{"id":196237,"date":"2020-01-30T07:08:48","date_gmt":"2020-01-30T15:08:48","guid":{"rendered":"https:\/\/www.nationalfunding.com\/blog\/?p=196237"},"modified":"2022-05-04T17:16:52","modified_gmt":"2022-05-05T00:16:52","slug":"small-business-it-security","status":"publish","type":"post","link":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/","title":{"rendered":"5 Small Business IT Security Commandments"},"content":{"rendered":"<p>If your company handles any sensitive information, you likely know about the importance of small business IT security. You may have taken a few basic steps like installing antivirus software or firewalls to <a href=\"https:\/\/www.nationalfunding.com\/blog\/protect-business-cyberattacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">guard your data against cyberattacks<\/a>. If you want to enhance your small business cybersecurity and move your data protection strategy beyond the basics, consider these five areas.<\/p>\n<h2 class=\"\">Consider an Information Security Audit<\/h2>\n<p>If you&#8217;re worried about holes in your business&#8217;s data protection armor, an information security audit can help you find them if they exist. If you don&#8217;t have an IT staff person to take on this task, you can outsource it to an information security firm. The auditor will thoroughly review your company&#8217;s computer networks, data protection technology and data handling practices. They&#8217;ll also ensure that any security programs you&#8217;ve installed are working properly. If any problems surface during the audit, they will make recommendations on how to fix them.<\/p>\n<h2 class=\"\">Back Up Your Data<\/h2>\n<p>The loss of crucial data \u2014 whether deliberate or unintentional \u2014 can devastate the finances and operations of a business. That&#8217;s why your small business IT security strategy should include safe data storage and a reliable backup system.<\/p>\n<p>A cloud backup service is likely the most efficient way to address this need. It lets individual organizations avoid dealing with the cumbersome and often-unreliable infrastructure of in-house data storage. Instead, cloud storage vendors maintain a large pool of storage space that they divvy up among all their customers, while managing the data too, <a href=\"https:\/\/www.pcmag.com\/roundup\/353619\/best-cloud-backup-services-for-businesses\" target=\"_blank\" rel=\"noopener noreferrer\">PC Magazine<\/a> explains. The service can be tailored to fit each business customer&#8217;s size and security requirements.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Man using a laptop in modern work space with machinery\" src=\"https:\/\/www.nationalfunding.com\/blog\/wp-content\/uploads\/2020\/01\/manusingalaptopinmodernw_766772.jpg\" alt=\"Man in workshop follows small business IT security rules on his laptop \" width=\"500\" height=\"334\" \/><\/p>\n<h2 class=\"\">Address Wireless Communication<\/h2>\n<p>If your business uses a Wi-Fi network, you&#8217;ll need to ensure it&#8217;s secure. The <a href=\"https:\/\/www.sba.gov\/business-guide\/manage-your-business\/small-business-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Small Business Administration<\/a> (SBA) recommends setting up a password-protected Wi-Fi router; make sure the network name, or Service Set Identifier, is not publicly visible.<\/p>\n<p>The <a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/protecting-personal-information-guide-business\" target=\"_blank\" rel=\"noopener noreferrer\">F<\/a><a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/protecting-personal-information-guide-business\" target=\"_blank\" rel=\"noopener noreferrer\">ederal Trade Commission<\/a> (FTC) suggests limiting the number of people who can access your company&#8217;s computer network via smartphones, tablets, inventory scanners and other wireless devices. The FTC also recommends encrypting any data transmitted over your internal wireless network. Make sure your router has Wi-Fi Protected Access 2 capability \u2014 the highest current security standard \u2014 and that any wireless devices you and your employees use support WPA2.<\/p>\n<h2 class=\"\">Protect Digital Copiers<\/h2>\n<p>Computers and mobile devices aren&#8217;t the only devices that need protection. The hard drive on your digital copier also contains data that may be vulnerable to cybertheft. The FTC suggests choosing copiers with data security features like encryption and overwriting \u2014 a file-swiping method that substitutes random characters for existing data, helping to thwart a thief&#8217;s attempts to reconstruct the data. The agency advises overwriting the entire hard drive of your digital copier at least once a month.<\/p>\n<h2 class=\"\">Investigate Cyber Insurance<\/h2>\n<p>According to the <a href=\"https:\/\/www.irmi.com\/term\/insurance-definitions\/cyber-and-privacy-insurance\" target=\"_blank\" rel=\"noopener noreferrer\">International Risk Management Institute<\/a>, the cyber and privacy insurance policy usually covers liability for many expenses related to a data breach, like financial losses due to network downtime, business interruption and other results of the breach; notifying those affected by the breach; and any related legal expenses and regulatory fines.<\/p>\n<p>If you&#8217;re ready to ramp up your small business cybersecurity but need help covering the upfront cost, a <a href=\"https:\/\/www.nationalfunding.com\/small-business-loans\/\" target=\"_blank\" rel=\"noopener noreferrer\">small business loan<\/a> may be a good financing option. The payoff of these small business IT security measures includes a lower risk of mishandled sensitive data and better peace of mind.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Build on your basic cybersafety know-how by upgrading your small business IT security measures. We&#8217;ve gathered the next steps for you.<\/p>\n","protected":false},"author":11,"featured_media":196236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[96,90],"class_list":["post-196237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-taxes-regulations","tag-inventory-management-tools","tag-small-business-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Small Business IT Security: 5 Commandments to Follow<\/title>\n<meta name=\"description\" content=\"Build on your basic cybersafety know-how by upgrading your small business IT security measures. We&#039;ve gathered the next steps for you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Small Business IT Security: 5 Commandments to Follow\" \/>\n<meta property=\"og:description\" content=\"Build on your basic cybersafety know-how by upgrading your small business IT security measures. We&#039;ve gathered the next steps for you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nationalfunding.com\/blog\/blog\/wp-json\/wp\/v2\/posts\/196237\" \/>\n<meta property=\"og:site_name\" content=\"The Bottom Line by National Funding\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/national.funding\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-30T15:08:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-05T00:16:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/live-nationalfunding.pantheonsite.io\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sonya Stinson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NationalFunding\" \/>\n<meta name=\"twitter:site\" content=\"@NationalFunding\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sonya Stinson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/\",\"url\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/\",\"name\":\"Small Business IT Security: 5 Commandments to Follow\",\"isPartOf\":{\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.nationalfunding.com\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg\",\"datePublished\":\"2020-01-30T15:08:48+00:00\",\"dateModified\":\"2022-05-05T00:16:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/#\/schema\/person\/16e930431e6654b8b843ef17b41e4424\"},\"description\":\"Build on your basic cybersafety know-how by upgrading your small business IT security measures. We've gathered the next steps for you.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#primaryimage\",\"url\":\"https:\/\/blog.nationalfunding.com\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg\",\"contentUrl\":\"https:\/\/blog.nationalfunding.com\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg\",\"width\":1440,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nationalfunding.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Small Business IT Security Commandments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/#website\",\"url\":\"https:\/\/www.nationalfunding.com\/blog\/\",\"name\":\"The Bottom Line by National Funding\",\"description\":\"Read National Funding&#039;s small business blog for tips and suggestions on how to grow your business by focusing on different aspects of business operations.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nationalfunding.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/#\/schema\/person\/16e930431e6654b8b843ef17b41e4424\",\"name\":\"Sonya Stinson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nationalfunding.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a1804b7412d79deeb4211f8b0ca1b29d10191d944bbf6795a2543bf51862ead3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a1804b7412d79deeb4211f8b0ca1b29d10191d944bbf6795a2543bf51862ead3?s=96&d=mm&r=g\",\"caption\":\"Sonya Stinson\"},\"description\":\"Sonya Stinson is a New Orleans-based writer who covers personal finance, careers, higher education, small business and lifestyle topics. Her work has appeared in Forbes.com, Bankrate.com, CNNMoney.com, Black MBA, Entrepreneur, Minority Nurse, American Craft, The Christian Science Monitor and many other publications.\",\"url\":\"https:\/\/www.nationalfunding.com\/blog\/author\/sonya-stinson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Small Business IT Security: 5 Commandments to Follow","description":"Build on your basic cybersafety know-how by upgrading your small business IT security measures. We've gathered the next steps for you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Small Business IT Security: 5 Commandments to Follow","og_description":"Build on your basic cybersafety know-how by upgrading your small business IT security measures. We've gathered the next steps for you.","og_url":"https:\/\/www.nationalfunding.com\/blog\/blog\/wp-json\/wp\/v2\/posts\/196237","og_site_name":"The Bottom Line by National Funding","article_publisher":"https:\/\/www.facebook.com\/national.funding\/","article_published_time":"2020-01-30T15:08:48+00:00","article_modified_time":"2022-05-05T00:16:52+00:00","og_image":[{"width":1440,"height":800,"url":"https:\/\/live-nationalfunding.pantheonsite.io\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg","type":"image\/jpeg"}],"author":"Sonya Stinson","twitter_card":"summary_large_image","twitter_creator":"@NationalFunding","twitter_site":"@NationalFunding","twitter_misc":{"Written by":"Sonya Stinson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/","url":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/","name":"Small Business IT Security: 5 Commandments to Follow","isPartOf":{"@id":"https:\/\/www.nationalfunding.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.nationalfunding.com\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg","datePublished":"2020-01-30T15:08:48+00:00","dateModified":"2022-05-05T00:16:52+00:00","author":{"@id":"https:\/\/www.nationalfunding.com\/blog\/#\/schema\/person\/16e930431e6654b8b843ef17b41e4424"},"description":"Build on your basic cybersafety know-how by upgrading your small business IT security measures. We've gathered the next steps for you.","breadcrumb":{"@id":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#primaryimage","url":"https:\/\/blog.nationalfunding.com\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg","contentUrl":"https:\/\/blog.nationalfunding.com\/wp-content\/uploads\/2020\/01\/smallbusinessconceptowne_766776.jpg","width":1440,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.nationalfunding.com\/blog\/small-business-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nationalfunding.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Small Business IT Security Commandments"}]},{"@type":"WebSite","@id":"https:\/\/www.nationalfunding.com\/blog\/#website","url":"https:\/\/www.nationalfunding.com\/blog\/","name":"The Bottom Line by National Funding","description":"Read National Funding&#039;s small business blog for tips and suggestions on how to grow your business by focusing on different aspects of business operations.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nationalfunding.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.nationalfunding.com\/blog\/#\/schema\/person\/16e930431e6654b8b843ef17b41e4424","name":"Sonya Stinson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nationalfunding.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a1804b7412d79deeb4211f8b0ca1b29d10191d944bbf6795a2543bf51862ead3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1804b7412d79deeb4211f8b0ca1b29d10191d944bbf6795a2543bf51862ead3?s=96&d=mm&r=g","caption":"Sonya Stinson"},"description":"Sonya Stinson is a New Orleans-based writer who covers personal finance, careers, higher education, small business and lifestyle topics. Her work has appeared in Forbes.com, Bankrate.com, CNNMoney.com, Black MBA, Entrepreneur, Minority Nurse, American Craft, The Christian Science Monitor and many other publications.","url":"https:\/\/www.nationalfunding.com\/blog\/author\/sonya-stinson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/posts\/196237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/comments?post=196237"}],"version-history":[{"count":2,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/posts\/196237\/revisions"}],"predecessor-version":[{"id":196239,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/posts\/196237\/revisions\/196239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/media\/196236"}],"wp:attachment":[{"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/media?parent=196237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/categories?post=196237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nationalfunding.com\/blog\/wp-json\/wp\/v2\/tags?post=196237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}