{"id":15061,"date":"2015-04-20T15:44:35","date_gmt":"2015-04-20T15:44:35","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3869"},"modified":"2020-02-26T11:01:24","modified_gmt":"2020-02-26T16:01:24","slug":"things-to-build-smb-security-upon","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/things-to-build-smb-security-upon\/15061\/","title":{"rendered":"Things to build SMB security upon"},"content":{"rendered":"<p>We\u2019ve written before (<a href=\"https:\/\/business.kaspersky.com\/category\/vsb\" target=\"_blank\" rel=\"noopener nofollow\">quite a few times<\/a>) that while security may be intimidating for SMBs, it actually a) is rather easy \u00a0i.e. things to start with; b) isn\u2019t so scary, expensive, incomprehensible, or demanding \u2013 even for businesses in their infancy which may not have the resources to hire an IT security professional.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Things to build #SMBsecurity upon #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5i1C&amp;text=Things+to+build+%23SMBsecurity+upon+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>For starters, just remember\u2026<\/strong><\/p>\n<p>Your business is a potential target of cyberthreats. That doesn\u2019t mean you will be attacked tomorrow or even in a week. But you shouldn\u2019t wait to be targeted before taking action. There are <a href=\"https:\/\/kas.pr\/XJu9\" target=\"_blank\" rel=\"noopener\">startling statistics<\/a>\u00a0available. They\u2019re not there to frighten you, but to serve as proof, that the smarter approach is to assume\u00a0a cyber-hiccup is in the making for everyone, and you should be ready for it.<\/p>\n<p><strong>\u2026Then start asking the questions<\/strong><\/p>\n<p>The first step towards security is to ask questions \u2013 namely, IT security questions. Such as \u201cWhere is my data?,\u201d \u201cWhat Should I do to protect the data?,\u201d and \u201cHow do I make sure my data stays safe?\u201d We wrote about\u00a0these questions just two months ago \u2013 <a href=\"https:\/\/business.kaspersky.com\/it-security-questions-that-every-small-business-needs-to-ask-themselves\/3563\" target=\"_blank\" rel=\"noopener nofollow\">take a look<\/a>.<\/p>\n<p>If these questions have appropriate answers, the situation starts to look manageable \u2013 once you have comprehension of the problem, it\u2019s no longer intimidating.<\/p>\n<p>A good way to ensure that your data (and, hence, your business) is safe is to use a multi-layered, integrated security solution, tailored specifically for smaller-sized businesses, and that does not require gargantuan efforts and the\u00a0expertise of a seasoned IT worker to be managed. And it shouldn\u2019t\u00a0cost as much as a full-scale enterprise solution \u2013 which is of little use to SMBs.<\/p>\n<p align=\"center\"><em>Take a look at\u00a0<\/em><a href=\"https:\/\/kas.pr\/pF96\" target=\"_blank\" rel=\"noopener\"><em>this presentation<\/em><\/a><em>\u00a0about the steps to protect businesses.<\/em><\/p>\n<p>Kaspersky Small Office Security fits to all of these criteria. Its trial version can be downloaded <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The global workforce increasingly goes mobile, 37% currently, up to 50% by 2020 #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5i1C&amp;text=The+global+workforce+increasingly+goes+mobile%2C+37%25+currently%2C+up+to+50%25+by+2020+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Mobilize the protection of mobile force<\/strong><\/p>\n<p>The global workforce is increasingly going mobile \u2013 37% currently, up to 50% by 2020. As a matter of fact, there are more actively used mobile devices in any more or less developed country than there are adult citizens, so clearly \u201cmobility\u201d is something related to us all.<\/p>\n<p>And it\u2019s safe to assume that a large portion of today\u2019s workers use mobile devices not only for calls and amusement, but also for business needs \u2013 storing sensitive information is included.<\/p>\n<p>At the same time, bad guys are aware that sensitive information may contain enticing\u00a0bits of data like passwords to personal or company accounts, or other data that would allow them access to money \u2013 and what else would a criminal want? Everything they do is about extracting money from others, and nearly all of the malware the IT underworld writes is about squeezing important data and funds from wherever they can. Mobile devices are under extreme pressure today, because there is a gap between perception and reality: mobile devices must be protected as much as PCs and other infrastructure, but it\u2019s not always the case. Take a look at <a href=\"https:\/\/business.kaspersky.com\/mobile-malware-perception-vs-reality\/3782\" target=\"_blank\" rel=\"noopener nofollow\">our recent post about mobile threats and the users\u2019 perception of the matter.<\/a><\/p>\n<p><strong>\u201cEncrypt? Why?\u201d <\/strong><\/p>\n<p>Encryption is a sensitive topic; as much as it is the best way to <a href=\"https:\/\/business.kaspersky.com\/data-encryption-in-kaspersky-small-office-security-the-way-to-be-sure\/1265\" target=\"_blank\" rel=\"noopener nofollow\">ensure<\/a> that the important data is safeguarded, it may seem like overkill for some and a danger for others. What if you forget the password to the encrypted data?<\/p>\n<p>Then there is an encrypting ransomware that goes on to \u201csafeguard\u201d your own data from you unless you pay the cybercriminal\u00a0hiding out there in the Tor. While it is a far-fetched scenario, occasionally people may perceive the encryption as a double-edged sword.<\/p>\n<p>But aside from cryptolockers, encryption is a great tool, and for businesses processing e-payments using it is a legal requirement.<\/p>\n<p>What happens without encryption? Well, remember the <a href=\"https:\/\/business.kaspersky.com\/with-the-doors-wide-open-yet-another-sony-megahack\/3408\" target=\"_blank\" rel=\"noopener nofollow\">Sony Megahacks<\/a>: in both cases the confidential data had been stored in plain-text (plain wrong) form. And that cost them.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Up to 31% of all cyberattacks are directed at businesses with less than 250 employees.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5i1C&amp;text=Up+to+31%25+of+all+cyberattacks+are+directed+at+businesses+with+less+than+250+employees.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>May the awareness be with you<\/strong><\/p>\n<p>Up to 31% of all cyberattacks are directed at businesses with less than 250 employees, statistics say. Criminals are aware that SMBs often don\u2019t expect cyberattacks\u00a0to happen to them (because they are small) and that they will skimp on their security \u2013 at least until lightning strikes.<\/p>\n<p>In stormy areas people set up lightning rods. In arid locations they store the water and sand in\u00a0case of sudden fire. Seismically reinforced buildings are erected where earthquakes are common. In the cities where land-floods occur, the first-level windows are\u00a0more elevated above the ground than elsewhere. The Web today is indeed stormy, and cyberattacks may be surprising, but are never totally unexpected \u2013 just like a lightning bolt during a thunderstorm. Attacks happen, but they shouldn\u2019t be successful, and they won\u2019t be if the countermeasures are taken ahead of time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The global workforce is increasingly going mobile: 37% currently, up to 50% by 2020. There are more actively used mobile devices in any more or less developed country than there are adult citizens, so clearly \u201cmobility\u201d is something related to us all.<\/p>\n","protected":false},"author":209,"featured_media":15697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[97,2304],"class_list":{"0":"post-15061","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-security-2","10":"tag-smb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/things-to-build-smb-security-upon\/15061\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/things-to-build-smb-security-upon\/15061\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/things-to-build-smb-security-upon\/15061\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/security-2\/","name":"security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15061"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15061\/revisions"}],"predecessor-version":[{"id":33507,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15061\/revisions\/33507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15697"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}