025 – Business owners’ guide to cyber security

Do you have a good grasp on Cyber Security and how it affects your business? Do you leave that to someone else to worry about, such as a manager or your IT guy? This episode explains why you need to have a good understanding of cyber security and how it can affect your business.

On The Small Business Technology Show, we recently spoke with Dr Sally Ernst about her book called  Gotcha! Your Little Black Book to a Safer E-xperience which is aimed at business owners who are short on time but want to get the information needed to be cyber safe.

 

Dr Sally’s thoughts on cyber security:

The need now is to get people engaged in cyber security, this includes business owners. A lot of businesses rely on blissful ignorance that their internal IT guy (or girl) is going to make sure everything is safe and secure. The reality is that it is not just one persons’ responsibility to be working towards being less cyber insecure. There is a need for a mindset shift towards everyone being personally accountable.

It is important to have understanding what your cyber security is and where it is. A lot of businesses are not even consuming the basic security that already exists. There is no excuse at a corporate level not to be consuming the best practices and frameworks.
Cyber security implementation

Dr Sally’s five tips to get you cyber safe and secure.

  1. Start small and start somewhere
  2. Understand where your information functionality is
  3. Know where all your information is stored
  4. Prioritise how to start protecting it
  5. Beware of Shadow IT – listen here

 

Examples of security breach and practices to avoid them

It’s important to understand what type of security breaches could occur and to think ahead to avoid any occurring. Here are some examples Dr Sally has shared with us.

  • It’s not just as simple as your email is with Microsoft Outlook and banking is with your banking provider. They’re not isolated, in fact they are all interconnected.
  • Think on a larger scale – who has access to your network?
  • Email providers use an authenticator as a backup for your password, like sending a text to your mobile. If you’re mobile is breached, then you only have one level of security.

 

**Free book giveaway for iTunes review ! First person to paste a screenshot of your iTunes review to our Facebook page receives a free copy of the book.**

Feedback on the Podcast:

Feel free to leave any questions, comments, or suggestions for future episodes in the comment section below. If you enjoyed this podcast, we’d be extremely grateful if you would take a second and leave us a review and a rating over on iTunes and Stitcher

Leave a Reply

Your email address will not be published. Required fields are marked *