Cyber security 101: How your small business can move on after a cyber attack

September 17, 2024

Cyber security 101: How your small business can move on after a cyber attack

September 17, 2024

Picture this: it’s a routine Monday morning, and as you sip your coffee, you notice something unusual on your company’s network. Panic starts to set in as you realize your small business has fallen victim to a cyber attack. 

AUTHOR

Drew is MNP’s National Cyber Security Assessment Lead, Digital Services. Based in Edmonton, he leads the Cyber Security practice for Alberta. With close to two decades of experience, Drew helps organizations with critical IT systems or sensitive information that are looking to build or enhance their cyber security programs.

What do you do?

Cyber criminals don’t discriminate, they target organizations from all industries, of all sizes. But here’s the good news: there are steps you can take in the event of a cyber security breach that are designed specifically to help small and medium-sized businesses move forward.

Let’s dive in.

What are some best practices to protect against cyber attacks?

Before digging into what to do during a cyber attack, let’s talk about the importance of laying a solid foundation of security. Implementing preventative measures can dramatically reduce your risk and protect your business against threats.

Cyber attacks can come in many forms, each posing significant risks to your business. Common types include (but are not limited to):

  • Phishing: Which uses deceptive emails or messages to steal sensitive information
  • Ransomware: Which involves malicious software that locks data until a ransom is paid
  • Malware: Which involves software that’s designed to damage or infiltrate systems

Your business can also face insider threats, where employees or known individuals misuse access to cause damage.

Here are seven things you can do to shield your business against these threats:

  1. Set up multi-factor authentication (MFA): MFA adds an extra layer of security by requiring multiple forms of verification before granting access. This could be something like a text message code or a fingerprint scan.
  2. Secure and backup your files: Regularly back up your files, either offline or in the cloud, to ensure you have access to your data even if it gets compromised.
  3. Set your app, browser, or operating system software to update automatically: Automatic updates make sure your software has the latest security patches. Cyber criminals can exploit vulnerabilities in outdated software, so keeping it updated is a simple and effective way to protect your IT infrastructure.
  4. Encrypt your devices and storage: Encryption scrambles your data, making it unreadable to unauthorized users.
  5. Change the default name and password on your router: Default credentials are easy targets for hackers, so make sure your router passwords are unique and strong. Customize the settings on your router to make it less identifiable and harder to breach. If you suspect your router has been compromised, immediately change passwords and ensure you have a unique password for each service and account.
  6. Turn on router WPA2 or WPA3 encryption: Use the latest encryption standards to secure your wireless network. This mitigates unauthorized access and keeps your data safe while being transmitted over wireless networks.
  7. Require passwords on all devices: Make sure all your devices have password protections and enforce the use of strong passwords. Best practice is to aim for at least 12 characters mixing numbers, uppercase and lowercase letters, and symbols.

How can I build a cyber-secure organization?

Cyber security isn’t just about technology — it’s about creating a culture of vigilance and preparedness. Here’s how to integrate it into your business:

Establish a breach plan

A breach plan is your emergency action plan, detailing the steps to take when a cyber attack occurs. It should outline things like how to save important data, how to maintain business operations, and how to notify customers. It’s vital that this plan include a communication strategy, which identifies who needs to be informed and how while maintaining transparency and customer trust.

You may need to review and update your breach plan regularly to adapt to new threats and keep all team members familiar with protocols in the event of an attack.

Provide ongoing employee training

Routine training sessions keep your team updated on new threats, as well as continues to foster a culture of security. These learning opportunities will help employees recognize and respond to potential threats, reducing the risk of human error, which can be a weak link in cyber security.

It’s imperative to encourage a culture of respect and openness, so your team members feel comfortable reporting potential threats.

How do I respond in the event of a cyber attack?

If your business is on the receiving end of a cyber attack, it can be a scary and a confusing time. But know that there are actions you can take to help mitigate damage and successfully recover — and give you peace of mind moving forward.

Here are five steps to effectively move forward in the wake of a cyber attack:

Step 1: Identify

Start by taking inventory of all your software, hardware, data sources, and third-party vendors with access to your data. Use this information to draft a cyber security policy that clearly outlines roles and responsibilities and share it with your team.

This policy needs to be clear, accessible, and updated with regularity. By identifying your assets and who has access to them, you can better protect your business against potential cyber threats.

Step 2: Protect

Safeguard your business by implementing protective measures. Deploy antivirus, anti-malware, and firewall solutions to shield your systems. Monitor or maintain logs for network and device access to detect unusual activity.

Make sure your data can be quickly restored in the event of a breach by performing regular backups. If you’re getting rid of data or devices, ensure the relevant sensitive information is irretrievable.

Lastly, schedule routine training sessions to keep your team aware of best practices, the latest threats, and how to protect against them.

Step 3: Detect

When it comes to swiftly recovering from a cyber attack, it pays to be vigilant. This means monitoring your systems for signs of unauthorized or suspicious activities.

Lookout for unusual internal or external connections to your network, and make sure that all connections are secure and legitimate.

Step 4: Respond

It’s essential to have a cyber security response plan that’s thorough, as well as routinely practiced and tested. The plan will include protocols on reporting breaches to authorities, customers, and other stakeholders. It’s imperative that everyone understands their responsibilities so they can act quickly.

This response plan should include procedures to keep your business operations running smoothly through an attack, as well as a contingency plans to minimize disruptions. By staying informed on emerging threats, you can adjust the plan and your shields accordingly.

Step 5: Recover

After an attack, it’s time to focus on repairing and restoring your impacted systems. Make sure you keep your team — and, if appropriate, your customers — updated on your recovery efforts. By maintaining transparent communication with your customers and employees about the steps being taken to resolve the issue, you reassure stakeholders and rebuild trust.

By following these steps and fostering a proactive approach to cyber security, small and mid-sized businesses can significantly reduce their vulnerability and better their ability to recover from cyber attacks. The foundation of effective security lies in preparedness, vigilance, and continuous improvement.

We have your back

In this digital era, safeguarding your business against cyber threats is not just an option — it’s a necessity.

Don’t wait until it’s too late. Reach out to our team of experienced advisors. We can assess your business’ cyber readiness or provide ongoing support for your IT environment.

Connect with us to get started

Our team of dedicated professionals can help you determine which options are best for you and how adopting these kinds of solutions could transform the way your organization works. For more information, and for extra support along the way, contact our team.