Tips to keep your business safe online

1 July 2019 Information Security, Products & Solutions

No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company’s weakest points. While bigger corporations generally have large IT departments to respond to evolving threats such as crypto-jacking and ransomware attacks, small and medium-sized enterprises (SMEs) don’t have these huge IT teams to protect them, says Carey van Vlaanderen, CEO at ESET South Africa.

Carey van Vlaanderen
Carey van Vlaanderen

Cybersecurity needn’t be a daunting challenge for small business owners, and there are several key steps that can be taken to significantly reduce the chances of your business becoming a victim of cybercrime. These steps can save your business time, money and even your reputation. Moreover, SMEs that manage their cybersecurity effectively will have a competitive advantage in today’s online and interactive world.

Back up your data

It is imperative that in the digital age, businesses are making data backup and protection a high priority. It’s important to think about how much your business relies on data, whether that’s customer information, quotes, orders or payment details – all can be considered critical. All SMEs need to ensure that they are making backups of their data, and that these are done regularly and can be restored. The backups should always be kept separate from your computer. This is so the business can keep functioning if anything bad does happen.

Furthermore, if you have backups of your data that you can quickly recover, you can't be blackmailed through ransomware attacks. It is worth considering storing the backups in the cloud – as well as being separate from your computer, it is also often a cheaper solution for SMEs. This is because cloud providers supply your organisation with data storage and web services without you needing to invest in expensive hardware up front.

Keep your devices safe

Mobile technology is now an essential part of any modern business, with more of our data being stored on tablets and smartphones. However, it’s a regular occurrence in businesses that devices go missing, get lost or get stolen, and many of these devices contain important data too. To protect this information, all employees should be encouraged to use a suitably complex PIN or password to secure their device. Ideally you should ensure all lost or stolen devices can be tracked, locked or wiped remotely. On top of that, all devices should always have their software kept up to date as manufacturers often include security updates to keep devices protected.

Use strong passwords

As mentioned above, all employees should use password protection on their devices. Passwords, when implemented correctly, are a free, easy and effective way to prevent unauthorised users from accessing devices. Use two-factor authentication (2FA) on your important accounts such as email and account management dashboards. This means that even if an attacker knows your passwords, they still won’t be able to access that account.

Protect yourself from malware and phishing attacks

Malware (malicious software) is software intended to infiltrate and damage or disable computers and can often be distributed through phishing attacks in which scammers send fake emails asking for sensitive information or containing links to bad websites. The first step in protecting your business from malware and phishing attacks is ensuring that all employees always exercise caution before opening any attachments, clicking on links in emails or visiting unfamiliar websites.

The second is ensuring that your software is up to date and that all relevant protection is applied. Finally, all SMEs should run antivirus and intrusion detection software, which can determine when an infection is about to take place and prevent it.

ESET offers Endpoint Protection Advanced Cloud for small businesses. The company’s IT security software incorporates ransomware protection along with the easily manageable ESET Cloud Administrator, which maximises convenience and slashes hardware expense for business of all sizes. To read more about ESET’s solutions, visit https://www.eset.com/int/business/small-business/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.