• Home
  • Our Books
  • Our Film
  • Games
  • About Us
  • Contact Us
  • Login

Perspectives on all eras of videogames, computers, technology, and pop culture since 2003

Login

Login
Armchair ArcadeArmchair Arcade
Armchair ArcadeArmchair Arcade
  • Home
  • Our Books
  • Our Film
  • Games
  • About Us
  • Contact Us
  • Login

How To Protect Your Business Against Cyber Attacks

How To Protect Your Business Against Cyber Attacks
How To Protect Your Business Against Cyber Attacks

How To Protect Your Business Against Cyber Attacks

September 23, 2019 Posted by Jane Smith Editorial No Comments

Running a small business requires you to be a jack of all trades. Not only do you have to specialize in your own field, you have to be an accountant, human resources specialist, payroll guru, recruitment agent, and client specialist – not to mention an expert in online safety and cyber security. Everything else falls by the wayside if you become the victim of nefarious cyber attacks.

You might find yourself minimizing the issue, thinking, “I’m such a small player, no one will bother with cyber attacks on my business.” This could not be further from the truth. Hackers and online criminals often look to target small businesses over larger corporations, realizing that they are often less prepared to defend against attacks.

Cyber attacks are often used to obtain credit card information, personal data, and steal the identities of your clients. Could you imagine the damage to your good name and your business if you allowed hackers to steal your clients’ information? You need to take action now to protect your business against cyber attacks.

Watch out for phishing emails

While you might assume that your employees know not to open any suspicious emails, hackers are getting more and more sophisticated. Phishing emails are increasingly convincing, and even people who think they are savvy can end up opening them and falling prey to cyber attacks.

Phishing emails often target people in specific roles in your company – check out Entrepreneur’s article, “5 Types of Employees Often Targeted by Phishing Attacks.” Get prepared, and stay vigilant.

Install the best anti-virus software on the market
While you can educate your staff with training about how to avoid phishing emails, the reality is that the best cyber criminals can still get through your best educational efforts. In order to protect your clients’ information and keep your business safe, you need to invest in the best anti-virus software that you can afford. Pay special attention to expiry dates, and don’t let your coverage lapse at any point.

Use a Business VPN

A VPN can be used to establish secure connections between remote users and the entire corporate network back at headquarters. By doing so, it ensures that no malicious parties will be able to intercept sensitive data as it transmits through online channels. A VPN also helps to protect against internal threats, such as a disgruntled employee who might try to access company data from home or an outside network. In this case, it is important that the VPN encrypts all of the network traffic traveling between the remote computer and the organization’s servers.

In fact, a VPN should be implemented in tandem with Multi-Factor Authentication (MFA) measures, which are another form of security best practice. MFA involves using an additional layer of authentication when logging into a system, usually through an app on a mobile device or by entering a PIN number. If you are using a Fortinet VPN, you should secure your access with a Fortinet MFA solution. Many businesses already use this sort of secure access for their employees, however, it can also be beneficial for you to start using it if you want to keep your business security in place.

Install a firewall as soon as possible

While your anti-virus protects from malicious attacks that infect your systems from within (as in a successful phishing attack), you should also have a firewall to protect your data from an exterior attack. The Federal Communications Commission (FCC) recommends that all small businesses install firewalls to prevent cybercriminals from accessing your valuable information. If you (or any of your employees) ever work from home, you need to also install a firewall on your home computer and laptops.

Ensure that your employees change their passwords regularly

Secure passwords are one of the most important aspects of keeping your business safe from cyber criminals and attack. While your employees might find the process of changing their passwords every 60 to 90 days time consuming and annoying, you must ensure that that they are doing so. The Verizon 2016 Data Breach Investigations Report shows that a staggering 63% of data breaches and theft occurred because of weak, stolen, and lost passwords!

Passwords must be complex to be strong

It’s not enough to simply change your passwords regularly – the passwords should be varied, complex, and unique. “The more complex and varied the combination, the stronger your password is, and the safer you are from having your information or account stolen.” Your employees’ passwords should be a combination of numbers, upper and lowercase letters, and symbols.

Multifactor (2-factor) identification is an important additional step

According to PC Week in their article “10 Cyber Security Steps Your Small Business Should Take Right Now,” every small business needs to implement multi-factor identification. Use your employees’ cell numbers to act as a second form of identification, preventing cyber criminals from accessing their log-ins and PINs.

Cyber security should be your top priority

While you might get caught up in the day to day minutiae of running your business, filling orders and dealing with clients, you need to ensure that your security remains a top priority. In addition to making cyber security one of your main concerns, you also need to educate your employees and keep them up to date on all the ways that they are vulnerable online.

Education, 2-factor authentication, firewalls, anti-virus software – you need to stay on top of it all. As cyber attacks get more sophisticated, you need to outfox them every step of the way.

Related

Tags: cybercyber attackcyber attackssecurity
No Comments
Share

About Jane Smith

Correspondent for Armchair Arcade.

You also might be interested in

Kopack KT-01 Anti-theft Slim Business Laptop Backpack
Kopack KT-01 Anti-theft Slim Business Laptop Backpack

Review: Kopack KT-01 Anti-theft Slim Business Laptop Backpack

Mar 20, 2016

The Kopack KT-01 Anti-theft Slim Business Laptop Backpack, with Tigernu[...]

facial recognition technology with a woman looking directly at the camera - Generated with AI
Facial recognition technology has rapidly evolved.

Why ROC Software Sets the Benchmark for Facial Recognition Technology

May 22, 2024

Rank One Computing excels in facial recognition with its ROC SDK v2.4, ranking top in NIST benchmarks, which assess error rates across diverse scenarios. Its technology utilizes advanced algorithms and offers unmatched efficiency, supporting various demographics and operating environments robustly. Ethical practices and continuous innovation ensure reliability and top-tier performance in biometric security.

Why and how cybersecurity must be taken seriously
Why and how cybersecurity must be taken seriously

Why and how cybersecurity must be taken seriously

Oct 22, 2021

This article will examine a few simple tips that you can use to improve your cybersecurity levels.

Leave a CommentCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

  • How has gaming evolved across the last decade and what is next?
  • Polymega Collections Volumes 9 and 10 now available – Strikers 1945, Bases Loaded, and more!
  • How The Legacy Of League Of Legends Paved The Way For eSports Betting
  • Tech Meets Design: What Is a Flexible Monitor and Why Gamers Should Care
  • Application of Strategic Thinking in Nomini Casino Games
  • DXRACER Partners with CS2 MESA Nomadic Masters Spring 2025 to Elevate Esports Comfort and Performance
  • Playing the Long Game: A Simple Guide to Casino Money Sense
  • Best Games to Bet on This Season
  • Retro Gamers, Modern Thrills: Why Instant Withdrawal Casinos Resonate with Arcade Fans
  • Pixels and Progress: How Retro Gaming Continues to Shape Modern Technology

Recent Comments

  • Aiodensghost on Official Game List for My Arcade Atari Gamestation Pro
  • keyboredom on Quick guide on how to play on the Internet Arcade
  • Bill Loguidice on Official Game List for My Arcade Atari Gamestation Pro
  • Melanie Levenstein on Official Game List for My Arcade Atari Gamestation Pro
  • George on How to Predict CS:GO/CS2 Skins Prices?
  • Bill Loguidice on Retro Games Ltd to release The Spectrum, fully working ZX Spectrum, and here’s the game list!
  • Derek on Retro Games Ltd to release The Spectrum, fully working ZX Spectrum, and here’s the game list!
  • Bill Loguidice on Retro Games Ltd to release The Spectrum, fully working ZX Spectrum, and here’s the game list!
  • Simon on Retro Games Ltd to release The Spectrum, fully working ZX Spectrum, and here’s the game list!
  • Viktor Špička on Retro Games Ltd to release The Spectrum, fully working ZX Spectrum, and here’s the game list!

Archives

Categories

Explore

android (46) apple (37) ar (37) Arcade (165) Atari (73) atgames (173) book (99) books (98) casino (496) esports (46) firmware (43) Flashback (45) gambling (520) Gaming (40) home arcade (114) htc vive (42) humble bundle (282) humble store (67) ios (37) led (35) legends (40) legends arcade family (46) legends gamer (33) legends pinball (39) legends ultimate (71) Microsoft (40) Nintendo (70) pc gamer (65) pc gaming (52) pinball (43) playstation (55) PS4 (36) retro (34) Sega (38) slots (82) sony (51) steam (145) switch (33) technology (35) update (42) virtual pinball (36) virtual reality (116) vive (34) viveport (42) vr (121)

Affiliates

+ Amazon

The everything store

+ Humble Bundle

Game deals, including name your price bundles

+ Playasia (Play-Asia.com)

Import games and collectibles

+ DJI Store

Amazing drones and related technology

+ Razer

Amazing PC gamer products!

fullSTEAMahead365 Your total news and information resource for all things Science, Technology, Engineering / Mathematics, Art, and Medicine / Health.

Human Advancement Never Stops.

Key Site Statistics

Posts published: 2,533
Latest publish date: May 6, 2025 @ 3:42 pm
Registered user count: 99,026

Contact Us

If you have a question, would like to provide feedback, or otherwise wish to get in touch with us, use this form.

Send Message

Blog Posts by Date

September 2019
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Aug   Oct »

Social Media and RSS

Support Armchair Arcade

All editorial content © 2003 - 2025 Armchair Arcade, Inc., an Armchair Creative Services, LLC, property. All rights reserved unless otherwise indicated. All trademarks and copyrights are retained by their respective owners. No content is to be removed or reused from the Armchair Arcade Website for commercial purposes without explicit permission from the principal Armchair Arcade staff, or the original trademark or copyright holders. Armchair Arcade, Inc., is not responsible for the content of any external sources or links. Further, endorsement of any external sources or links is neither implied nor suggested.

We thank you for your support and encourage you to contact us for any reason, including, but not limited to, questions, concerns, business endeavors, or praise. Especially praise.

Armchair Creative Services, LLC, may earn compensation for sales from links on posts through affiliate and other programs. Editorial rigor and objectivity standards are strictly adhered to and any compensation has no effect on coverage or opinions.

Prev Next