Tips to keep your business safe online

1 July 2019 Information Security, Products & Solutions

No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company’s weakest points. While bigger corporations generally have large IT departments to respond to evolving threats such as crypto-jacking and ransomware attacks, small and medium-sized enterprises (SMEs) don’t have these huge IT teams to protect them, says Carey van Vlaanderen, CEO at ESET South Africa.

Carey van Vlaanderen
Carey van Vlaanderen

Cybersecurity needn’t be a daunting challenge for small business owners, and there are several key steps that can be taken to significantly reduce the chances of your business becoming a victim of cybercrime. These steps can save your business time, money and even your reputation. Moreover, SMEs that manage their cybersecurity effectively will have a competitive advantage in today’s online and interactive world.

Back up your data

It is imperative that in the digital age, businesses are making data backup and protection a high priority. It’s important to think about how much your business relies on data, whether that’s customer information, quotes, orders or payment details – all can be considered critical. All SMEs need to ensure that they are making backups of their data, and that these are done regularly and can be restored. The backups should always be kept separate from your computer. This is so the business can keep functioning if anything bad does happen.

Furthermore, if you have backups of your data that you can quickly recover, you can't be blackmailed through ransomware attacks. It is worth considering storing the backups in the cloud – as well as being separate from your computer, it is also often a cheaper solution for SMEs. This is because cloud providers supply your organisation with data storage and web services without you needing to invest in expensive hardware up front.

Keep your devices safe

Mobile technology is now an essential part of any modern business, with more of our data being stored on tablets and smartphones. However, it’s a regular occurrence in businesses that devices go missing, get lost or get stolen, and many of these devices contain important data too. To protect this information, all employees should be encouraged to use a suitably complex PIN or password to secure their device. Ideally you should ensure all lost or stolen devices can be tracked, locked or wiped remotely. On top of that, all devices should always have their software kept up to date as manufacturers often include security updates to keep devices protected.

Use strong passwords

As mentioned above, all employees should use password protection on their devices. Passwords, when implemented correctly, are a free, easy and effective way to prevent unauthorised users from accessing devices. Use two-factor authentication (2FA) on your important accounts such as email and account management dashboards. This means that even if an attacker knows your passwords, they still won’t be able to access that account.

Protect yourself from malware and phishing attacks

Malware (malicious software) is software intended to infiltrate and damage or disable computers and can often be distributed through phishing attacks in which scammers send fake emails asking for sensitive information or containing links to bad websites. The first step in protecting your business from malware and phishing attacks is ensuring that all employees always exercise caution before opening any attachments, clicking on links in emails or visiting unfamiliar websites.

The second is ensuring that your software is up to date and that all relevant protection is applied. Finally, all SMEs should run antivirus and intrusion detection software, which can determine when an infection is about to take place and prevent it.

ESET offers Endpoint Protection Advanced Cloud for small businesses. The company’s IT security software incorporates ransomware protection along with the easily manageable ESET Cloud Administrator, which maximises convenience and slashes hardware expense for business of all sizes. To read more about ESET’s solutions, visit https://www.eset.com/int/business/small-business/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.