SMB Now - Small & Medium Business Magazine
Tech Travel Agent, your one point of contact. Follow SMBNow on
These Social Networks
Follow SMBNow on LinkedInFollow us on Google+Follow us on Twitter
      Saturday, December 16, 2017

 Subscribe in a reader
 



Editor Login

SMBnow.com / SMB Computer Services / 3 Things SMBs should do about Tech Security Threats
Monday, July 21, 2014
619 Update by Brawlin Melgar, Lead Publisher
Leave a Comment

3 Things SMBs should do about Tech Security Threats


by Aakash Patel

 

Over the past few months, technology companies around the world have been tackling one of the largest security threats. According to cyber security columnist Joseph Steinberg, today [security threats] are the  “worst” since “commercial traffic began to flow on the Internet.”

 

One big threat to SMBs is called “Heartbleed”. this is a serious vulnerability on OpenSSL, which is one of the widely used security protocols. SMBs have to deal with confidential customer data. Many SMBs have  opted for OpenSSL because it is inexpensive to implement and manage.

 

Here are three things that SMBs should consider in order to minimize tech security threats from smartphones.

 

1. Migrate To The Cloud :There are a number of  software tools that SMBs use that are vulnerable because of the deployment of outdated technologies. Migrating to high quality cloud-based services could help. Cloud-based applications are continually maintained for quality and security purposes. For Enterprise Resource Planning (ERP), you can choose Epicor,a NetSuite partneror many others. These consulting companies handle the implementation and managing of cloud ERP in your business as a managed service.

 

2. Have a BYOD Policy : The use of smartphones has become predominant. Today, most employees make use of their smartphones to do work-related things such as checking emails, transferring documents and making work related calls. This is a vulnerability because third party devices could be the source of malware attacks.

 

Bring-Your-Own-Device (BYOD) is here to stay. One really cannot prevent the use of employee's personal devices at work. The optimal solution is to have an elaborate BYOD policy that permits smartphones and personal laptops only after they have been reviewed and authorized by your network security person or department.

 

3. Hire A Consultant : Hiring a consultant will provide you with a go-to person who will advise you on all things relating to IT security such as upgrading software or changing your communication systems. A security consultant will help you with the process better than just doing it yourself.

 

What other policies and pointers do you think would help your business against cyber security? Write to us in the comments below.

 

Author Bio :Aakash Patel is an IT consultant with 8 years of experience in cloud and IT security. He works predominantly with SMB clients in India, Canada and the United States. 


SMB News Archive
   
  FREE SMB News Release
  Apply for the Rentacomputer CARES Scholarship
 

Computer and AV Rentals Nationwide

 

Security Cameras
Camera Security and Surveillance

   
 

Computer Service and Networking Nationwide
Computer Service Now

   
 

Laptop Rentals
Laptop/Notebook Rentals

   
 

Projector Rentals Nationwide
LCD Projector Rentals

 
 

 


 
If you have an SMB targeted company, please send SMB news story ideas to:
 
 
Visit other Xponex Web and Media News Publications
Main Street Monroe    Middletown USA


Copyright ©2017 SMBNow.com    Privacy Statement