Cybercrime has advanced along with technology. It doesn’t matter if you have one or 100 computers connected to the Internet – understanding the threats posed by cybercrime and training staff to spot them is a must for doing business in the 21st Century.
Cybercrime covers many illegal and unscrupulous activities on the Internet. These include identity theft, fraud, and spreading computer viruses or malicious software known as ‘malware.’
Cybercriminals are increasingly focusing on mobile devices such as tablets and smartphones, and on social networks like Twitter and Facebook.
Two-thirds of adults have already been victims of cybercrime in their lifetime. You probably think it won’t happen to you but small businesses often have less sophisticated IT security measures than larger organizations, making you an easy target.
Understanding the threats and developing an Internet policy for employees are both essential to defending your business against cyber attacks.
Common threats include malware and data theft – below we outline what cybercriminals are aiming to achieve in these instances.
The aim of cybercriminals here is to:
"Two-thirds of adults have already been victims of cybercrime in their lifetime."
Espionage and malware
Industrial espionage and attempts to steal your intellectual property (IP) are also on the rise. These crimes are often achieved through malware, or malicious software, usually downloaded without the user’s knowledge as an attachment to programs and even bogus antivirus software.
Most malware bugs transmit data over the Internet, including your browsing habits and other personal information. More dangerous forms of malware include key logging software that records what you type on other websites, such as online banking and email passwords.
Reduce your exposure to these risks by:
Protect your business’s weak points
Cybercriminals will always attack the weak points in your Internet security first.
To combat this:
Two thirds of people don’t have any security solution on their portable devices, so apply all of these practices to mobile work devices with Internet access, such as smartphones and tablets.
It’s hard to control employees using the Internet at work to access personal emails or their social media accounts. But it’s important to develop some rules around the use of work computers. You need to control both wasted working time and staff infecting business computers through careless behavior.
Being aware of viruses
Many viruses are spread as email attachments that appear to be harmless. An email will often encourage the reader to open an attachment by pretending to be a joke, video clip, photograph, or some breaking news.
Train staff to avoid:
Impress upon staff that Internet security is also critical to maintaining the confidence of customers. Compromising customer details or sensitive communications could cost the business both credibility and customers.
When working remotely
Internet security doesn’t end with work computers. Working from home or using mobile broadband or Wi-Fi hotspots also exposes your business to potential threats. Make sure every device connected to the Internet has the latest software updates and antivirus protection.
Training your staff to avoid the pitfalls of inappropriate Internet use can be as simple as developing a company Internet policy with guidelines for safe practice. The benefits of this type of training include a reduction in the risk of security issues arising and improved IT, and online skills in your staff.
Deploying a policy
Your policy should clearly state who’s responsible for implementing the plan and carrying out ongoing monitoring.
If your business has more than a few employees or uses a departmental structure, include a timetable for security implementation so everyone stays on the same page – communication is the key.
© Comerica. For more content like this, please visit smallbusiness.comerica.com