{"id":2907,"date":"2019-06-24T14:53:18","date_gmt":"2019-06-24T14:53:18","guid":{"rendered":"https:\/\/www.imsm.com\/rwa\/gb\/?p=2907"},"modified":"2023-10-31T10:52:06","modified_gmt":"2023-10-31T10:52:06","slug":"6-best-practices-for-data-security-for-small-businesses","status":"publish","type":"post","link":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/","title":{"rendered":"6 best practices for data security for small businesses"},"content":{"rendered":"

With Verizon\u2019s head of global security service claiming data breaches are a \u201ctime bomb\u201d under companies that let customer information go astray<\/a>, it\u2019s more important than ever to have a secure cyber security system for your organisation. Not only will it protect you from vulnerability against cyber attacks, but it\u2019ll also save time, money and your precious reputation.<\/p>\n

Maximising cyber security should be a priority for any business, large or small. But with small businesses, sometimes it\u2019s hard to know where to start. Luckily for you, IMSM have drawn up the six ways small businesses can demonstrate best data security practice, so you can begin getting all your employees on board and compliant.<\/p>\n

1. Install anti-malware software and build a firewall<\/h2>\n

One of the first lines of defence against malicious attacks is making sure your hardware is properly protected. Implement the most up-to-date computer security programs while checking your tech isn\u2019t faulty, and supplement this with regular cleans and updates of your systems.<\/p>\n

2. Store passwords securely<\/h2>\n

Although password hacking is one of the easiest ways for your data to become subject to breach, 65% of SMBs with password policies do not enforce it<\/a>. You already know the drill with passwords: no names, no dates of birth, a mixture of upper and lower case characters, don\u2019t share with anyone, etc.<\/p>\n

And don\u2019t worry about having to remember an entire bank of complicated passwords, either: programmes like LastPass or 1Password are multi-encrypted banks that have multi-factor identification for access, so you\u2019ll never find yourself struggling to recall qre!bw3!Rn20 again.<\/p>\n

3. Strategise for mobile security<\/h2>\n

What devices are your employees accessing your systems and networks? You may well have considered their desktop computers, but what about company laptops, iPads or personal mobile phones? All wireless devices – from smart watches to tablets – can be a potential security risk. Don\u2019t rule with an iron fist and ban your workers from using your WiFi network, but perhaps have a separate one installed for employee and client use.<\/p>\n

4. Backup and encrypt data<\/h2>\n

The golden rule of storing date is to regularly back it all up, but especially your most essential data. The most valuable of this should be encrypted, too. Store this data on the Cloud so it\u2019s separated from your hardware, but don\u2019t forget to make a habit of analysing the security of your Cloud storage as well as your hardware!<\/p>\n

5. Be wary of phishing<\/h2>\n

Phishing is when fraudsters try to obtain information by disguising as a trustworthy entity. For example, sending an email to an employee pretending it\u2019s from the SEO of your company. Examine your digital footprint and what you\u2019re making visible to the internet, as this could make you vulnerable to phishing. In a nutshell, you and your employees need to be diligent and use your common sense when receiving dubious-looking emails. Reporting and blocking suspicious activity and potential attacks can help your spam filter recognise future emails.<\/p>\n

Become ISO 27001 certified<\/h2>\n

Gaining your ISO 27001<\/a> certification is instrumental in developing a best practice policy that incorporates all the above and so much more<\/a>. Offering you education to your employees and thorough documentation surrounding sound data security, you\u2019ll implement systems and processes into the core of your operations which will protect you from threatening cyber hacks and data leaks.<\/p>\n

Want to find out more about how ISO 27001<\/a> can help your business? Find out everything you need to know here,<\/a>\u00a0or download our free guide to have a read later.<\/p>\n

<\/p>\n

\"\"<\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"

With Verizon\u2019s head of global security service claiming data breaches are a \u201ctime bomb\u201d under companies that let customer information […]<\/p>\n","protected":false},"author":3,"featured_media":4882,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[17],"tags":[26,6,15,36],"class_list":["post-2907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-news","tag-data-security","tag-iso","tag-iso-27001","tag-iso27001"],"acf":[],"yoast_head":"\n6 best practices for data security for small businesses | IMSM RWA<\/title>\n<meta name=\"description\" content=\"Businesses of any size are vulnerable to cyber attacks. We discuss best practices for small businesses who aren't sure where to start with cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 best practices for data security for small businesses | IMSM RWA\" \/>\n<meta property=\"og:description\" content=\"Businesses of any size are vulnerable to cyber attacks. We discuss best practices for small businesses who aren't sure where to start with cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"IMSM RWA\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/imsmltd\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-24T14:53:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-31T10:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IMSM_Ltd\" \/>\n<meta name=\"twitter:site\" content=\"@IMSM_Ltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/\",\"url\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/\",\"name\":\"6 best practices for data security for small businesses | IMSM RWA\",\"isPartOf\":{\"@id\":\"https:\/\/www.imsm.com\/rwa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg\",\"datePublished\":\"2019-06-24T14:53:18+00:00\",\"dateModified\":\"2023-10-31T10:52:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.imsm.com\/rwa\/#\/schema\/person\/66626d9a760b9faba83fb516f9e1dc47\"},\"description\":\"Businesses of any size are vulnerable to cyber attacks. We discuss best practices for small businesses who aren't sure where to start with cyber security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#primaryimage\",\"url\":\"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg\",\"contentUrl\":\"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"Keys in door\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.imsm.com\/rwa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 best practices for data security for small businesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.imsm.com\/rwa\/#website\",\"url\":\"https:\/\/www.imsm.com\/rwa\/\",\"name\":\"IMSM RWA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.imsm.com\/rwa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.imsm.com\/rwa\/#\/schema\/person\/66626d9a760b9faba83fb516f9e1dc47\",\"name\":\"marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.imsm.com\/rwa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/73075242bfb9b3a13cd182d367fb879a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/73075242bfb9b3a13cd182d367fb879a?s=96&d=mm&r=g\",\"caption\":\"marketing\"},\"url\":\"https:\/\/www.imsm.com\/rwa\/news\/author\/marketing\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 best practices for data security for small businesses | IMSM RWA","description":"Businesses of any size are vulnerable to cyber attacks. We discuss best practices for small businesses who aren't sure where to start with cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/","og_locale":"en_GB","og_type":"article","og_title":"6 best practices for data security for small businesses | IMSM RWA","og_description":"Businesses of any size are vulnerable to cyber attacks. We discuss best practices for small businesses who aren't sure where to start with cyber security.","og_url":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/","og_site_name":"IMSM RWA","article_publisher":"https:\/\/www.facebook.com\/imsmltd","article_published_time":"2019-06-24T14:53:18+00:00","article_modified_time":"2023-10-31T10:52:06+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg","type":"image\/jpeg"}],"author":"marketing","twitter_card":"summary_large_image","twitter_creator":"@IMSM_Ltd","twitter_site":"@IMSM_Ltd","twitter_misc":{"Written by":"marketing","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/","url":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/","name":"6 best practices for data security for small businesses | IMSM RWA","isPartOf":{"@id":"https:\/\/www.imsm.com\/rwa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg","datePublished":"2019-06-24T14:53:18+00:00","dateModified":"2023-10-31T10:52:06+00:00","author":{"@id":"https:\/\/www.imsm.com\/rwa\/#\/schema\/person\/66626d9a760b9faba83fb516f9e1dc47"},"description":"Businesses of any size are vulnerable to cyber attacks. We discuss best practices for small businesses who aren't sure where to start with cyber security.","breadcrumb":{"@id":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#primaryimage","url":"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg","contentUrl":"https:\/\/www.imsm.com\/rwa\/wp-content\/uploads\/sites\/21\/2019\/06\/pexels-photomix-company-101808Thumb-scaled.jpg","width":2560,"height":2560,"caption":"Keys in door"},{"@type":"BreadcrumbList","@id":"https:\/\/www.imsm.com\/rwa\/news\/6-best-practices-for-data-security-for-small-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.imsm.com\/rwa\/"},{"@type":"ListItem","position":2,"name":"6 best practices for data security for small businesses"}]},{"@type":"WebSite","@id":"https:\/\/www.imsm.com\/rwa\/#website","url":"https:\/\/www.imsm.com\/rwa\/","name":"IMSM RWA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.imsm.com\/rwa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.imsm.com\/rwa\/#\/schema\/person\/66626d9a760b9faba83fb516f9e1dc47","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.imsm.com\/rwa\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/73075242bfb9b3a13cd182d367fb879a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/73075242bfb9b3a13cd182d367fb879a?s=96&d=mm&r=g","caption":"marketing"},"url":"https:\/\/www.imsm.com\/rwa\/news\/author\/marketing\/"}]}},"_links":{"self":[{"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/posts\/2907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/comments?post=2907"}],"version-history":[{"count":5,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/posts\/2907\/revisions"}],"predecessor-version":[{"id":7546,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/posts\/2907\/revisions\/7546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/media\/4882"}],"wp:attachment":[{"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/media?parent=2907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/categories?post=2907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.imsm.com\/rwa\/wp-json\/wp\/v2\/tags?post=2907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}