Hartford Business Journal Custom Publishing

CTSBDC Disaster Recovery Toolkit

Issue link: https://nebusinessmedia.uberflip.com/i/648348

Contents of this Issue

Navigation

Page 29 of 31

30 CT Small Business Development Center • CTSBDC | GrowCT.com | PrepareCT.com Disaster Recovery Toolkit for Small Business Cyber Security Small Businesses' vulnerability to cyber security threats are increasingly of concern, and are not limited to a particular industry or business operation. Fox Business Small Business Center reports that Symantec's 2013Internet Security reat report, saw more heightened and sustained criminal activity against small businesses. "Targeted attacks against small businesses almost doubled last year – it was up 91%. And it lasted three times longer than what we saw in 2012". According to Symantec, longer attacks hurt small businesses more than they do large enterprises. "Frankly, there's more to steal from [SMBs] than consumers, and they're a lot less secure than a lot of large enterprises," said a company spokesperson. Before a Cyber Attack You can increase your chances of avoiding cyber risks by setting up the proper controls. e following are things you can do to protect yourself, your family, and your property before a cyber incident occurs. • Only connect to the Internet over secure, password- protected networks. • Do not click on links or pop-ups, open attachments, or respond to emails from strangers. • Always enter a URL by hand instead of following links if you are unsure of the sender. • Do not respond to online requests for Personally Identifiable Information (PII); most organizations – banks, universities, companies, etc. – do not ask for your personal information over the Internet. • Limit who you are sharing information with by reviewing the privacy settings on your social media accounts. • Trust your gut; if you think an offer is too good to be true, then it probably is. • Password protect all devices that connect to the Internet and user accounts. • Do not use the same password twice; choose a password that means something to you and you only; change your passwords on a regular basis. • If you see something suspicious, report it to the proper authorities. e extent, nature, and timing of cyber incidents are impossible to predict. ere may or may not be any warning. Some cyber incidents take a long time (weeks, months or years) to be discovered and identified. Familiarize yourself with the types of threats and protective measures you can take by: • Signing up for the United States Computer Emergency Readiness Team (US-CERT) mailing list to receive the latest cybersecurity information directly to your inbox. Written for home and business users, alerts provide timely information about current security issues and vulnerabilities. Sign up at https://www.us-cert.gov. • Becoming a Friend of the Department of Homeland Security's Stop. ink. Connect. Campaign and receive a monthly newsletter with cybersecurity current events and tips. Sign up at https://www.dhs.gov/stopthinkconnect.

Articles in this issue

Links on this page

view archives of Hartford Business Journal Custom Publishing - CTSBDC Disaster Recovery Toolkit