{"id":15048,"date":"2015-01-28T19:12:46","date_gmt":"2015-01-28T19:12:46","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3535"},"modified":"2020-02-26T10:59:40","modified_gmt":"2020-02-26T15:59:40","slug":"security-assessment-approaches-in-your-small-business","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/security-assessment-approaches-in-your-small-business\/15048\/","title":{"rendered":"Security assessment approaches in your small business"},"content":{"rendered":"<p>Small business owners have a lot to think about, but ensuring security needs is a top priority. As soon as a company accumulates funds and data, cyberattacks may hit at any time.<\/p>\n<p>The first step in ensuring security is to look around at what you have \u2013 namely what hardware and software is used in your company, what issues may arise, and what kind of protection is needed.<\/p>\n<p style=\"text-align: center\">\n<\/p><p><strong>Software and malware protection<\/strong><\/p>\n<p>Software is the primary <a href=\"https:\/\/business.kaspersky.com\/a-solution-for-small-businesses-persistent-it-security-issues\/2509\" target=\"_blank\" rel=\"noopener nofollow\">source of most problems<\/a>. The most popular and widely used software \u2013 such as Microsoft Windows, Microsoft Office, Adobe Flash, Adobe Acrobat, and <a href=\"https:\/\/business.kaspersky.com\/java-vulnerabilities-keep-breeding\/1259\" target=\"_blank\" rel=\"noopener nofollow\">Oracle Java<\/a> \u2013 is notoriously vulnerable on its own, but due to its popularity, security experts (both \u201cgood\u201d and \u201cevil\u201d, i.e. malicious hackers) seek and find new flaws and write malware. Protection from malicious software is the primary point for any security solution.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Security assessment approaches in your small business.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8Yqj&amp;text=+Security+assessment+approaches+in+your+small+business.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Backup and restore<\/strong><\/p>\n<p>Backing up data is another immediate priority for businesses. It\u2019s important not only to protect against corrupted software, but also because hardware may fail and specific files may vanish. Every malware is harmful, but some may turn your business into shambles overnight, \u2013 <a href=\"https:\/\/business.kaspersky.com\/cryptolocker-and-its-consequences-for-businesses\/3491\" target=\"_blank\" rel=\"noopener nofollow\">Cryptolocker<\/a> encrypting ransomware, for instance, is best countered with offline backup. In fact, backing up your data is probably even more important than having an up-to-date anti-malware solution.<\/p>\n<p><strong>Encryption<\/strong><\/p>\n<p>Working with partners\u2019 and clients\u2019 information? Be prepared that some bad people may want to see it as well. Failure to keep that data safe may have severe consequences for your company, both material and reputational. The only way to ensure this data doesn\u2019t fall into the wrong hands is to store it encrypted. Of course, it\u2019s not about encrypting it by hand \u2013 and not about feeding it to Cryptolocker either \u2013 there are ways to automate the process.<\/p>\n<p><strong>Passwords<\/strong><\/p>\n<p>Handling dozens of password is a chore, and in time, the number of regularly visited resources grows, as does the need to remember their passwords. Passwords are <a href=\"https:\/\/business.kaspersky.com\/the-splendors-and-miseries-of-passwords-on-the-web\/1049\" target=\"_blank\" rel=\"noopener nofollow\">a notoriously weak spot<\/a>, and there are not many working alternatives. Still, instead of remembering loads of passwords, it is possible to use just a single combination \u2013 the one used to get access to password managing software.<\/p>\n<p><a href=\"https:\/\/business.kaspersky.com\/password-management-in-kaspersky-small-office-security\/1290\" target=\"_blank\" rel=\"noopener nofollow\">A password manager<\/a> can generate any number of unbreakable combinations that would be used on the Web, and store them encrypted so they are not discovered (Sony-style), even if hackers penetrate your network. Overall, a password manager helps tremendously, while decreasing the risk level.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020247\/1000.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3537\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020247\/1000.png\" alt=\"1000\" width=\"1000\" height=\"667\"><\/a><\/p>\n<p><strong>E-payments<\/strong><\/p>\n<p>Cybercriminals go to great lengths to access other people\u2019s funds, and an extra level of protection for electronic payments is a need, not a luxury. Banks and payment services offer some degree of protection, occasionally a pretty high one, but it doesn\u2019t mean that their clients can forget about protecting themselves. A good <a href=\"https:\/\/business.kaspersky.com\/kaspersky-small-office-security-and-safe-money\/1397\" target=\"_blank\" rel=\"noopener nofollow\">e-payment protection solution<\/a> would block any malicious attempts to intercept payment data, preventing both PC and mobile malware from doing it.<\/p>\n<p><strong>Mobile devices protection<\/strong><\/p>\n<p>By the way, protecting mobile devices from malware is a necessity as well. Almost everyone has a mobile device, and they are used for both personal needs and for work, which means that the data protection solution should cover these devices.<\/p>\n<p><strong>Sorry, no dedicated admin available <\/strong><\/p>\n<p>While even in small companies there can be lots of IT security-related factors to consider, not every smaller business can afford a dedicated, professionally trained admin. Most likely, it is the owner or some of the more tech-savvy employees who perform IT tasks. A security solution that doesn\u2019t make such a \u201cmakeshift\u201d IT worker stumble, and that in the worst case would only require one-off guidance from the IT expert, is ideal.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>A good VSB #security solution can be handled well by even a non-tech person.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8Yqj&amp;text=A+good+VSB+%23security+solution+can+be+handled+well+by+even+a+non-tech+person.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Price<\/strong><\/p>\n<p>Small businesses need to find a security solution at a reasonable price. By \u201creasonable\u201d we mean \u201clow\u201d: small businesses might not be able to afford something expensive, such as an enterprise-level security solution, and they won\u2019t need it, either.<\/p>\n<p>Some small companies take an unsafe approach, using the home-level antiviruses, occasionally even free ones. These AVs aren\u2019t exactly suited for use in a business environment. All of them are oriented on home users, provide only very basic protection against malware, and there are no business features.<\/p>\n<p>Here we have listed the primary demands that small businesses would raise when considering a security solution. Kaspersky Small Office Security is specifically developed to meet these requirements: it delivers business-grade protection from malware and hacking attacks for both PCs and laptops, as well as Android-based mobile devices. It also protects your electronic payments from all attempts at interception. It has built-in encryption tools, password manager, and provides backup and data restore capabilities. It is very easy to work with, thanks to a clean and plain interface.<\/p>\n<p>For more detailed description of Kaspersky Small Office Security please visit <a href=\"https:\/\/www.kaspersky.com\/small-office-security\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the best way to start assessing your company&#8217;s cybersecurity issues? First, look around at what you have.<\/p>\n","protected":false},"author":209,"featured_media":15778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[282,36,2281,2282],"class_list":{"0":"post-15048","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-malware-2","11":"tag-security-assessments","12":"tag-security-for-small-business"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-assessment-approaches-in-your-small-business\/15048\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-assessment-approaches-in-your-small-business\/7219\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-assessment-approaches-in-your-small-business\/15048\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-assessment-approaches-in-your-small-business\/15048\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15048"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15048\/revisions"}],"predecessor-version":[{"id":33447,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15048\/revisions\/33447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15778"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}