Our world revolves around digital, now more than ever. The enormous amount of known and unknown cyber threats is enough to keep you up at night. Your networks, data centers, and endpoints are all at risk. We see the need to offer more than just physical security systems, because of this we have partnered with one of the leading cyber security outfits in the world, Check Point Software Technologies.

Let’s Start at The Beginning

What is cyber security? According to us-cert.cisa.gov, cyber security is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. Simply put, cyber security is what you need to keep your network and information safe.

Now is the time to get serious about cyber security, as we have seen a 600% increase in cyber-attacks since the COVID-19 outbreak happened. In an op-ed on the CNBC (7/9) website, Sen. Jim Risch (R-ID) wrote, “The pandemic has seriously impacted the health of businesses everywhere, and for most employers, getting back to business cannot come soon enough. But while businesses across the country prepare to welcome back their customers, hackers and cybercriminals are actively infiltrating and exploiting small business databases. Cyberattacks have skyrocketed worldwide as criminals capitalize on the confusion and anxiety surrounding the coronavirus pandemic. In a recent press release, the FBI characterized the number of online schemes to swindle both businesses and individuals out of money and personal data as ‘truly breathtaking.’” He adds, “A strong cyber security strategy is no longer a luxury – it is a necessity. And small businesses should adapt to the new cyber landscape as we prepare for the post-COVID era.”

Current Noteworthy Cyberattacks

Here are just a few cyberattack stories from CSIS.org that happened this year, to people who thought they were protected:

  • June 2020. The most popular of the tax reporting software platforms China requires foreign companies to download to operate in the country was discovered to contain a backdoor that could allow malicious actors to conduct network reconnaissance or attempt to take remote control of company systems
  • May 2020. Cybercriminals managed to steal $10 million from Norway’s state investment fund in a business email compromise scam that tricked an employee into transferring money into an account controlled by the hackers.
  • April 2020. Officials reported seeing a surge of attacks by Chinese hackers against healthcare providers, pharmaceutical manufacturers, and the U.S. Department of Health and Human services amidst the COVID-19 pandemic.

Check Point Software Technologies goes above and beyond all its competitors to keep your information safe by offering a true “Zero Day Prevention” solution that covers the traditional areas like your network, servers, and endpoints, but also covers all the newer, often weak points, like Mobile, IoT, and Cloud. Additionally, Check Point maintains a database of cyber threats that have been detected across all their protected devices. Once a new threat is detected, the database is updated, and every endpoint is now covered from the new threat. Making ThreatCloud the world’s largest threat intelligence database.

10 Security Best Practices for Small Businesses

We truly want you to be secure, and we can help guarantee that you are protected, but even if you don’t choose Fearing’s and Check Point, we want to share our best practices list with you:

  1. Common Passwords are BAD passwords!
    Passwords are your first line of defense so make sure you are creating long, complex passwords utilizing lower case, upper case, numbers, and non-alpha characters.
  2. Secure Every Entrance
    Just as you secure your home by locking the front door, the back door, and all the windows, you want to think of all the ways someone could enter your network, then secure them so only authorized users can gain access.
  3. Segment Your Network
    Segment your network and place more rigid security requirements where needed, such as not allowing public-facing web servers access to your internal network.
  4. Define, Educate, and Enforce Policy
    The first step is having a security policy. Next, educate your employees on the acceptable use of the company network. Make it official, then enforce it where you can.
  5. Be Socially Aware
    Attacks such as phishing, spearphishing, or social engineering all start with collecting personal data on individuals. Your public social profile is a gold mine of useful information for cybercriminals.
  6. Encrypt Everything
    Protect your data by encrypting sensitive data, make it easy for your employees to do so as well.
  7. Maintain Your Network
    Your network, and all its connected components, should run like a well-oiled machine. Regular maintenance will ensure it continues to roll along at peak performance.
  8. Be Cloud Cautious
    Cybercriminals are taking advantage of the weaker security of some Cloud providers. Ensure you’re encrypting content before sending and don’t use the same password everywhere, especially Cloud passwords.
  9. Don’t Let Everyone Administrate
    Administrative access allows users much more freedom and power on their laptops, but that power is given to the cybercriminal if the administrator account is hacked.
  10. Have a Bring-Your-Own-Device (BYOD) Policy
    A BYOD policy should address access levels, require passwords, and address what happens if an employee loses their device.

Last year, the average cost of a single data breach averaged $200,000, and studies show that 60% of small businesses that experience such a breach go out of business within six months. Fearing’s AVS and Check Point can be your guide to achieve a cyber security solution that protects you and your sensitive information. Contact us at info@www.fearings.com and let us know you’re interested in talking about cyber security.