Connect with us

IT Security

Five Basic (And Cheap!) Tasks That Will Dramatically Improve IT Security For Small Businesses

security

First off, let me address your burning question that I know you’re thinking right now: “Why should I care about IT security for my business? I’m too small to be a target – I have nothing to steal”.

The quick and straightforward answer to this question is that every IT system has something of value – from your business intellectual property that can sell to foreign competitors to use your business webserver to host pay-for-view websites for paedophiles.

The next question I guess you will ask is; “IT security is far too expensive and provides no ROI, so what’s the benefit to my business?”.

Let me approach this question from a different angle. As a professional IT security consultant, part of my role involves helping businesses recover from IT security breaches. From my experience, the cost of recovering from a breach is 100 times more expensive than being proactive and implementing some basic security controls – five of which I will present in this post.

For example, if you accept credit cards as payment and your business suffers a breach that results in credit card data being stolen, you will more than likely face some costly remediation tasks. Set by your acquiring bank under the PCI DSS standard the remediation will include the five tips I provide in this post.

So with the questions answered and your interest in IT security slightly piqued, let me introduce these five cheap and easy to implement tips that will dramatically improve your businesses IT security position.

The five tips are based on the Australian Department of Defense’s “Top 4 Strategies to Mitigate Targeted Cyber Intrusions”, which are said to mitigate at least 85% of intrusion techniques when fully implemented.

IT security is a daunting prospect for most small businesses, mainly because it appears complicated and expensive. Small businesses focus on the old proverb of “spend a dollar to earn three”, and IT security does not directly appear to add anything to revenue. Of course, this way of thinking is dangerous because when you do suffer a breach, it’s far more expensive in terms of cost, time and brand reputation to fix and recover.

However, I am not another IT security professional warning you about impending doom. Let’s focus on getting some protection to dramatically help your IT status while not draining funds and time from your immediate focus, which is to earn revenue.

Below are five recommendations that will dramatically reduce your chances of an IT breach when implemented correctly. To recap, it’s far costlier to recover from a breach than being proactive and applying some basic IT security changes to your system.

1. Remove All Local Admin Rights From Your Staff’s Computer Accounts

I am guessing that your staff have local admin rights to their work computers – meaning they can install, update and remove whatever software they want from their work computer. You may not even be aware of this and think it’s just the norm. However, having “local admin rights” also allows users to turn off services, such as the local firewall and anti-virus software, making their computers vulnerable to attack.

One widespread issue is staff downloading software from the Internet to help with tasks. Often, the software is free and easy to download, but, in many cases, it can contain additional malicious software such as ransomware and “backdoors” that allow hackers to steal data and take control of your computers. Free software containing viruses and other nasties is not rare: the Internet is filled with the stuff.

You will stop this from occurring by removing the “local admin” rights from your staff’s computer accounts.

I know this is a pain because every time someone wants something installed, they will need the person with local admin rights to install the software; however, this is a significant step for protecting your computer systems from a breach.

For information on how to remove local admin rights from a version of the operating system, search Google – for example, “how do I remove local admin rights from Windows 7?

2. Patch Your IT Systems

Patching operating systems and software applications is not complex – it’s a matter of setting up a patching schedule and sticking to it. This is very important because patches often address a newly discovered security vulnerability. There is a constant race between the software vendors and the baddies to find a vulnerability. If the vendor wins the race then a patch can be released to fix systems before the villains can take advantage of the vulnerability. But if the business does not apply the patch promptly (usually a maximum of a month after patch release), the baddie can still take advantage.

Baddies are constantly scanning computer systems around the world for vulnerabilities – this is an automated process so you may think no one cares about your business or you’re too small to be discovered but that’s not the focus for the baddie. Any system can be of value – from stealing IP to using your system to host a web server for questionable or even illegal purposes.

A monthly patching schedule is what most businesses adopt where it’s not so regular that it causes constant disruption to your BAU processes but not so long that it increases the risk of a breach. Ideally, install a critical security patch quickly.

One approach is to patch a subset of computers in your workplace, such as the less critical systems (not the system containing the payroll application!) at the end of each month and let the systems run for a week. If no issues occur, like the new patches causing crashes, then patch the remaining systems. Of course, make sure each system is backed-up first before applying any major patch.

3. Use Unique And Strong Passwords

You have heard this advice from everyone, right? Never use a password more than once, and make sure it’s “strong” – meaning the password is at-least 7/8 characters in length and uses numbers, letters (lowercase and uppercase) with some symbols for good measure.

I don’t want to bore you and say the same thing as everyone else. Oh wait, I just did!

Instead I will provide a very common example of why you should use unique passwords, at least for your most important accounts.

It’s well known that people re-use passwords and the reasons why are obvious. A rough count on the number of accounts I have that are accessed with a password weekly such as websites, email accounts, bank accounts is 40!

Hackers also know that people will reuse their passwords, including passwords used for online bank accounts and other sensitive accounts. All the hacker needs is one breach from an online service that has poor security to steal the user accounts database containing your password. The hacker can use social media to locate more personal details about you, such as where you live, what services you use, locate a complaint you made about your bank via Twitter and then attempt to access your online bank account and other sensitive accounts.

It is also very easy to work out from social media where you work (thanks, LinkedIn) so the hacker can try to access your work systems using your stolen password. A business will often allow remote access to their computer systems (such as email and CMS) for their staff so the hacker can attempt to use the stolen password without even being physically present at your office.

You may ask why would email be a target? Well, say the email account that has been accessed by the hacker is Bob’s who is in-charge of payroll. The hacker can read through Bob’s inbox and find out if the business uses a third party payroll system and if so send the third party an email changing bank accounts for a subset of employees for their salary. The new bank account details are of course managed by the hacker.

Implementing a password vault that your staff can use such as LastPass can help enforce the use of unique and strong passwords for business systems, including third-party systems such payroll, invoicing, CMS, etc. Password vaults often allow a user to log into a system without showing the password, making it painless to use strong and unique passwords since the user does not have to manually type one in or write it down so they don’t have to access the password vault again.

As a final note, I would like to address the task of forcing passwords to be changed every 30 days or less. Personally, I don’t like it as it forces the user to think up a new password every time. Ultimately people end up using slight variants of the same password to make the change quick and memorable.

Unfortunately, hackers know this and will use software that automatically tries variants of passwords using pattern algorithms based around the password’s structure. So even if the hacker doesn’t have the exact password you used for your bank account and work systems, your human mind will cause a pattern to emerge when selecting a variant, which the hacker’s software will use to guess the password.

Instead of forcing a staff member to change their account password every 30 days or so, I would encourage the creation of a strong password they can remember (tips on how are here) and only force a change every 6 months or after a security breach. Don’t take my word on this topic as the mighty NIST goes even further and recommends a password is not changed unless it’s compromised or forgotten.

4. Think Before You Click

This is probably the hardest of the five tips to implement as it relies 100% on human behavior.

The “Think before you click” statement addresses the need for people to think first before clicking on a URL to visit a webpage or email attachment. Often viruses and other nasties enter the business environment due to people not thinking before clicking, such as payroll staff clicking on an email attachment named “invoice” or HR clicking on an attachment named “CV”.

It is very hard to work out if an email attachment is malicious or a URL takes you to a web page with a malware payload but it’s important to try as anti-virus software is not as effective as it used to be. These days, relying solely on anti-virus software to stop all nasties such as ransomware from infecting a computer is very risky.

So, what do you do?

Well, the first thing is to still use anti-virus software as there are many nasties that will be detected, but not be 100% reliant on it to block everything.

Next, discuss with your staff how a malicious email could be detected by using key indicators such as who the sender is, the tone and style of the email content, the quality of the English language, if the email just doesn’t look right, etc…

Here is an example of how this works.

If your business sells car parts to the local community and you receive an email with instructions in poor English to open the attachment for an overseas order and the sender’s email address looks strange then it is probably a good bet that the email attachment is malicious.

There are no guides or rules that will guarantee you will be able detect all the emails containing virus-infected attachments or dodgy URLs. It’s up to each business to determine how their customers, prospects, services providers, etc. communicate with them.

If the email is written with poor English and encourages you to open the attachment for an overseas order and your business only deals with the local community then you should treat that email with suspicion.

Likewise, if an email comes in suggesting you click on the URL provided in the email and the URL looks strange to you then that’s another email to be suspicious of.

Or another email states your PayPal account has been frozen and to click the link to reset your password but the URL in the email doesn’t look like a normal PayPal secured URL then that’s another one that should arouse suspicion.

5. Change Default Passwords On Devices And Software

Do you remember the scare about a year ago about people accessing baby monitors over the Internet and yelling at babies through the baby monitors?

How can this happen?

Its actually very easy and very common if you do not change the default password to access the settings on a device. Most Internet-enabled baby monitors, or any webcams and security cameras for that matter allow access via the Internet.

The device normally comes with a default password with the account – a great one is admin for the username and admin for the password. Many people don’t change the password from the default, which means anyone who bothers to search Google for the default password for a device knows the password!

But how can they find your baby monitor, webcam, security camera on the Internet?

Easy!

By using a free service, which is often referred to as “Google for devices”.

There are a few examples but the main device search website is https://www.shodan.io/ and its job is to search the ENTIRE Internet looking for devices connected to the Internet and then provide helpful information about each device.

So if you want to search for baby cams that are accessible on the Internet in the USA then you can use Shodan to search. Then it’s a simple matter to access each baby cam’s login page (which Shodan helpfully provides) and try admin/admin or whatever the default credentials are.

For a business, it doesn’t just stop at security systems and webcams; it also includes firewalls, routers and other network devices which are far more serious as these devices allow access to your network! http://routerpasswords.com/ is a very helpful website that records all default accounts and passwords for most network devices and its free and public to use.

The way to think of this is that it provides a handy front door to your computer systems for anyone with Internet access!

The lesson to remember is when you install a new device or software application, you should identify the default accounts provided and change the default password!

Summary

Congratulations on getting this far. I can see you are serious about increasing the IT security of your business and that is a very good thing!

In summary, the five tips are:

  1. Remove local admin rights from general user’s accounts – for general user accounts do not grant local admin rights as this will allow your staff to install any software they want, which often results in malicious software being installed as well.
  2. Patch regularly – patch at least monthly and any critical security patches should be installed as quickly as possible.
  3. Use strong and unique passwords – avoid reusing the same password, especially for your business systems, and use strong passwords. I use this site to generate strong and unique passwords: https://strongpasswordgenerator.com/
  4. Think before you click – train your staff to think before clicking on an email attachment or URL within an email (or via chat applications, etc.). Teach your staff what a legitimate email should look like based on your business and relationships with external entities. Also, if a URL looks strange to you then don’t click it without researching first or ask a workmate what they think about the URL.
  5. Change default passwords – any device added to your environment probably comes with a default admin account and default password. Treat all default passwords as publicly known. Change the default password ASAP, especially before it’s connected to your network. This also applies to any software installed.

Next Must Read Post for Small Business

Do you accept credit cards for payment? If you do then you need to read this post-> Do I Need To Be PCI Compliant?

BusinessArticles is the popular online Hub for quality business articles. We publish unique articles and share them with our social followers.