The Small Business Cyber Security Checklist

By Gary Cox

checklistIn 2015, the world’s first “international cyber mafia” stole up to $1 billion from more than 100 global financial institutions. The gang’s “spear-phishing” emails opened the bank’s digital doors and released Trojans into each entity, which then directed ATMs to transfer huge sums of money into dozens of hacker accounts. Although your business might not have billions in the bank, data breaches like these could happen to any entity — regardless of size — and implementing a cyber security checklist is the first step to securing your digital walls.

Small Business Risks Are Higher Than Ever

As a small business owner, you may think your enterprise isn’t big enough to be a target for this kind of theft. On the contrary: 2014 marked the first year that SME’s were the largest population of cyber victims. In 2013 and 2014, Britain’s Government Security Breaches Survey indicated that 74 percent of small organizations reported some form of cyber-attack. Symantec reports that spear phishing attacks on small businesses reached their highest peak ever in February 2017. These statistics indicate that your small company is probably the target of at least one type of potentially fatal digital threat.

Your Cyber Security Checklist

America’s financial systems have noted the rise in attacks on small firms and the threats those pose to the country’s economy. FINRA, the Financial Industry Regulatory Authority, has created an exhaustive “Small Firm Cybersecurity Checklist” that breaks down the elements of computer system vulnerabilities and provides guidance on how to avoid losses to the digital thugs that exploit them.

The checklist defines “cybersecurity” as the “protection of investor and firm information from compromise through the use of information technology.” Its elements are derived from the framework provided by the National Institute of Standards and Technology (NIST) and FINRA’s own Report on Cybersecurity Practices.

There are five categories that encompass 12 sections. By following the cyber security checklist, you can put in place practices that will provide barriers between you and the cyber crooks:

  1. Identification

The first step is to identify the vulnerabilities in your digital structure:

  • Inventory all assets and their related risks.
  • Clarify users and access points because each poses an individual risk.
  • Ensure encryption practices are current and enforced.
  • Scan for intrusions. Detection programming is critical to capture intruders before they can cause damage.
  • Develope or enhance the response plan if (or more likely when) disaster occurs.
  1. Protect Customer and Proprietary Data

If your company shares data with third parties across any external portal, it is at risk for theft of that information.

  • Identify all third parties (and their vulnerabilities).
  • Clarify the data that must be shared and eliminate sharing unnecessary information.
  • Establish controls between your company and the third-party company to isolate those procedures from the rest of the business.
  1. Detect Intrusions Through Mobile Devices

You and your employees’ likely access company data through mobile devices. Those devices are often the easiest entry point into corporate databanks.

  • Identify all devices that touch the corporation and those with access to them.
  • Clarify security elements within the device – passwords, encryption or others.
  • Ensure the ability to wipe those devices clean remotely so your company retains control over their contents
  • Clarify the authority of devices users to access enterprise data.
  1. Respond to the Crisis

This is easier when a system-wide response plan is in place.

  • Identify indispensable system elements.
  • Ensure passwords and other protections are secure and up to date.
  • Review malware programming for updates and currency.
  • Ensure backups are scheduled and followed.
  1. Recover Lost or Stolen Assets

Loss of vital company data or assets can put the business out of business.

  • Ensure backup access is available.
  • Ensure redundancies are current.
  • Evaluate the entire recovery process. Once successful, hackers often return through the same paths to hack again.

If your business needs technology to function but isn’t a technology company per se, it may be more cost-effective to outsource these processes. For assistance, and to learn more about GCComp’s Managed IT Services, contact us today.

Call us on 072-898-0362 to answer your questions or to provide Computer and IT Support, we would be happy to hear from you. We at GCComp have the experience and technical knowledge to help your business with your technology issues “We know technology so you don’t have to”. 


Published by Coxy

A confident and talented IT technician with extensive practical experience of working with computers and resolving any support issues that are raised to him. Possessing a proven ability to administer and control the operation, configuration and maintenance of computer based information systems, as well as having an eye for detail and able to multi-task under pressure.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: