Wednesday, June 7, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Digital security for the self‑employed: Staying safe without an IT team to help

Researcher by Researcher
May 24, 2023
in Cybersecurity
0
Digital security for the self‑employed: Staying safe without an IT team to help
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

Approximately one in seven people in Europe and the United States are self-employed, often realizing their dream to be in charge of their own destiny and having more freedom and control over their careers. But with nominally more freedom to shape the trajectory of their future comes extra jeopardy. This often means little or no sick pay and holiday/parental leave and in the IT realm a lack of support of an IT department, something most salaried workers take for granted.

Related articles

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023

This is particularly acute when it comes to cyber-risk that sole traders or proprietors are facing. If you run your own business, you will be on the radar of threat actors taking aim at your funds, sensitive client information and potentially even your intellectual property. Understanding where the risks are and how to build resilience are key. No sole trader wants to be spending their time dealing with the fallout of a breach, rather than building up their business.

What’s at stake?

The bottom line is that cybercriminals want to make money. And in general, more money can be extorted and stolen from businesses – however small – than individuals. But threat actors are also largely opportunistic. That means they go after the low-hanging fruit – those online accounts that aren’t properly protected, devices that have no security software installed, or PCs that aren’t running the latest operating system, browser and other software versions.

There is little publicly available data on the volume of breaches impacting sole traders. However, it stands to reason that with fewer resources and little or no in-house IT support, they’ll be more exposed to cyber-threats. Consider how the following could affect your business:

  • A ransomware attack that locks you out of your business files, including any synced cloud storage.
  • An attack where threat actors steal and threaten to leak your most sensitive files, and/or sell them on the dark web. This could include highly regulated personally identifiable information (PII).
  • Account takeover attacks via password theft or “brute force” techniques. The hijacked business account could be used in follow-on phishing attacks on clients or even business email compromise (BEC).
  • Malware designed to harvest logins to your online corporate bank account in an attempt to drain it of funds.

The impact on the sole trader

The challenge for sole traders is not only limited IT resources. There’s arguably a bigger impact to corporate reputation and the financial bottom line which is harder to recover from. Clients may have little to lose in walking away following a serious breach – especially as working relationships are often informal.

That’s not to mention possibly the biggest direct impact of a serious cyber-incident on a sole trader: productivity loss. The time that a self-employed business owner has to spend cleaning up their IT environment and recovering from a major cyber-attack, is time they aren’t able to spend serving their clients.

How to keep your business cyber secure

According to UK government figures, just a fifth of the country’s micro-businesses have a formal security strategy. Yet the average cost of breaches over the previous 12 months was calculated at over £3,000 (US$3,740), which could be a significant outlay for companies of this size. That’s why sole traders should take some time out to get the security basics right, by focusing on the following preventative measures:

  • Back up your business-critical data: This means first working out what’s important enough to backup, and then choosing a backup solution. Cloud storage (i.e., OneDrive, Google Drive) is a useful option as backups are automatic and there’s no need for an upfront investment in hardware. Most major providers have capabilities enabling you to restore from previous versions, even if ransomware spreads to cloud data. However, for extra peace of mind, it may be worth also backing up to a removable hard drive, and ensuring it is left disconnected until needed.
  • Install anti-malware software: Choose a product from a reputable vendor and ensure all PCs and other devices are covered. Be sure to keep automatic updates switched on so it’s always running the latest version.
  • Keep all PCs and devices patched: Make sure all operating systems and other software are on the latest version by switching on automatic updates. This means they’ll be patched against the latest exploits.
  • Keep accounts secure: Use only strong, unique passwords, stored in a password manager, and switch on two-factor authentication whenever it’s offered (social media, email, cloud storage, router etc). This will mitigate the risk of phishing, brute force password-guessing and other attacks.
  • Protect your mobile devices: Keep all software up to date, install security software, and don’t download any apps from non-official app stores. Make sure the devices are locked with a strong passcode or a solid biometric authentication method and can be remotely tracked and wiped in case of loss or theft.
  • Build a plan for when things may go wrong: This “incident response plan” doesn’t need to be exhaustive. Just know which IT services your business relies on and have a handy list of contacts to get in touch with if the worst-case scenario happens. This will speed up recovery times. Keep a paper copy of the plan handy in the event that systems are forced offline.
  • Test your resilience today with the National Cyber Security Centre’s Exercise in a Box and Cyber Aware

Above all, awareness is key. Simply by reading this article, your business will be in a better place. Put the above best practices in place to keep your business out of reach of opportunistic adversaries.



Source link

Tags: DigitalsafesecurityselfemployedStayingTeam
Share76Tweet47

Related Posts

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
0

North Korean threat group Kimsuky has recently launched a social engineering campaign against a number of experts specializing in North...

Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
0

Open source password manager KeePass was updated over the weekend to patch a vulnerability allowing attackers to retrieve the cleartext...

Zero-day MOVEit Transfer vulnerability exploited in the wild

Zero-day MOVEit Transfer vulnerability exploited in the wild

June 6, 2023
0

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan The Cybersecurity & Infrastructure Security Agency has issued an alert...

New DDoS Attack Vector Abuses Content Filtering Systems

UNC4857 Exploits MOVEit Transfer Flaw in Data Extortion Attacks

June 6, 2023
0

A newly discovered threat campaign has been observed exploiting the recently uncovered, critical-severity MOVEit Transfer vulnerability in order to launch...

Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
0

Security researchers recently identified more than 30 malicious extensions that had made their way into the Chrome web store, potentially...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

June 6, 2023

Recent Posts

Money20/20 Europe 2023: Day One TFT Roundup

Money20/20 Europe 2023: Day One TFT Roundup

June 7, 2023
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved