Click me
Transcribed

10-Step Security Checklist

10-STEP SECURITY CHECKLIST Your step-by-step guide to a safer business Think cybercriminals only target big companies? More than 75 percent of data breaches target small and medium sized businesses (SMBS), and that can result in serious costs-both financial and to your reputation.' But there are some simple steps you can take to better protect your customers, employees, and assets so you can focus on what you do best: building your business. $214 60% >40% was the average cost of a data breach per compromised within half a year of being customer record.? of data breach victims were small-to-medium businesses with 1,000 or fewer employees. of small businesses will close victimized by cybercrime. TRAIN YOUR EMPLOYEES 76% Your cybersecurity is only as strong as your weakest link. Train your employees to use strong passwords and avoid dangerous links and email attachments. of analyzed network intrusions exploited weak passwords." KNOW YOUR DATA Do you know where all your confidential information is? Locate and limit access to private data. 3. INVENTORY YOUR DEVICES ONLY 17% Identify and secure all devices your employees use, including thumb drives, smartphones, tablets, and laptops. of SMBS take any steps to secure company data on personal devices. 77% PROTECT YOUR NETWORK of SMBS think having a strong cybersecurity and online security posture is good for their company's brand. Today's users connect anywhere at any time. Protect network access with virtual private networks (VPNS) and firewalls. 5. 44% SECURE PHYSICAL DEVICES Keep your servers and unused devices safe behind locked doors with limited access. of SMBS agree that their customers are concerned about the IT security of their business. 6. KEEP YOUR FACILITIES SAFE Don't let strangers wander the halls. Limit physical access with locked doors and managed entry systems. PROTECT YOUR WEBSITE AND ENSURE SAFE BROWSING 73% Reassure your customers with trustmarks on your website and protect employees with strong anti-malware software. of SMBS say a safe and trusted Internet is critical to the success of their business. 68% 8. of organizations still use email as their main method to send and exchange large files and sensitive data. 52% CREATE CLEAR CYBERSECURITY POLICIES of organizations experienced an increase in malware attacks as a result Set clear written policies on use and disposal of confidential documents and devices. of employees' use of social media. 69. PROPERLY DISPOSE OF END-OF- LIFE DEVICES AND DOCUMENTS Foil dumpster divers by physically shredding old paper documents and digitally shredding data on discarded devices. 10. SCREEN EMPLOYEES THOROUGHLY Conduct thorough background and reference checks before hiring new employees. GROWING YOUR BUSINESS IS YOUR PRIORITY. PROTECTING IT IS OURS. Visit us on the web, at: www.mcafee.com/smallbusiness MCAfee. "Five Steps to Building a Stronger SMB." April 2013. https/lendoointprotection.mcafee.com/security managementTve-steps-to-building-astronger-smb/ http://wwww.staysafeonline.orgdownloadidaase4393/20 12 ncsa_symantec_smal business_study fact sheet pdf. Intralinks Holdngs, Inc. "Survey: Secure and Compliant MMcAfee MCAfee. "The New Reaity of Stealth Crimeware." 2011. http://www.mcafee comustesourceswhice-paperswp-reali ty-of-stealth-crimeware pdf Collaboration Ends at the Firewall for 68 Percent of Organizations Globally" March 2012. http://www.intralinks.com/newseventspress-releases/2012 0319intralinks-survey-secure-compiant-collaboration. An Intel Company Wall Street Journal. "Most Smal Businesses Don't Recover From Cybercrime." March 2013. http:/online wy com/articles81000142412788732455780 *Ponemon institute. "Global Survey on Social Media Rsks." September 2011. Sponsored by Websense http://wwww.websense com/assetsheportswebsense-social- media-ponemon-report pdf. 4578376291878413744 Mm *Vericon. "2013 Data Breach Investigations Report." 2013. http:/www.verizonenterprise.comDBR/2013. MOAfee and the McAlee logo are registered trademarks or trademarks of MCAfee, nc or its subsidies in the United States and other countries. Other marks and brands may be daimed as the property of others. *Dmensional Researdch. "The Impact of Moble Devices On Information Secuity A Survey of it Professionalk une 2013. Sponocred by Check Point http://www.checkpoint.com/downloadsproducts/check-poi nt-moble-security-survey-ceport2013 pdf. Copyright O 2013 MCAfee, Inc *National Cyber Security Alance with Symantec. "2012 National Smal Business Study 2012.

10-Step Security Checklist

shared by McAfeeSMB on Jun 25
474 views
0 shares
0 comments
This graphic is an SMBs step-by-step guide to running a safer business. McAfee understands that growing your business is your priority, but protecting it is ours.

Publisher

McAfee

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size