BGiant data breaches at giant corporations make headlines just about every month. But small businesses have become the favorite target of hackers. Fight back: Defend your small business’s IT network by following our annual 11-point IT security checklist.
Maybe you saw the news a couple of months ago about Hennepin County’s email system being hacked and thought, “That’s a huge organization — my business is too small for hackers to bother with.” Trust me, hackers welcome that kind of thinking.
Here’s more from the Verizon report that is significant for small business owners:
Over the years of working with our clients, TechGen has put together the following IT security checklist. Some of this you may find overly techy. Whether you have in-house IT staff or an outside IT security specialist help you, the following issues should be addressed at least once per year.
Protect Your Small Business With These IT Security Best Practices
How to Use This IT Security Checklist: Next Steps
Tech people. We do love checklists, don’t we? But in this case, I’m not expecting you to go through this list and check off each item as you knock down each item, badda bing badda boom. Here’s what you can do with this information:
If you know what you’re doing, get these actions on a calendar now.
If you or an internal IT staffer has the ability and administrative access to take care of these items, or some of them, put a due date on your calendar now for each item you plan to address.
Hire an outside firm to handle what you can’t
If you don’t have the knowledge or resources to address any of this, consider getting a professional IT security audit. You can use the checklist as a guide to see if the auditors address each of these areas. Or if you have an IT support firm already in place, hand off this IT security checklist and let ‘em at it.
Perhaps the most important to-do for the checklist is to update it regularly. Computer technology and fraud threats change rapidly — your IT security program needs to evolve with them.
Your small business doesn’t have to be a pushover for cyber criminals. They’re just like many other kinds of thieves: If you put some basic protections in place, they’ll move on easier targets.