Tips to keep your business safe online

1 July 2019 Information Security, Products & Solutions

No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company’s weakest points. While bigger corporations generally have large IT departments to respond to evolving threats such as crypto-jacking and ransomware attacks, small and medium-sized enterprises (SMEs) don’t have these huge IT teams to protect them, says Carey van Vlaanderen, CEO at ESET South Africa.

Carey van Vlaanderen
Carey van Vlaanderen

Cybersecurity needn’t be a daunting challenge for small business owners, and there are several key steps that can be taken to significantly reduce the chances of your business becoming a victim of cybercrime. These steps can save your business time, money and even your reputation. Moreover, SMEs that manage their cybersecurity effectively will have a competitive advantage in today’s online and interactive world.

Back up your data

It is imperative that in the digital age, businesses are making data backup and protection a high priority. It’s important to think about how much your business relies on data, whether that’s customer information, quotes, orders or payment details – all can be considered critical. All SMEs need to ensure that they are making backups of their data, and that these are done regularly and can be restored. The backups should always be kept separate from your computer. This is so the business can keep functioning if anything bad does happen.

Furthermore, if you have backups of your data that you can quickly recover, you can't be blackmailed through ransomware attacks. It is worth considering storing the backups in the cloud – as well as being separate from your computer, it is also often a cheaper solution for SMEs. This is because cloud providers supply your organisation with data storage and web services without you needing to invest in expensive hardware up front.

Keep your devices safe

Mobile technology is now an essential part of any modern business, with more of our data being stored on tablets and smartphones. However, it’s a regular occurrence in businesses that devices go missing, get lost or get stolen, and many of these devices contain important data too. To protect this information, all employees should be encouraged to use a suitably complex PIN or password to secure their device. Ideally you should ensure all lost or stolen devices can be tracked, locked or wiped remotely. On top of that, all devices should always have their software kept up to date as manufacturers often include security updates to keep devices protected.

Use strong passwords

As mentioned above, all employees should use password protection on their devices. Passwords, when implemented correctly, are a free, easy and effective way to prevent unauthorised users from accessing devices. Use two-factor authentication (2FA) on your important accounts such as email and account management dashboards. This means that even if an attacker knows your passwords, they still won’t be able to access that account.

Protect yourself from malware and phishing attacks

Malware (malicious software) is software intended to infiltrate and damage or disable computers and can often be distributed through phishing attacks in which scammers send fake emails asking for sensitive information or containing links to bad websites. The first step in protecting your business from malware and phishing attacks is ensuring that all employees always exercise caution before opening any attachments, clicking on links in emails or visiting unfamiliar websites.

The second is ensuring that your software is up to date and that all relevant protection is applied. Finally, all SMEs should run antivirus and intrusion detection software, which can determine when an infection is about to take place and prevent it.

ESET offers Endpoint Protection Advanced Cloud for small businesses. The company’s IT security software incorporates ransomware protection along with the easily manageable ESET Cloud Administrator, which maximises convenience and slashes hardware expense for business of all sizes. To read more about ESET’s solutions, visit https://www.eset.com/int/business/small-business/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.