_Experts-SMB

The Cybersecurity Basics All Small Business Owners Need to Know

The cost of data breaches is higher for small businesses than large enterprises. Not only do small businesses have to weather the initial expense of a data breach — an average of $120,000 per incident — they also have to recover from the massive reputation hit a data breach causes. Janice Miller of Safety Today outlines what SMB owners need to know.

SMBs Are Driving A New Wave of Cyber Insurance Adoption

Cyber Insurance is a rapidly growing market, and small- to medium-sized businesses are driving that growth. Ari Vared, Senior Director of Product at CyberPolicy, explains that as SMBs gather more data to leverage business decisions, they also need to be more aware of cyber risks and be prepared for an incident.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 2

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 2 of this two-part series, Dave Moore, founder of Internet Safety Group, walks the reader through a well-crafted response plan and reviews of the top backup programs.

Can SMBs Do Something to Prevent Ransomware? (Yes!) - Part 1

Last year Locky, NotPetya and WannaCry ransomware savaged Internet users, with billions of dollars lost, data destroyed, worldwide shipping disrupted, and reputations damaged. Even though they are the most hacked businesses on the Internet, many SMBs do not have proper cybersecurity protections in place. In part 1 of this two-part series, Dave Moore, founder of Internet Safety Group, explains why and how SMBs need to make Internet safety training a top priority.

Avoiding The Common Pitfalls Of SMB Security

There are a few common misconceptions that prevent small- and medium-sized businesses (SMBs) from pursuing a strong security posture. It is important for both the businesses and the security industry to understand the reality of the situation. Megan Roddie, security analyst with Recon InfoSec, explains how to avoid the most common mistakes of SMB security.

Spotting The Breach: What Are The Indicators Of Compromise?

What are the signs of a breach? Are you catching them all or do you have a false sense of security (yes, pun intended) when it comes to all things cyber within your organization? Sean Martin reaches out to the community of experts to help him identify some ways to spot the signs of a breach that might not be immediately evident.

Cybersecurity For SMBs: Why Identifying & Protecting Critical Information Assets Should Be A Foundational Element Of Your Security Program

The digital world has become a scary place, one in which few small- and medium-sized businesses (SMBs) feel that they are adequately protected. Jeremy Wittkop, CTO of InteliSecure, outlines the steps necessary to achieve effective information security through identification and prioritization of key assets most important to a business.

We Are All A Cyber Fraud Target. 5 Tips To Help You To Be Cyber Secure.

As technology works to make our lives easier, the downside is there are more ways than ever to become the victim of fraud. Fraudulent activity can destroy your identity, reputation, finances and much more. The good news is there are ways to protect yourself and stay safe.

Nearly Half of SMBs Plan to Invest in Cybersecurity in 2018

As part of Kabbage’s ongoing effort to help small businesses to be successful, Kabbage recently surveyed more than 800 customers and nearly half (47 percent) plan to invest in cybersecurity products and services in 2018.

It Looks Like Your SMB Needs A New List Of Cybersecurity Resolutions

We’re only a few weeks into 2018, but it’s already feeling a lot like last year for security experts. Here's how to determine whether your SMB needs a cybersecurity overhaul in 2018, and how to actually keep your security resolutions throughout the year.

GDPR Will Have A Big Impact On Small And Medium Business - Part 2

In Part One of our three-part series, we started with a basic overview of who GDPR applies to and the definition of personal data under GDPR. Here in Part Two we will discuss key elements such as consent and online data technologies, privacy notices and cross border transfers. Part Three will dive into understanding individual rights and the obligations of a data controller and data processor.

GDPR Will Have A Big Impact On Small And Medium Business - Part 1

GDPR is a complex regulation comprised of 99 articles. In this 3 part series, we’ll break down the components of GDPR starting with an overview of the regulation and why you need to start preparing now. Part 2 will discuss some of the key elements including obtaining valid consent, online data technologies, privacy notices and cross border transfer. Part 3 will dive deeper into understanding the obligations of a Data Controller and Data Processors, individual rights, and the 72 hour data breach notification requirement.

If You Thought 2017 Was Tough, Say Hello To 2018

2017 brought some of the most damaging cyber-attacks and volume driven data breaches the world has ever seen. Detailed profiles have been built on nearly every individual in the United States posing a threat to each consumer and organization. A wave of cyber crime is coming our way in 2018 like never seen before. How will you respond?

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

Data Breaches Happen to SMBs Too. Often Because of Human Error

Many SMB employees out there put themselves – and their sensitive data – in harm’s way because they are unaware of the risks and the proper security measures to take. In fact, in many data breach cases, human error is often the culprit.

5 Best Practices to Protect Your Small Business from Cyber Attacks

Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.

Small Businesses Need an Affordable, Qualified Cybersecurity Workforce

In the fragmented world of cybersecurity, equipping small businesses for cyber threats and preparing the next generation of infosec professionals will require community-based workforce development.

How Law Firms Can Guard Critical Information from Cyber Attacks

Movement of data to cloud-based case management, record searching, research, and platforms introduces risk. Legal firms, no matter the size, must see the importance of protecting the sensitive case information of their clients, especially for ongoing cases, against those who wish to threaten their cybersecurity.

They All Look Cute, Until You Analyze Security Posture Data

We can learn a lot about a vendor by looking at external indicators of compromise. But, are we getting the whole picture or just framing the risk at the moment?