Archives - Small Business


Implement a web application firewall (WAF)

For businesses, look to elevate the security of your web applications by deploying a web application firewall (WAF). This defense layer inspects all incoming HTTP/HTTPS requests and responses, meticulously filtering out malicious traffic including SQL injection, cross-site scripting (XSS) and various application-layer attacks. By adopting a WAF, you fortify your web services against a spectrum […]

Employ intrusion detection systems (IDS)

Intrusion detection systems (IDS) scrutinize network traffic and identify deviations from baseline behavior to facilitate real-time monitoring of your network. They also work to point out unauthorized access attempts and potential security breaches more generally. Whether host-based, network-based or cloud-based, IDS options provide comprehensive coverage. When anomalies are detected, your IDS generates alerts, allowing you […]

Regularly audit cloud permissions

The cloud — due to being a centralized repository of sensitive information — is a common target for cybercriminals. By conducting regular audits of cloud permissions, you best safeguard yourself and your data from potential breaches. When assigning permissions, consider the principle of the least privilege, granting users and systems only the minimum access they need […]

Create a disaster recovery plan

In the instance of your sensitive information becoming breached, a well-structured disaster recovery plan is necessary to mitigate potential damages. While the plan will differ depending on the nature of the breach, you generally want to consider a risk assessment, backup restoration and legal and compliance matters. The specific plan will vary depending on the […]

Conduct regular phishing awareness training

Phishing is one of the most common cyber threats, with the number of phishing-related daily emails reaching millions. Speaking to business owners and managers, consider implementing routine phishing awareness training for employees, focusing on simulated phishing exercises to let employees know how to recognize and report phishing attempts. Given that employees are common targets for […]

Implement an MDM solution

Deploying a mobile device management (MDM) system is deemed a must for enterprises aiming to safeguard and govern corporate-owned mobile devices effectively. MDM software facilitates administrators to remotely set up, supervise and fortify devices utilized within the company. This ensures the implementation of strong security measures, such as device encryption, passcode mandates and data wipe […]