\u201c2016 Internet Security Threat Report.\u201d<\/a>\u00a0 Symantec\u00a0 points out that the number of spear phishing campaigns against small businesses, in which an attacker tries to\u00a0 exploit an organization by sending an infected document attached to an email, grew each year from 18% in 2011 to 43% in 2015, although many of the attacks were directed to fewer organizations.<\/p>\nThe report concludes that 1 in 40 small businesses are at risk of being the victim of such a cyber crime. That figure still is much less than the 1 in about 2.7 large businesses that are targeted every year with multiple spear fishing attacks. However, Symantec says the numbers indicate that businesses of all sizes are vulnerable and that hackers are just playing the “long game” with larger companies.<\/p>\n
In part, because they have smaller IT budgets and so spend less on cyber security; small businesses may be more vulnerable to the growing risk of cyber crime. In 2015 Symantec discovered more than 430 new unique pieces of malware, up 36% from the year before. Still, the increase in spear fishing attacks directed at small businesses clearly shows that these attacks are intentionally directed at smaller organizations, Symantec points out.<\/p>\n
Since all businesses are vulnerable to attacks, being aware of the potential threat is critical. To minimize risks, every small business team member needs to do their part to protect company and customer data. Security measures should include:<\/p>\n
Create strong passwords:<\/strong> A strong password should be at least eight characters and include a combination of upper and lower case letters, numbers and symbols. Also passwords should be changed every 90 days at a minimum.<\/p>\nPut up a firewall:<\/strong> Firewalls protect network traffic and can stop hackers from getting data by blocking certain websites. Small businesses also can program a firewall to restrict what company data and emails can be sent.<\/p>\nInstall antivirus software:\u00a0 <\/strong>Antivirus and anti-malware software programs should be installed and kept\u00a0 to date with the latest versions that include protection against new malicious programs.<\/p>\nEncrypt data:<\/strong> Encryption software can be used to alter information into unreadable code to protect financial information and customer data.<\/p>\nProtect mobile devices<\/strong>: Users should be required to password protect their mobile devices, encrypt their data, and never access proprietary company data over public Wi-Fi. Company cyber security guidelines also should include instructions for reporting lost or stolen equipment. Installing remote wipe apps that delete data from a mobile device after a pre-specified number of failed log-in attempts or moves outside of a defined geography is another precaution to prevent data compromise.<\/p>\nUpdate browsers<\/strong>: The latest browser versions should be installed to avoid watering holes, which is malicious code installed on trusted websites. .<\/p>\nSecure the Wi-Fi network:<\/strong> A strong admin password should be set on the router and periodically changed along with a strong passphrase to encrypt the network.<\/p>\nTrain employees on security:<\/strong> A written security polity\u00a0 should be in place to protect data, which everyone on the small business team must read and be sure to understand.<\/p>\nSecure calls with DECT compliant headsets<\/h4>\n
As small businesses establish procedures to protect confidential information, they should also consider protecting calls against eavesdropping. To this end, many headsets are based on the Digital Enhanced Cordless Telecommunications (DECT) standard. Originally used to connect cordless phones (handsets) to a base station, DECT nowadays also is used to establish a wireless communication link between a headset and desk phone, mobile phone or computer to make and receive calls.<\/p>\n
Security is one of the strong points of DECT technology. It uses a layered system, which includes subscription, encryption and authentication to ensure a very high level of protection against eavesdropping. Certain industries, such as healthcare and finance, require DECT-based wireless communications for maximum security and confidentiality.<\/p>\n
To learn about Plantronics DECT Security Certified Products, download Plantronics white paper<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Cyber criminals have set their sights on small businesses. […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[510],"tags":[979,1301,1356,1357],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/2994"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=2994"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/2994\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=2994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=2994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=2994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}