versions of programs, which do not contain the fixes and patches developers release regularly to prevent cybercriminals from exploiting them.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to avoid paying a hidden miner's electricity bills`,\n                desktopElementId: \"card-14\",\n                elementId: \"card-avoid-paying\",\n                shortText: `<\/p>\n<ul>\n<li>Watch your devices for new <a href=\"https:\/\/www.kaspersky.com\/blog\/hidden-miners-botnet-threat\/18488\/\" target=\"_blank\" rel=\"noopener nofollow\">instances of slowness and unusually loud noise<\/a>.<\/li>\n<li>Watch for sudden changes in your electricity bills.<\/li>\n<li>Scan your system regularly with an antivirus.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Keep an eye on how your devices are working. If a computer is slowing down, making a lot of noise, and overheating even when no one is using it, someone may be <a href=\"https:\/\/www.kaspersky.com\/blog\/hidden-miners-botnet-threat\/18488\/\" target=\"_blank\" rel=\"noopener nofollow\">running a miner on the device<\/a>, overloading the processor or the graphics card;<\/li>\n<li>Keep an eye on the electricity meter. A spike in your electricity bill may also be a sign of resource-hungry miners;<\/li>\n<li>Run full scans regularly, using an antivirus utility that detects both malicious programs and <a href=\"https:\/\/www.kaspersky.com\/blog\/not-a-virus\/18015\/\" target=\"_blank\" rel=\"noopener nofollow\">potentially unwanted ones<\/a>.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: `How to choose between having an internal IT specialist, contracting with a tech-support generalist, or splitting up IT responsibilities among various non-IT employees`,\n                desktopElementId: \"card-15\",\n                elementId: \"card-choose-between\",\n                shortText: `<\/p>\n<ul>\n<li>Option 1: Allocate IT tasks among your employees.<\/li>\n<li>Option 2: Call an outside professional to configure and protect your network and applications.<\/li>\n<li>Option 3: Hire an IT professional who will understand your business.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>If you don't need to do anything harder than connecting a printer or installing a few programs, provided you don't have any servers or confidential data, you may be able to rely on a non-IT employees.<\/li>\n<li>For tasks such as setting up your network, software, and security, try an outside specialist. They won't have a deep understanding of your needs, but they can get you started and draft a set of instructions for you as well;<\/li>\n<li>If you need someone who understands the ins and outs of your business, someone who can offer tailored solutions to meet your goals and monitor the infrastructure's development, you need your own IT specialist.<\/li>\n<\/ul>\n<p>`,\n            },\n        ],\n    },\n    {\n        title: `How to safeguard client databases, reports, and other important data`,\n        description: `Secure data storage, protection against both accidental and deliberate employee actions, and basic steps to prevent ransomware attacks.`,\n        elementId: \"section-how-to-safeguard-client-databases\",\n        cards: [\n            {\n                title: ` How to mitigate employee mistakes`,\n                desktopElementId: \"card-21\",\n                elementId: \"card-mitigate\",\n                shortText: `<\/p>\n<ul>\n<li>Train your employees in cybersecurity basics.<\/li>\n<li>Restrict access and permissions for employee accounts.<\/li>\n<li>Administrator permissions are for the administrator only.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Teach everyone cybersecurity basics: creating and storing passwords, protecting against phishing, avoiding data leaks, and browsing the Web safely;<\/li>\n<li>Ensure your employees use standard accounts <a href=\"https:\/\/www.kaspersky.com\/blog\/av-last-line-defense\/5912\/\" target=\"_blank\" rel=\"noopener nofollow\">without admin rights<\/a>, so that they cannot install programs \u2014 or, accidentally, malware \u2014 on their own. If someone needs to install software, download it yourself from a trusted source;<\/li>\n<li>Protect admin accounts on employees' computers with a password that only you and the system administrator know.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to protect data if a laptop is lost, stolen, or broken`,\n                desktopElementId: \"card-22\",\n                elementId: \"card-protect-data\",\n                shortText: `<\/p>\n<ul>\n<li>Enable <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/encryption\" target=\"_blank\" rel=\"noopener nofollow\">data encryption<\/a> on all devices.<\/li>\n<li>Set up regular <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener nofollow\">backup<\/a> of important files.<\/li>\n<li>Create <a href=\"https:\/\/www.kaspersky.com\/blog\/smb-backups-reasons\/36322\/\" target=\"_blank\" rel=\"noopener nofollow\">a master image<\/a> of the operating system.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Enable full-disk data encryption on all employee devices so that even if a laptop (or smartphone) falls into the wrong hands, the hard drive won't be accessible without the password;<\/li>\n<li>Store backup copies of important files in a secure cloud or on an external hard drive. Back up files on a regular basis so that you can recover as much information as possible should the need arise;<\/li>\n<li>Create a system <a href=\"https:\/\/www.kaspersky.com\/blog\/smb-backups-reasons\/36322\/\" target=\"_blank\" rel=\"noopener nofollow\">image<\/a>. That way, if the hard drive fails, you can use the image to restore the system on a new device and continue working.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to protect against internal sabotage`,\n                desktopElementId: \"card-23\",\n                elementId: \"card-internal-sabotage\",\n                shortText: `<\/p>\n<ul>\n<li>Restrict employee <a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/preventing-insider-activity\/\" target=\"_blank\" rel=\"noopener\">access permissions<\/a>.<\/li>\n<li>Run regular audits of permissions.<\/li>\n<li>Establish the rule: lock your PC whenever you leave your workstation.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li><a href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/preventing-insider-activity\/\" target=\"_blank\" rel=\"noopener\">Limit access rights<\/a> so that each user sees only the data they need to do their job;<\/li>\n<li>Review who has access to what on a regular basis, and adjust the access settings of any employee who changes positions or leaves the company;<\/li>\n<li>Require employees to lock their computer screens any time they step out of sight, even for brief breaks.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to protect against ransomware`,\n                desktopElementId: \"card-24\",\n                elementId: \"card-ransomware\",\n                shortText: `<\/p>\n<ul>\n<li>Set up regular <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener nofollow\">backup<\/a> of important files.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/small-business-security\/small-office-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a>.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/39911\/\" target=\"_blank\" rel=\"noopener nofollow\">Update all software<\/a> as soon as updates become available.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Regularly <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener nofollow\">back up important files<\/a> in a cloud service and on alternative hardware \u2014 on a hard drive or a NAS \u2014 so you'll still have it even if ransomware captures or blocks your data. If you use a hard drive for backup, disconnect it after every session. For a NAS, ensure proper configuration;<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/small-business-security\/small-office-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener nofollow\">reliable security solution<\/a> to detect threats in e-mail attachments or on USB flash drives, identify malicious processes in the system, and roll everything back if necessary;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/5-things-that-you-must-update-asap\/39911\/\" target=\"_blank\" rel=\"noopener nofollow\">Update the operating system, antivirus, browser, and every program<\/a> you work with as soon as new updates become available, to fix vulnerabilities through which ransomware can infiltrate.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to store and share data securely`,\n                desktopElementId: \"card-25\",\n                elementId: \"card-store-and-share\",\n                shortText: `<\/p>\n<ul>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/blog\/vpn-what-you-need-to-know\/14468\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a> when connecting to unfamiliar networks.<\/li>\n<li>Store and encrypt important data.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a>.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/blog\/vpn-what-you-need-to-know\/14468\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a> whenever you connect to a <a href=\"https:\/\/www.kaspersky.com\/blog\/vpn-what-you-need-to-know\/14468\/\" target=\"_blank\" rel=\"noopener nofollow\">public Wi-Fi hotspot<\/a> or other networks that you can't control. Using a VPN transmits your data over an encrypted channel, preventing interception; <\/li>\n<li>Protect important data by sending and storing it in an encrypted archive, and sending the archive password separately, by another means of communication;<\/li>\n<li>Choose a cloud service with two-factor authentication <a href=\"https:\/\/www.kaspersky.com\/blog\/collaboration-solutions\/35740\/\" target=\"_blank\" rel=\"noopener nofollow\">for storing important files<\/a>  \u2014 and investigate available platforms before settling on one.<\/li>\n<\/ul>\n<p>`,\n            },\n        ],\n    },\n    {\n        title: `How to organize your company's internal and external communication`,\n        description: `Secure Internet connection, rules of hiring and firing, protecting corporate accounts from hacking, and setting up personal devices.`,\n        elementId: \"section-how-to-organize-communication\",\n        cards: [\n            {\n                title: ` How to secure your Internet connection`,\n                desktopElementId: \"card-31\",\n                elementId: \"card-internet-connection\",\n                shortText: `<\/p>\n<ul>\n<li>Replace <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-wifi-from-neighbors\/39039\/\" target=\"_blank\" rel=\"noopener nofollow\">the router's factory settings<\/a> with secure ones.<\/li>\n<li>Update your router firmware regularly.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/blog\/vpn-what-you-need-to-know\/14468\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a> when connecting to unfamiliar networks.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Set <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-wifi-from-neighbors\/39039\/\" target=\"_blank\" rel=\"noopener nofollow\">your own username and password<\/a> instead of the default ones to access router settings. Select WPA2\/WPA3 encryption in the settings and set a strong password for the Wi-Fi network. Disable the WPS feature in the router settings as well; <\/li>\n<li>Update the router's firmware regularly to patch vulnerabilities;<\/li>\n<li>Use a VPN when connecting to public Wi-Fi.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How and where it is best to communicate with colleagues and clients`,\n                desktopElementId: \"card-32\",\n                elementId: \"card-communicate\",\n                shortText: `<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/remote-work-security\/34258\/\" target=\"_blank\" rel=\"noopener nofollow\">Send business email<\/a> strictly from your corporate account.<\/li>\n<li>Set up encryption on your mail server or client.<\/li>\n<li>Always use end-to-end encryption.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/remote-work-security\/34258\/\" target=\"_blank\" rel=\"noopener nofollow\">Use corporate e-mail for work<\/a> so that recipients don't mistake you for a spammer;<\/li>\n<li>Use the encryption options your mail server or client offers. For example, you can enable encryption in services like Outlook.com, Gmail, or in the free Thunderbird e-mail client;<\/li>\n<li>Use end-to-end encryption if you discuss confidential information in messaging apps. For example, it is available in WhatsApp and Signal, and in <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security\/\" target=\"_blank\" rel=\"noopener nofollow\">Telegram's secret chats<\/a>.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to protect your social media and marketplace accounts from hackers and theft`,\n                desktopElementId: \"card-33\",\n                elementId: \"card-protect-social-media\",\n                shortText: `<\/p>\n<ul>\n<li>Use a unique password containing at least twelve characters of various types for each of your accounts.<\/li>\n<li>Turn on <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a>.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Create a strong and unique password for each account. In addition to whatever constraints the service requires, choose passwords with at least twelve characters, including uppercase and lowercase letters, numbers, and special characters;<\/li>\n<li>Enable <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> wherever it's an option, and if possible, choose a an app such as Google Authenticator as the second factor;<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>, which also ensures you don't duplicate passwords.<\/li>\n<li>If you or any program finds a compromised password, change it immediately.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to safely hire and let go of employees`,\n                desktopElementId: \"card-34\",\n                elementId: \"card-safely-hire\",\n                shortText: `<\/p>\n<ul>\n<li>Create an IT security NDA and <a href=\"https:\/\/www.kaspersky.com\/blog\/security-awareness-basic-instruction\/40416\/\" target=\"_blank\" rel=\"noopener nofollow\">manual<\/a>.<\/li>\n<li>Do not give access to important data before the employee signs these documents.<\/li>\n<li>Revoke all permissions and block all access immediately <a href=\"https:\/\/www.kaspersky.com\/blog\/fired-insider\/38381\/\" target=\"_blank\" rel=\"noopener nofollow\">upon the employee's termination<\/a>.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Have new employees sign an NDA, and draw up <a href=\"https:\/\/www.kaspersky.com\/blog\/security-awareness-basic-instruction\/40416\/\" target=\"_blank\" rel=\"noopener nofollow\">a list of basic IT security rules<\/a> for them;<\/li>\n<li>Grant full access to projects and client data only after a new employee has signed those documents;<\/li>\n<li>Terminate all access rights, disable remote access, and change passwords for former employees' corporate accounts  as <a href=\"https:\/\/www.kaspersky.com\/blog\/fired-insider\/38381\/\" target=\"_blank\" rel=\"noopener nofollow\">soon as possible<\/a>.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: ` How to secure personal devices employees use for work`,\n                desktopElementId: \"card-35\",\n                elementId: \"card-secure-devices\",\n                shortText: `<\/p>\n<ul>\n<li>Set your smartphone to lock the screen automatically and enable the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-theft-proof-your-smartphone\/40090\/\" target=\"_blank\" rel=\"noopener nofollow\">Find My Device<\/a> feature.<\/li>\n<li>Block installation of mobile apps from third-party sources.<\/li>\n<li>Insist on employees installing protection on their home computers and mobile devices.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Set a screen lock on smartphones and tablets that kicks in after no more than 5 minutes of inactivity. Enable the Find my iPhone (iOS) or Find My Device (Android) features, or install a specialized app if your device lacks the capability, to protect work files in case the <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-theft-proof-your-smartphone\/\" target=\"_blank\" rel=\"noopener nofollow\">device is stolen or lost<\/a>.<\/li>\n<li>Ask employees to block the installation of apps from unknown third-party sources on their mobile devices, to reduce the risk of accidental malware installation;<\/li>\n<li>Install security programs on home computers and mobile devices as well. If the corporate license doesn't cover everything, opt for a <a href=\"https:\/\/www.kaspersky.com\/blog\/make-your-passwords-stronger-with-kaspersky-password-manager\/40269\/\" target=\"_blank\" rel=\"noopener nofollow\">solution for home users<\/a>.<\/li>\n<\/ul>\n<p>`,\n            },\n        ],\n    },\n    {\n        title: `How to stay prepared for an IT security emergency`,\n        description: ``,\n        elementId: \"section-how-to-stay-prepared\",\n        cards: [\n            {\n                title: `How to get informed about possible cybersecurity gaps`,\n                desktopElementId: \"card-41\",\n                elementId: \"card-get-informed-about-gaps\",\n                shortText: `<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/what-cybercriminals-are-hunting-for\/45935\/\" rel=\"noopener nofollow\">Identify your critical business assets and systems<\/a>;<\/li>\n<li>Monitor <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/\" rel=\"noopener nofollow\">relevant cybersecurity news<\/a>;<\/li>\n<li>Test the stability of your information systems regularly.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/what-cybercriminals-are-hunting-for\/45935\/\" rel=\"noopener nofollow\">Identify your critical business assets and systems<\/a> to make sure that these assets are protected;<\/li>\n<li>Monitor <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/\" rel=\"noopener nofollow\">relevant cybersecurity news <\/a>to understand the kind of attacks your company should be aware of, and if your security strategy provides the necessary protection against them;<\/li>\n<li>Test the stability of your systems to see if they can withstand to outage. Use special tools, such as <a target=\"_blank\" href=\"https:\/\/netflix.github.io\/chaosmonkey\/\" rel=\"noopener nofollow\">Chaos Monkey<\/a> to check whether your services are resilient to accidental power failures.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: `How to train your employees to react properly`,\n                desktopElementId: \"card-42\",\n                elementId: \"card-train-employees\",\n                shortText: `<\/p>\n<ul>\n<li>Let your employees know <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/symptoms-of-infection\/45966\/\" rel=\"noopener nofollow\">how to spot an incident<\/a>;<\/li>\n<li>Assign roles within your team in the event of an incident;<\/li>\n<li>Conduct internal emergency drills regularly;<\/li>\n<li>Check your capabilities to restore backed-up files periodically.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Inform your employees <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/symptoms-of-infection\/45966\/\" rel=\"noopener nofollow\">how to spot an incident<\/a> on their device and what they should do about it;<\/li>\n<li>Assign roles within your team in advance. In case of emergencies, consider who will oversee managing the incident in general, who looks after the technical elements and who takes care of communications;<\/li>\n<li>Regularly conduct internal emergency drills to test how the team can deal with the unavailability of a number of IT systems;<\/li>\n<li>Periodically check your restoring capabilities to make sure that you really can rely on your backups and instantly recover all the crucial data in an emergency.<\/li>\n<\/ul>\n<p>`,\n            },\n            {\n                title: `How to keep your business process stable`,\n                desktopElementId: \"card-43\",\n                elementId: \"card-keep-business-process\",\n                shortText: `<\/p>\n<ul>\n<li>Backup all the critical documents;<\/li>\n<li>Make a list of key contacts you can reach if there's a problem;<\/li>\n<li>Develop and approve emergency statement templates;<\/li>\n<li>Maintain information about action plans in emergency situations offline.<\/li>\n<\/ul>\n<p>`,\n                text: `<\/p>\n<ul>\n<li>Backup all the crucial documents to have an access to them in case of emergency;<\/li>\n<li>Make a list of key contacts you can contact if there's a problem. Think of who you can turn to in case of a cyber incident, including partners, suppliers, banks, IT providers, and incident response services;<\/li>\n<li>Develop and approve emergency statement templates in advance for customers and partners to inform them in a timely fashion about problems you faced and measures you are taking to eliminate the consequences;<\/li>\n<li>Information about action plans and communications in emergency situations should also be stored offline, as IT systems may not be available.<\/li>\n<\/ul>\n<p>`,\n            },\n        ],\n    },\n];\n    <\/p>\n<link rel=\"stylesheet\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/02\/10073445\/owl.carousel.min_.css\">\n    <script src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/02\/10073449\/owl.carousel.min_.js\"><\/script>\n<link rel=\"stylesheet\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/10\/10095445\/budget-cybersecurity-en.css\">\n<div class=\"low-budget\">\n<div class=\"hero\">\n<div class=\"container\">\n<div class=\"hero__title\">\n        Cybersecurity<br> on a budget\n      <\/div>\n<div class=\"hero__subtitle\">\n        Security for your small business\u00a0\u2014 fast and cheap or at no cost at all \u2014 in a 5-minute read\n      <\/div>\n<\/div>\n<\/div>\n<div class=\"content content_desktop\">\n<div class=\"container\"><\/div>\n<p>        <!--div id=\"quiz\"><\/div-->\n      <\/p><\/div>\n<div id=\"mobile_a\" class=\"content content_mobile content_mobile_a\">\n<div class=\"container\"><\/div>\n<\/div>\n<div id=\"mobile_b\" class=\"content content_mobile content_mobile_b\">\n<div class=\"container\"><\/div>\n<\/div>\n<div id=\"mobile_c\" class=\"content content_mobile content_mobile_b content_mobile_c\">\n<div class=\"container\"><\/div>\n<\/div>\n<p>      <!----><\/p>\n<div id=\"quiz\"><\/div>\n<div class=\"sticky\">\n        <a class=\"sticky-content\" href=\"#quiz\" target=\"_blank\" rel=\"noopener\">Go to personal recommendations<\/a>\n      <\/div>\n<div class=\"quiz\">\n<div class=\"container\">\n<div class=\"section section_dark\">\n<div class=\"hero__title\" data-element-id=\"section-quiz\">\n              Take our quiz to get personalized cybersecurity advice\n            <\/div>\n<p>            <button id=\"reset\" data-quiz-repeat=\"1\" style=\"display: none\"><br>\n              Take the quiz again<br>\n            <\/button><\/p>\n<div id=\"questions\"><\/div>\n<div id=\"advices\" class=\"owl-carousel\" style=\"opacity: 0\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"banner banner-desktop\">\n<div class=\"container\"> <a data-element-id=\"banner-report\" data-banner-desktop=\"1\" data-banner=\"1\" target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/smb-cyber-resilience-report-2022\/\" rel=\"noopener nofollow\"><img decoding=\"async\" class=\"banner__image\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/12044025\/Desktop_banner_report.png\" alt=\"What's kept small business owners awake at night during the pandemic?\"> <\/a><\/div>\n<\/div>\n<div class=\"banner banner-mobile\">\n<div class=\"container\" data-element-id=\"section-banner\"> <a data-banner-mobile=\"1\" data-banner=\"1\" target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/smb-cyber-resilience-report-2022\/\" rel=\"noopener nofollow\"><img decoding=\"async\" class=\"banner__image\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2022\/10\/12044038\/Mobile_banner_report.png\" alt=\"What's kept small business owners awake at night during the pandemic?\"> <\/a><\/div>\n<\/div>\n<\/div>\n<p>    <script async=\"\" defer src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/10\/10100431\/budget-cybersecurity-questions-en.js\"><\/script><br>\n    <script async=\"\" defer src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/10\/10100445\/budget-cybersecurity-advices-en.js\"><\/script><br>\n    <script async=\"\" defer src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/10\/10100002\/budget-cybersecurity-script-en.js\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Free office applications: OpenOffice, LibreOffice, iWork. Free cloud-based products, such as Google Docs, but with privacy settings. `, text: ` For working with documents, consider free office suites such as<\/p>\n","protected":false},"author":2706,"featured_media":41453,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/legacy-page.php","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-40676","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/budget-cybersecurity\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/budget-cybersecurity\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/40676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=40676"}],"version-history":[{"count":291,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/40676\/revisions"}],"predecessor-version":[{"id":54581,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/40676\/revisions\/54581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/41453"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=40676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=40676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}