Information Technology

26th December 2019 | Cybrary Information Technology

Information Technology (IT) is any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.

What Does This Mean For My SMB?

SMBs are most certainly are at risk to everyday hackers. Hackers breach Small to Medium Sized businesses 15x more often than larger firms. Hackers know this and target you because of it. SMB’s generally lack resources to properly secure systems, fail to train employees on cybersecurity hygiene, and sometimes lack proper security tools.

For these reasons, CyberHoot recommends all SMB’s take these actions:

Train employees on how to spot and delete phishing emails. Here’s a free video to help with this: How to Protect Yourself from Phishing Attacks.

  • Train employees on how to use strong passphrases instead of passwords.
  • Test employees with Phishing tests. CyberHoot includes this in our services.
  • Implement basic cybersecurity technical best practices including:
  • Update/patch all devices and software whenever possible to ensure vulnerabilities are fixed.
  • Establish risk management at your SMB by having a risk assessment performed at least once on your business.

Taking these proactive measures can reduce your risk of a costly breach, downtime, brand damage, and a cyber insurance claim (or all four).

Related Terms: Information and Communication(s) Technology

Source: CNSSI 4009, NIST SP 800-53 rev. 4, based on 40 U.S.C. sec. 1401

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Your Clients’ Routers Are Now a National Security Conversation

Why Your Clients’ Routers Are Now a National Security Conversation

You now have five important reasons to start a router security conversation with your small business clients this...

Read more
Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more