{"id":15068,"date":"2015-05-27T16:17:29","date_gmt":"2015-05-27T16:17:29","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3997"},"modified":"2020-02-26T11:01:50","modified_gmt":"2020-02-26T16:01:50","slug":"smb-companies-and-startups-growing-secure","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/smb-companies-and-startups-growing-secure\/15068\/","title":{"rendered":"SMB companies and startups: growing secure"},"content":{"rendered":"<p>An axiom for any business is that it exists for profit, whatever it produces or offers. Otherwise it\u2019s not a business. Of course, startups have to keep their belts tightened, and saving on their own security often seems logical. It is not \u2013 we\u2019ve said so many times, and it\u2019s not a problem to say it again :-) The question is how to substantiate these claims.<\/p>\n<p>So, let\u2019s just lay all the cards on the table.<\/p>\n<p><strong>Day one<\/strong><\/p>\n<p>Let\u2019s look at two examples: the first one is a small startup, formed just a few months ago at best, while the second is more of a SMB and it has already established itself in its niche.<\/p>\n<p>It seems clear that the second one is more likely to have its data security in place \u2013 it has a bit more resources to allocate for secondary accessories\u2026 Wait, was \u201csecondary\u201d about security?<\/p>\n<p>As a matter of fact, for many people, security measures <a href=\"https:\/\/business.kaspersky.com\/vsb-attitude-towards-cyberthreats-dangerous-but-not-too-important\/2174\" target=\"_blank\" rel=\"noopener nofollow\">are indeed a \u201csecondary accessory<\/a>.\u201d<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#SMB companies and startups: growing secure #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4YyM&amp;text=%23SMB+companies+and+startups%3A+growing+secure+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>This is a common, but innately flawed, mode of thinking, a sort of \u201cinvulnerability by obscurity\u201d that we have <a href=\"https:\/\/business.kaspersky.com\/very-small-business-it-security-issues\/1071\" target=\"_blank\" rel=\"noopener nofollow\">written about before<\/a>. Smaller companies don\u2019t feel it is necessary to protect themselves because they are ostensibly too small and insignificant to draw cybercriminals\u2019 interest.<\/p>\n<p>At first it may seem logical, but cybercriminals care little about the size and sales of their victim. There are just two questions they want answered: 1. Is there any money? 2. Is it difficult <a href=\"https:\/\/business.kaspersky.com\/why-electronic-payments-get-attacked\/3581\" target=\"_blank\" rel=\"noopener nofollow\">to get to them<\/a>? A \u201cyes-no\u201d combination is an attack in the making.<\/p>\n<p>So when choosing between an established small company and a startup, it is the latter\u2019s bank account that criminals will most likely visit the first. An SMB company may have a larger sum of money there, but its cyberperimeter is much\u00a0<a href=\"https:\/\/business.kaspersky.com\/vsb-attitude-towards-cyberthreats-dangerous-but-not-too-important\/2174\" target=\"_blank\" rel=\"noopener nofollow\">harder to penetrate<\/a>.<\/p>\n<p>It is wholeheartedly recommended to think of cybersecurity as something that is needed from\u00a0day one, just like the hardware and office software necessary to do business.<\/p>\n<p><strong>Coming in, going out<\/strong><\/p>\n<p>Okay, so let\u2019s assume that cybersecurity is indeed set up properly from the very beginning in the offices of both in our startup and SMB company. Network, server(s) and endpoints are protected \u2013 probably even with some unified solution, not a hotch-potch of home-oriented antiviruses brought in by the employees themselves along with their personal laptops.<\/p>\n<p>But then a data leak happens \u2013 in the form of, say, your company CFO\u2019s stolen or lost smartphone that had no security solution installed, had no remote wiping functions, and is totally irretrievable. Great! Now one can only\u00a0hope that the \u2018new owners\u2019 will just reset it to factory defaults, wiping everything, and won\u2019t sell the data from the phone to <a href=\"https:\/\/business.kaspersky.com\/a-few-words-on-ensuring-mobile-security\/3757\" target=\"_blank\" rel=\"noopener nofollow\">anyone extremely interested<\/a>\u00a0in undermining the company\u2019s operations.<\/p>\n<p>Protecting endpoints today isn\u2019t just setting a security solution to your laptops (or desktops if such exotics are still in use today). It is actually a worker with an\u00a0array of devices that is the \u201cendpoint\u201d now \u2013 and it may go in and out of the main office\u2019s protected perimeter many times per day \u2013 not to mention off hours. Protection must be still active on all of the employee\u2019s smartphones, tablets, and laptops that is used for work, otherwise an endpoint one day becomes an entry point for attackers.<\/p>\n<p>It\u00a0is extremely helpful if employees inform the company\u2019s IT workers (if there are any, which isn\u2019t always the case for the startups) of all of their devices, so they can install the corporate security software clients which would protect the working data. \u00a0It may be wishful thinking that they will do so without (repeated) <a href=\"https:\/\/business.kaspersky.com\/stolen-mobile-devices-how-much-of-this-is-personal-business\/2522\" target=\"_blank\" rel=\"noopener nofollow\">requests<\/a> and assurances that their personal privacy won\u2019t\u00a0be violated.<\/p>\n<p><strong>Lease me a cloud<\/strong><\/p>\n<p>Using a <a href=\"https:\/\/business.kaspersky.com\/transparent-opacity-retrieving-confidence-in-cloud-services\/951\" target=\"_blank\" rel=\"noopener nofollow\">third party infrastructure<\/a> to store large amounts of data is common for businesses of all sizes. There are also a handful of free cloud-based collaboration suites out there (think of Google Drive\/Docs for instance) and those are extremely attractive to the most cost-savvy businesses such as startups.<\/p>\n<p>Should the critical data be trusted to the outsource storage\/collabo suites without added protection? Well, most of these resources claim to have great security, but the topic of cloud security is still much debated. An extra security layer \u2013 like\u00a0data encryption \u2013 wouldn\u2019t take a lot of effort to provide, and may help to avoid a lot of trouble if something goes wrong.<\/p>\n<p><strong>The burning questions and a plain scheme<\/strong><\/p>\n<p>We have written before that good security requires a good policy and understanding of what requires protection. The <a href=\"https:\/\/business.kaspersky.com\/it-security-questions-that-every-small-business-needs-to-ask-themselves\/3563\" target=\"_blank\" rel=\"noopener nofollow\">proper questions<\/a> should first be set and answered, based on which we can create a more or less plain scheme of how to ensure the security continuously.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Security starts with proper questions #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4YyM&amp;text=%23Security+starts+with+proper+questions+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>There are three questions that should be asked first:<\/p>\n<p>1) Where is my data \u2013 i.e. <a href=\"https:\/\/business.kaspersky.com\/security-assessment-approaches-in-your-small-business\/3535\" target=\"_blank\" rel=\"noopener nofollow\">what exactly requires protection<\/a>?<\/p>\n<p>2) What should I do to protect my data? \u2013 i.e. to prevent loss of access, damage and\/or leak of the data?<\/p>\n<p>3) How do I make sure my data stays protected? \u2013 i.e. how to ensure that the data doesn\u2019t leave the \u201cprotected space\u201d.<\/p>\n<p>And\u00a0two extra questions should be asked:<\/p>\n<p>4) <a href=\"https:\/\/business.kaspersky.com\/steps-to-protect-small-business-from-no-small-cyberwoes\/3843\" target=\"_blank\" rel=\"noopener nofollow\">What do I know of the cyberthreats<\/a> and is it enough?<\/p>\n<p>5) How difficult it is for the cybercriminals\u00a0to get to my bank account via electronic communications?<\/p>\n<p>With those answers we may plan the defense layout, i.e. provide the needed security tools. Eventually the plan will look rather simple \u2013 most likely, it\u2019s just a list of the functions that a security solution needs to have and the steps to make sure it works within your company whether it has a dedicated IT worker <a href=\"https:\/\/business.kaspersky.com\/security-assessment-approaches-in-your-small-business\/3535\" target=\"_blank\" rel=\"noopener nofollow\">or not<\/a>.<\/p>\n<p>Kaspersky Small Security Office, for instance, is specifically tailored for the small businesses that require simple to use,\u00a0but effective protection tools. Check it out <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For many people security measures are a &#8220;secondary accessory,&#8221; and not something that should be cared for first and foremost. This is a common, but innately flawed mode of thinking.<\/p>\n","protected":false},"author":209,"featured_media":15526,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2302,2304],"class_list":{"0":"post-15068","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-protectmybiz","10":"tag-smb"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smb-companies-and-startups-growing-secure\/15068\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smb-companies-and-startups-growing-secure\/15068\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smb-companies-and-startups-growing-secure\/15068\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/protectmybiz\/","name":"protectmybiz"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15068"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15068\/revisions"}],"predecessor-version":[{"id":33523,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15068\/revisions\/33523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15526"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}