top of page

IT Security & Compliance For Business: Technology Is Everyone’s Responsibility

  • CoopSys
  • May 31, 2018
  • 5 min read

The role of business IT and technology has grown exponentially. As more business functions are created, business processes are developed and business data is gathered, business security threats have become more prevalent, more complex, and tougher to fight against.

Security, namely cybersecurity, is no longer an issue that hobbyists blog about. Sophisticated criminals are making billions from exploiting cybersecurity weaknesses inside of businesses just like yours each and every day.

Is the technology inside your business safe and secure?

Business security threats are everywhere

Cybersecurity threats from these sophisticated ‘hackers’ are further compounded by things like human error and/or accidental (or sometimes malicious) release of information by internal staff. Understanding the concept of the ‘human firewall’ is a difficult task, but a necessary one in being proactive in the fight against security attacks. Your people are your best weapon! Ideally, you want to avoid the pain of someone accidentally clicking on a link or sending a file (or even money) to a random company that compromises your hardware, servers, your customer data, or your entire network.

Here’s the truth around your desire in wanting to avoid this issue: Most businesses, larger and small, struggle to implement an effective strategy for managing these types of threats.

It’s hard. We get it. You’re not alone.

Cybersecurity risks to your business

Just how big is the risk to businesses? Big, very big.

According to the Verizon Data Breach Investigation Report, 61% of breaches hit small businesses in 2017. That’s up 53% from the previous year.

Here are some other eye-opening statistics on how security issues could affect your company:

  • Cyber attacks cost small businesses between $84,000 and $148,000, per.

  • 60% of small businesses go out of business within six months after an attack.

  • 90% of small business don’t use any data protection at all for their customer and company information.

You have a lot to lose.

If this type of attacks hits your company, there’s sure to be some sort of fallout that costs you something. Not to mention, two-thirds of all cyber attacks are now directed at small businesses, per that same Verizon report.

Think about it: you typically store a myriad of information, inside your company. Things like:

  • Customer records.

  • Accounting data.

  • Sales information.

  • Passwords

  • Payment information like ACH and bank records.

  • Vendor information.

  • Customer lists, email lists and marketing materials.

That said, consider this your dire warning along with the tough question that needs to be asked: How are you protecting yourself and how can you protect your business?

First, have a plan and strategy in place, documented, and agree upon by everyone. Either your internal IT staff should be owning this or your current outsourced vendor should be.

Designed with you in mind, we have a special solution that’s focused on cybersecurity, called NOAH. It’s our service to businesses to combat cybersecurity threats that has been proven over the last decade. Our service is innovating and changing along with the ever-evolving cybersecurity world with the goal of protecting your information and company.

Second, you need to have a remote backup solution in place that backs up all your systems to a cloud source, so in the event of some sort of cyberattack, you can keep your business operational.

You’ll also want to test your data security on a scheduled basis, and test your data security systems and procedures. We’d suggest developing and testing a data breach response plan, complete with a communications plan, crisis plan, etc. You also should consider buying cyber liability insurance. We know, we know. Insurance seems like a bit much, but would you rather suffer the consequences of not having one?

You’ll also want to train your staff on things like spotting “phishy” emails, how to encrypt sensitive data, enable two-factor authentication for all your users and employees, and make sure you have a good physical security plan in place.

Lastly, if and when you should fall prey to a cybersecurity attack, here are some more recommendations:

  • Act immediately. Contact your IT team, your attorney, and cyber liability insurance agent or risk support person.

  • Contain the breach. Take affected systems offline, but don’t turn them off. This is important so your IT and technology team can examine the source of the breach.

  • Document every step. You will need to have these details documented in case you need to communicate with your local law enforcement authorities.

  • Communicate clearly. Ensure all affected parties are made aware of the issue and what steps are being taken.

Schedule some time with us.

Explore how you can solve unpredictable and unknown technology and operations costs inside your business:

"*" indicates required fields

First Name

*

Last Name

*

Company Name

*

Email

*

Phone
Will you be golfing with us?

*

Count me in!
No, I'm not a golfer
No, I'm a golfer, but I can't make it
I can't make it, but my colleague(s) will attend

Please specify colleagues' name/email address below

Name
Email
Will you be joining us after golf for cocktails and dinner?

*

Yes
No
Do you have any food allergies or dietary restrictions?
None
Yes
If yes, please specify:
Will you be bringing a guest?

*

Yes
No

(Note: If you are NOT bringing a guest, skip to "Submit Responses," below. You're done! If you ARE bringing a guest, here are a few questions that will help us to accommodate them, too. Once that's filled out, go ahead and "Submit Responses.”)

Your Guest's Name
Will your guest be golfing?
Yes
No
Will your guest be joining us after golf for cocktails/dinner?
Yes
No
Yes, and my guest has dietary restrictions*
Please specify guest dietary restrictions
Comments
CAPTCHA
Receive updates on news and events
Receive updates on news and events

Cooperative Systems will send email updates and reminders about upcoming events, news, and promotions.

Email

This field is for validation purposes and should be left unchanged.

gform.initializeOnLoaded( function() {gformInitSpinner( 22, 'https://coopsys.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_22').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_22');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_22').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_22').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_22').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_22').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(jQuery('#gform_wrapper_22').offset().top - mt); }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_22').val();gformInitSpinner( 22, 'https://coopsys.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [22, current_page]);window['gf_submitting_22'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_22').replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery('#gf_22').offset().top - mt);jQuery(document).trigger('gform_confirmation_loaded', [22]);window['gf_submitting_22'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_22').text());}else{jQuery('#gform_22').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "22", currentPage: "current_page", abort: function() { this.preventDefault(); } }]); if (event && event.defaultPrevented) { return; } const gformWrapperDiv = document.getElementById( "gform_wrapper_22" ); if ( gformWrapperDiv ) { const visibilitySpan = document.createElement( "span" ); visibilitySpan.id = "gform_visibility_test_22"; gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan ); } const visibilityTestDiv = document.getElementById( "gform_visibility_test_22" ); let postRenderFired = false; function triggerPostRender() { if ( postRenderFired ) { return; } postRenderFired = true; gform.core.triggerPostRenderEvents( 22, current_page ); if ( visibilityTestDiv ) { visibilityTestDiv.parentNode.removeChild( visibilityTestDiv ); } } function debounce( func, wait, immediate ) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if ( !immediate ) func.apply( context, args ); }; var callNow = immediate && !timeout; clearTimeout( timeout ); timeout = setTimeout( later, wait ); if ( callNow ) func.apply( context, args ); }; } const debouncedTriggerPostRender = debounce( function() { triggerPostRender(); }, 200 ); if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) { const observer = new MutationObserver( ( mutations ) => { mutations.forEach( ( mutation ) => { if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) { debouncedTriggerPostRender(); observer.disconnect(); } }); }); observer.observe( document.body, { attributes: true, childList: false, subtree: true, attributeFilter: [ 'style', 'class' ], }); } else { triggerPostRender(); } } );} );

Comments


bottom of page