In a wide-ranging fact sheet, President Biden encouraged firms to implement:
This may seem like a daunting list for SMBs to implement. While it may not be possible to put everything in place immediately, business data should be considered an asset that needs to be protected.
Another important aspect of building a fit-for-purpose cyber security strategy is to bake it in, not bolt solutions in as an afterthought. With enterprise-grade tools becoming more readily available at SMB price points, there is every opportunity to do this in a cost effective way.
Ransomware attacks are often linked with the concept of data loss, but the reality is that they can go much further, making it impossible for a business to even operate. The short-term revenue impact, not to mention the longer-term reputational damage can make a cyber attack difficult to overcome for many SMBs.
Solid cyber security is vital for modern businesses, and although the White House communication should be a warning, good security practice shouldn’t happen just because someone tells you to.
With a well-designed, enterprise-grade cyber security strategy, SMBs can continue working safe in the knowledge that an attack is likely to be thwarted should it come. In the event that breach did occur, with robust disaster recovery plan, business can continue almost uninterrupted.
Backups are an essential part of this, and with social engineering on the rise, keeping online and offline copies of critical data is a fundamental component of every cyber security plan.
For IDC, it is understandably unlikely that SMBs will be able to implement every measure on this list right away due to budgetary and resourcing issues.
Start by identifying your main vulnerabilities, assessing weak spots, and getting a robust backup strategy in place.
Well not quite. But it's finally here - a SIEM that gets cloud detection and response.
What does it cost to run an in-house Security Operations Centre (SOC)?
How Kings College Hospital restructured its electronic healthcare records with AI.
Cut across the noise to create a coherent cyber security strategy
The definitive guide on avoiding risk and abuses
Share this story
Unlock exclusive updates and special offers! Fill out our contact form to stay connected and be the first to know.