Take the small steps to protect your business from cyber attack

Here’s what attracts cyber attackers: easy targets. Which means that you can leave your small business open to a cyber attack if you don’t defend your company’s Wi-Fi systems with passwords or if you rely on passwords that are absurdly simple to guess. In a recent story detailing steps that small business owners can take to safeguard themselves from cybercrimes, Entrepreneur Magazine recommends that you do the small things that may make most hackers move on to less difficult targets.


Make certain the full-disk encryption tools on your company’s computers are switched on. When they are, these tools encrypt every file or program stored on your computers’ drives. This is important because hackers would prefer to go after easy targets. If they notice that your company’s key data are encrypted, they might move on in search of one of these easier targets. On Macintosh computers, the encryption tool is named FileVault. On Windows-based machines, the tool is known as BitLocker.

Lock it Down

Here’s a surprising fact from the Entrepreneur story: Many businesses become the target of cyber crimes only after burglars physically break into their offices and steal their laptops or other devices. Once armed with your equipment, cyber criminals can easily access important company accounts and information. That’s why employees should, before leaving for the day, run a cable through the Kensington locks – the small metal loops attached to most computers and laptops – on their electronic devices and lock them to their desks. This may prevent some criminals, obsessed with completing their theft quickly, from bothering with the devices.

Wi-Fi Protection

Often the easiest way for cyber thieves to get into your company accounts is thru your business’ Wi-Fi network. That’s why Entrepreneur Magazine suggests that you do away with Wi-Fi altogether and instead install a wired network. If you can’t do that, at least protect your Wi-Fi accounts with passwords that are difficult to compromise. A good bet? Long passwords made from a mixture of letters, numbers and symbols.

Leave a comment!

You must be logged in to post a comment.