Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    10 Important Steps to Securing Your Small Business

    By
    Chris Preimesberger
    -
    February 23, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      110 Important Steps to Securing Your Small Business

      1 - 10 Important Steps to Securing Your Small Business

      Small businesses (fewer than 50 employees) face the same security threats as large organizations. However, such businesses also must contend with the challenge of limited budgets. The role of administering the network in a small business often falls on the business owner or on an in-house techie, both of whom wear many other hats in the organization and usually do not have the time, the resources or the expertise to work on complex deployments and administration. Fortunately, small businesses can have big-business-type protection by taking advantage of modern network security technologies and approaches. In this eWEEK slide show, using industry information from new-generation security provider SonicWall, we offer the top 10 network security challenges faced by small and midsized businesses (SMBs) and tips to addressing each of those challenges.

      2Layer Your Security

      2 - Layer Your Security

      The challenge: Network attacks are becoming more widespread, intelligent and difficult to detect, leaving SMBs at an even great risk due to limited resources and budgets to fend off risk. Network entry points are not only public-facing servers but also employee devices that may be compromised by use outside of the corporate security perimeter. The solution: A layered network security approach brings a new level of scrutiny to network traffic passing into an SMB, making network protection more complete, affordable and manageable.

      3Secure Your Gateway

      3 - Secure Your Gateway

      The challenge: A small business owner wears many hats, and close, regular monitoring of your business’s network perimeter is just one of many roles you have within the organization. The solution: Block threats at the network perimeter with a firewall that inspects all files completely because threats can gain entry via commonly used communication protocols that many SMBs rely on today, including email, file sharing and harmless-looking utility programs.

      4Keep It Simple

      4 - Keep It Simple

      The challenge: The total cost you pay for security is in the cost of installing, using, managing and maintaining it. The processes can be complex and prohibitive for SMBs to manage. The solution: Create a workable and cost-effective plan that secures the business against sophisticated threats by installing a centralized or hosted management solution that eases administration and lowers ongoing cost of ownership.

      5Keep It Affordable

      5 - Keep It Affordable

      The challenge: Purchasing stand-alone products can quickly drive up IT expenses with separate costs for each device’s purchase, installation, operation, training, administration and maintenance—not to mention challenges associated with managing myriad point products. The solution: Consolidate all of your security tools into one appliance. This allows the business to deploy broader and better-coordinated security within your budget.

      6Get Rid of Bottlenecks

      6 - Get Rid of Bottlenecks

      The challenge: The amount of traffic being scanned by your firewall, and inspection of every byte of every packet, quickly becomes more than many traditional firewalls can handle and can bottleneck network performance. The solution: Make sure that the solution you implement can keep up with the increasing volume of encrypted traffic as well as inspect large files that are now commonplace.

      7Keep Your Systems Running

      7 - Keep Your Systems Running

      The challenge: Single points of failure can be frequent and cumbersome and expose the business to risk if a primary security device fails. The solution: Deploy a modern UTM solution with high availability to prevent hardware failover functionality and automatically roll security functions to an identical UTM appliance, which then reverts back once the primary appliance is restored.

      8Keep Your Network Productive

      8 - Keep Your Network Productive

      The challenge: Often the office network is being used for nonproductive tasks, such as movie downloads, interacting with friends and watching streaming media. You need to control how the network is being used in addition to having real-time visibility into how network resources are consumed. The solution: Modern application layer inspection tools can identify what applications (like Pandora or sales applications) are being used, then you decide how to allocate that bandwidth. This can protect against threats and helps prevent network slowdown caused by bandwidth-consuming, nonproductive applications, while still allowing users to utilize web and email for business.

      9Stay Compliant

      9 - Stay Compliant

      The challenge: Solutions and resources are needed to maintain regulatory compliance with external regulations (PCI, HIPAA, etc.) or internal regulations (policies for protecting intellectual property) to avoid penalties and business risk. The solution: Integrated compliance management solutions that integrate with centralized policy management and backup and reporting options will help you track, audit, report on and verify your compliance.

      10Secure Your Endpoints

      10 - Secure Your Endpoints

      The challenge: For SMBs, your office could be anywhere. Add in contractors, partners and customers looking to access your business from their devices, and this puts the business at risk if there is no understanding as to whether the device is secure. The solution: Secure your business’s endpoints with techniques that can assess the endpoint devices and verify whether or not they are running an antivirus solution with the latest signature database.

      11Be Prepared for the Unexpected

      11 - Be Prepared for the Unexpected

      The challenge: It’s not only headline-grabbing natural disasters, but also more benign events, such as a power outage, equipment failure or even a stolen laptop, that can disrupt and expose your business to risk. The solution: Modern UTM appliances that feature built-in IPSec or SSL VPN capabilities are ideal for secure remote access during an emergency and provide users with safe connectivity to corporate network resources using a web portal. Modern continuous data protection (CDP) solutions can also automatically back up data to discs, avoiding the complexity and human error involved with tape backup.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×