Cybersecurity: Hackers target small businesses, too


Efficiency is the name of the game at Agents of Efficiency (obviously) so we’re making it even more efficient for you to improve your business. Every week, we sort through all the boring stuff to bring you the best tips from the wide world of the web. For this week’s #2tips4tues, we look at some ways to safeguard your business from hackers.

Know thy self …

The National Institute of Standards and Technology (NIST) advises: “Consider doing a background check on yourself. Many people become aware that they are victims of identity theft only after they do a background check on themselves and find reported arrest records and unusual previous addresses where they never lived. This can be an indication that your identity has been stolen.”

… and know how to respond

Jonathan Deesing writes at that in the event “your business does experience a cyberattack, you need to have a response plan ready to implement immediately. In fact, these preparatory plans are so important that even the nation has one, and the Federal Communications Commission developed a Cyberplanner tool for businesses. In practice, a solid cybersecurity incident response plan should be a multilayered response in eight stages: (1) detection, (2) identification, (3) analysis, (4) notification, (5) containment, (6) eradication, (7) recovery, and (8) post-incident recovery.”