Language Translation
  Close Menu

Section

Breadcrumbs

Take the ‘Grinch’ Out of Your End of Year Productivity, Use Cyber to Make Your Holidays More Enjoyable

Wednesday, December 4, 2024

Blog topics: 

If you’re a business owner, when it comes to this time of year – beginning with the week leading up to Thanksgiving and running through the start of a New Year – it can feel as though productivity is already out the door; scrambling away from you and your team like a safety who picks off your favorite team’s quarterback’s pass and avoids, seemingly, every hurdle on the way to the endzone.

It can be frustrating, because, of course, as all of this is happening, you’re trying to legitimately get as much work done as you can, right? Adding to the mix, there’s always a holiday party or two that’s on the calendar as well, before, inevitably, the time comes for everyone to take some time off and shut down the office.

Before that happens, one of the best things that you can do is to make sure that the “to do” list for your cybersecurity is not only ready for the holiday rush, but that your critical systems (along with any sensitive customer and employee data) are securely protected.

The best part is, you’ve (still) got some time to follow a few simple steps to avoid the types of threats that could make it seem as though the Grinch has targeted your business, according to the Verizon 2024 Data Breach Investigations Report, including:

  • (Less than) 60 Seconds – It’s the median time it takes for users to fall for a phishing email.
  • Stolen credentials – 31 percent of breaches involve the use of stolen passwords.
  • Ransomware – 32 percent of breaches involve ransomware or other extortion techniques.
  • The median loss for business email compromise (BEC) attacks is about $50,000.

To help avoid a situation, in which a cybercriminal tries to force your team into committing a turnover, Verizon Business offers six cybersecurity tips to follow including:

  • Give your passwords an upgrade.
    • Create complex, unique passwords for all your logins and accounts:
      • Don’t reuse passwords
      • Include numbers, capital letters and special characters in each password
      • Use a password manager to keep track of passwords
  • Think beyond the password.
    • Add two-factor authentication (2FA) to create an extra layer of security. Methods include:
      • A code sent through email or text
      • Biometrics
      • Authenticator apps
  • Keep your software up-to-date and make sure you install the latest patches to keep your systems secure. Be sure to check your:
    • Operating systems
    • Applications
    • Device firmware
  • Avoid suspicious emails.
    • Your employees are your most important defense against attacks like phishing.
    • Make sure they watch out for emails with:
      • Suspicious URL
      • Demands for payment
      • Requests for passwords
  • Secure your mobile devices.
    • Here’s how to keep your work phones and tablets secure in the event they are lost or stolen:
      • Add passwords or biometrics to the unlock screen
      • Use a Mobile Device Management solution to remotely lock and wipe missing devices
      • Ensure sensitive data is encrypted to prevent unauthorized access
  • Plan for the worst.
    • Prepare ahead of time for an attack so you can get back to business faster:
      • Create a cybersecurity policy that lists your recovery steps
      • Know who to call in the event of a ransomware attack
      • Consider adding cybersecurity insurance to protect your business

Additionally, there are other good sources for employers to rely on, when it comes to work-related best practices to consider, including a recent blog post from Insperity that also addresses some areas involving employees who work remotely. Both the Federal Communications Commission (FCC) and the Cybersecurity Infrastructure and Security Agency (CISA) also offer their guidance and expertise with a recognition that it can be challenging for small businesses, especially, to guard against being the victim of a cyber incident or cyberattack.

Here in Indiana, cybersecurity is a top priority year-round, and the Indiana Cyber Hub website (that you’re on) features a wide range of free-to-download resources, tips, and best practices that are designed to help all Hoosiers, including businesses of all sizes, as well as local government and non-for-profit organizations.

Here’s to a safe and happy holiday and when it’s time to turn off the lights for a few days, we hope (as always…) the information we’re sharing will help in delivering a hit on any would-be cybercriminals!