Internet of things (IoT) security for small business

Internet of things (IoT) security for small business

While consumer internet of things (IoT) devices such as smart thermostats and fitness trackers have garnered much of the media’s attention, the internet of things has been quietly optimizing business operations around the world. In fact, according to a recent GSMA study, the number of internet of things endpoints used for business operations will surpass the consumer market by 2025.

Business IoT has shown promising results: A recent Gartner survey found that 80 percent of companies that have implemented IoT technology feel that their return on investment has been better than expected (report available to clients).

(more…)

3 tech hacks to accelerate value gained from Symantec Endpoint Protection features

3 tech hacks to accelerate value gained from Symantec Endpoint Protection features

Investing in data and information security ranks number three for small and midsize businesses that are prioritizing their tech budgets for 2019, according to a recent survey.

But, purchasing and installing security software is only half the job. You must also maintain the software—through regular updates, deployment on new endpoints, and customized configurations—to ensure that it meets your specific business needs and is able to deliver on protecting your business against cyberattack attempts.

Symantec Endpoint Protection is one among the many security software solutions on the market from which small businesses can gain more value if implemented and used correctly. Optimizing the use of all Symantec Endpoint Protection features will ensure maximum return on your investment (ROI).

(more…)

CCPA, GDPR, and the state of internet privacy laws

CCPA, GDPR, and the state of internet privacy laws

2018 was a breakthrough year for internet privacy laws. In May, the European Union’s General Data Protection Regulation (GDPR) went into full effect, sending the digital business world scrambling to get in compliance.

Then, during the summer, the United States got in on the action with the adoption of the California Consumer Privacy Act (CCPA), an effort that will make a huge impact one year from now. And we still haven’t talked about the EU-U.S. Privacy Shield, ePrivacy, or the CLOUD Act.

Despite the headlines, a recent GetApp data privacy survey of small businesses found that a whopping 65 percent of respondents felt their company was only somewhat prepared or simply not prepared to comply with data privacy regulations.

(more…)

Data archiving vs. backup: Which does your small business need?

Data archiving vs. backup: Which does your small business need?

Small businesses owners often confuse data archiving with data backup (and vice versa) and end up purchasing the wrong software tools. But the truth is: Data archiving and data backup serve two different and clearly distinct purposes.

Why archive: Regulations such as MiFID II and Sarbanes-Oxley require you to store information for five to seven years. Archiving software helps store data for these long periods at lower costs compared to other file storage or data backup tools. Archiving tools help to clear up your storage space and move older data to a different storage system.

(more…)

It’s never too early to invest in small business security—just ask my 4-year-old

It’s never too early to invest in small business security—just ask my 4-year-old

In our always ticking digital economy, kids grow up fast. Just this weekend—embarking down the same path as many entrepreneurial greats before her—my 4-year-old opened her very own lemonade stand.

And it’s with a heavy heart and the love only a father can have for his daughter that I must say: Darling, your business is in trouble. I have no choice but to give it a one-star review.

Just know it’s not your fault, and I can blame only myself. Let me try to explain.

When life gives you lemons, you buy security software … wait, what?

(more…)

Cloud data protection, IoT, and active threat detection: Key IT security predictions for 2019

Cloud data protection, IoT, and active threat detection: Key IT security predictions for 2019

The cyber-risk landscape is constantly facing new threats like botnets and cryptocurrency mining hacks.

Understanding IT security trends is not only important for tackling these new security challenges as they crop up; it’s vital for appropriating sufficient funds to your cybersecurity budget in 2019.

Our research suggests that more companies are investing in security technology solutions to protect their businesses against cyberattacks. Cybercrimes, such as targeted ransomware attacks, spear phishing, and crypto jacking, are expected to increase in 2019, costing businesses billions of dollars in lost revenue, ransom payments, and damage control.

(more…)

5 Best IT Management Apps for Remote Asset Monitoring

5 Best IT Management Apps for Remote Asset Monitoring

The theft or loss of IT assets such as laptops and servers that store critical information would create a panic for most business owners, because of the risk of losing confidential data and damage to their reputation.

But not for Mark, the owner of a small marketing firm. Mark’s employees work from different locations and travel to multiple countries for client meetings, increasing the risk of laptops or mobile phones getting stolen.

Mark’s not panicking, though, because he uses IT management tools to update software solutions on business systems used by his employees and to remotely troubleshoot software applications or wipe data from lost systems.

(more…)

How to calculate your small business IT security budget: Use our template

How to calculate your small business IT security budget: Use our template

Cyberattacks on small businesses are increasing. And security risks are compounded by the fact that networks keep growing, with new devices and higher volumes of data added every day.

To address the higher risk, small businesses must increase their IT security budgets. But the IT department finds itself competing for budget with HR, marketing, and sales teams. In fact, 45 percent of cybersecurity professionals cite lack of budget as an obstacle to improving cybersecurity.

(more…)

Build an effective security awareness training plan: 3 free tools

Build an effective security awareness training plan: 3 free tools

Small business IT managers buy and implement expensive security technologies hoping to keep themselves safe from cyberattacks.

But they’re missing one crucial thing: Employees are the weakest link in their cybersecurity strategy.

Ninety percent of successful cyberattacks are executed with information stolen from unsuspecting employees. Twenty-eight percent of cyberattacks involve an insider. In fact, one out of every five security breaches is the result of human error.

(more…)