Most businesses need computer systems to manage the business information. Computers permit a few people to manage a lot of information, which reduces operating cost. Most businesses also must connect their computers to the Internet to purchase materials and to sell goods and services. Some businesses such as e-commerce can only exist with computers and the Internet.
Businesses put locks on the doors and windows to prevent criminals entering the building and stealing money. A business that has computers and the Internet is a target for cyber criminals as the cyber criminals can enter the computer system via the Internet and steal money from the business. Most small and medium businesses fail to put locks on the computer system. The locks for computer systems are part of a group of actions and products called cybersecurity.
Cybersecurity is an essential part of doing business for any business that uses computers and the Internet to keep the thieves out. Many businesses endure cyber attacks from criminals who try to steal from the business using theft of information or financial extortion. Theft of information occurs when businesses have information that can be sold to a third party, or else the information has value to a government.
Most businesses don’t have information that can be sold to a third party; however all businesses will suffer financially if they are denied access to the data that is used by the management system; customer information, financial information, inventory information, etc. These businesses are targeted by ransomware that the criminals use to encrypt the business data so that it cannot be accessed. When the criminals have prevented the business having access to its own information they demand a ransom to provide a key that will release the data.
There are three essential steps to protect a business against a cyber attack, and to recover the business data without cost in the worst case that a ransomware attack is successful. These steps are listed in the following sections.
The employees of the business are the first line of defense against cyber attacks. It is essential that employees be trained to understand what a cyber attack is and how to recognize a potential attack. The employees must have access to a cybersecurity expert who can be notified about a potential attack and can take quick action to investigate if an attack is occurring. To summarize;
Quick action is important when a potential risk is identified. It is a race against time to block the criminal before the criminal has time to lock the business data.
Network cybersecurity is the locks on the doors and windows. Cybersecurity tools are designed to keep the criminals out of the network. Each computer network has unique challenges to prevent unauthorized access. A cybersecurity expert must analyze the network to determine what protections and locks must be added to the network.
One of the most important features to add to a computer network is multi-factor authentication (MFA) or 2-factor authentication (2FA). This means that after the user enters a password the user gets a code on a mobile phone that is then entered to get network access. Security experts claim that MFA can reduce the probability of a cyber attack by 80% as a popular method of attack is to steal passwords. MFA prevents a stolen password being used.
The following list includes items that are essential for all networks;
Some security products include several of these functions. For example the Authonet Zero Trust endpoint gateway authenticates devices and users onto the network, with users having multi-factor authentication and can monitor who is accessing the network, and identify failed accesses.
Software applications and data can be installed on servers in the business or else installed on a remote cloud service. A cloud service is much more secure than the business network as cloud providers like AWS and Azure have very experienced cybersecurity staff and large cybersecurity budgets to ensure that criminals do not get access to their clients data.
Most software vendors such as Oracle, Salesforce and Quickbooks have cloud versions of their software and some only have a cloud version. The two steps that a business should take are listed below;
Many businesses have developed custom software that is designed for their business model. Migration of custom applications to the cloud requires specialist skills and the business should only contract a migration provider who can demonstrate successful projects with references from other customers.
Determined and knowledgeable criminals can pick even the best locks. The same applies to cybersecurity, the best precautions cannot guarantee 100% protection, what they do is reduce the probability of a successful attack, maybe by 98% or 99% and 98% less headache is excellent.
For that 1% or 2% probability of a successful ransomware attack it is necessary to prepare a recovery plan. The essential elements of the recovery plan are as follows;
The procedure to follow after a ransomware attack has occurred is listed below;
Without the recovery plan a successful attack will result in the business losing all data, or paying the ransom to unlock the data. Note that in 35% of ransomware attacks the criminal does not provide the key to unlock the data after the ransom is paid. Remember that the attackers are not honest people.
It is essential that a cybersecurity expert is called in to make a regular verification of the IT operations and infrastructure to ensure that these four steps are implemented and working. The cybersecurity expert should check that all software has been updated with security patches. If a business seeks cybersecurity insurance then it is likely that the insurer will request some or all of the steps listed above.