Tag Archive | "security"

Data Breaches Among Top Concerns for SMBs

Tags: , , ,

Data Breaches Among Top Concerns for SMBs

Posted on 19 September 2019 by CRadmin2

According to Tirena Dingeldein, blog author for popular software-vendor directory Capterra, data security has emerged as a main concern for small to medium sized businesses. For small businesses, even a single breach can be crippling. However, there are steps you can take to stave off these threats, keeping your data and your business safe and secure.

According to research conducted by Capterra in 2018, 71 percent of SMBs now use data security technologies, and data security is in the top three priorities for technology spending in the next two years.

Some business owners believe that they do not possess enough data to justify purchasing security software, and some believe that their data simply isn’t important enough to be targeted by criminals. The fact remains that even large companies can lose substantial amounts of business and revenue because of a data breach. Some of these large companies barely survive. Just think of how much damage a data breach can do to a small business.

The fact of the matter is that nearly 60 percent of SMBs fail within six months of a data breach after losing tons of money each month along the path to ruin. In addition, tech criminals see small businesses as easy targets, and an investigations report by Verizon backs this claim by finding that small businesses make up 75 percent of data breaches.

IBM calculates the cost of a data breach by record. For each record compromised, it costs a business approximately $148. This cost represents what an SMB will have to spend in the recovery process. Kaspersky Labs has also conducted a cost analysis, and this software company estimates that a single data breach incident will cost $120,000.

The following three steps are crucial in mitigating the risk of a security breach:

  1. Purchase and implement data security software – This usually takes three forms: network security software to scan and monitor intrusions and vulnerabilities, data loss prevention software to help a business manage sensitive data and computer security software to provide file access control.
  2. Purchase data breach liability insurance – In the event of a data breach, insurance can be invaluable in covering all the associated costs. Insurance can help pay for a variety of losses, including lawsuits and brand cleanup, and it can be reasonably priced for SMBs.
  3. Create a response and recovery plan – If the unthinkable occurs, and hackers get through your data security software, it can help immensely to have a plan of action already prepared.

For more information on protecting your SMB from a data security breach, please see the original article on the Capterra blog.

Comments (0)

Business Sense: Keeping your important data safe

Tags: , , ,

Business Sense: Keeping your important data safe

Posted on 05 September 2019 by cradmin

by Harry Hollander of Moraware

When we’re talking to our customers or countertop fabricators who are considering using our scheduling or quoting software, sometimes we get questions about how we protect ourselves (and you) against catastrophes or hacking attempts.

We care a ton about making sure Systemize and CounterGo are running smoothly, so we put a lot of time, money, and effort into our infrastructure.

So, what does that mean? How are we protecting against hackers, viruses, and other scary stuff on the internet? Well…

We follow industry best practices. Most of it is pretty boring to talk about, but… We use SSL over HTTP – that means every web page you access is protected with the same encryption that you use when you do online banking. We encrypt all passwords, which means that neither your admins nor Moraware support can tell you what your passwords are.

We monitor for intrusions. You’d be surprised (well, maybe not) by how much shady-looking traffic we notice on our servers, that’s probing us for vulnerabilities. We apply all operating system and web server patches immediately. We have a team of developers who evaluate security issues every day and do whatever it takes to prevent issues.

Want to get even more into the weeds? One of the big ways to make sure we’re secure is having good systems in place that allow us to recover from a catastrophe. Here’s more info on our servers. In addition to periodic security audits from outside experts, you might also like the fact that we use multiple top-tier data centers. They all have a bunch of certifications including SOC 3 SSAE 16, Privacy Shield, PCI, GDPR… say that fast 3 times.

So what’s the biggest threat we’re worried about? You!

If you don’t want to open yourself up to hacking, here are a few really good security practices.

  1. Hire employees you trust. This is the number-one place where you’re exposing yourself to security risk. If you hire employees you trust, your whole business will run smoother anyway… just do it.
  2. Don’t share users. We charge per user, so it might be tempting to share users. In addition to being way less secure, your users will have a less personal experience when they share.
  3. Use good passwords. Don’t make your passwords blank or trivial, don’t re-use passwords in multiple places, and don’t share passwords. You should probably consider using a password manager. At Moraware, we use 1password.com, and it really helps us with good password policies on our computers and mobile devices.
  4. Restrict user roles. Instead of making all users admins, you should be restrictive in what users can do. In both CounterGo and Systemize you can customize roles to give the right people access to everything they need to do their job.

Comments (0)




Advertise Here
Advertise Here

The Countertop Industry Insider Monthly Newsletter



......................................

Subscribe to Get New Posts via Email

Enter your email address to receive new posts by email. You can choose to receive notifications weekly or daily, excluding weekends and holidays.



......................................

Advertisement



......................................

CountertopResource on Social Media





......................................


Advertisement



............................................




Webutation
WEB RATING













%d bloggers like this: