July 2021 Southwest Florida Business Today

Page 14

Page 14

Southwest Florida BUSINESS TODAY ®

JULY 2021

TECHNOLOGY

Cybersecurity prepares businesses for when (not if) Cybercriminals are opportunistic. They are similar to neighborhood burglars who go driveway to driveway pulling on door handles, hoping to find an unlocked vehicle. They may only gain entry to one in 100 cars, but that still means they were successful. Vehicle owners can prevent many burglaries simply by removing all valuables from sight and locking their car doors. It doesn’t guarantee you won’t be burglarized, but criminals want the quickest path to their target. It’s the same for cybercriminals. The easiest way to “lock the door” on technology is employing multi-factor authentication. The security measure requires users to present at least two pieces of evidence before gaining access to a server, database or software program. A cybercriminal who has obtained a user’s login and password, for example, would still need to have access to that person’s unlocked cell phone or email. Since the pandemic began, more businesses are allowing employees to work remotely, either parttime or full-time, and they’ve essentially left the door unlocked for cybercriminals. Multi-factor authentication is critically important for businesses that allow individuals to remotely tap into the network. Why don’t all companies require the extra step? Because it’s an extra step. After entering the username and password, employees must wait for a text or email containing a time-sensitive verification code. Once they enter that number or letters, they’re in the system. Another reason businesses don’t implement additional cybersecurity measures is because they think their company is too small to draw the interest of a cybercriminal. Hackers cast their net to thousands, even millions, hoping for a bite, and don’t have access to other information unless you provide it to them. Beyond multi-factor authentication, Southwest

Florida businesses should consider the following:

Business Continuity Plan Cybercriminals are continuously trying hack into data. At some point, a cybercriminal may gain access. How will your business withstand the breach? A proactive business continuity plan addresses the “when,” not the “if,” of a cyBY JOHN berattack. Businesses cannot JOYCE afford any downtime caused by Guest Columnist a hack. Not only does that mean lost staff productivity and revenue, but it also damages customer confidence and a company’s reputation. Business continuity plans should include a variety of scenarios and outline the company’s response. Staff Training Employees can spend hours daily using the internet and email at work. Businesses often require new hires to sign technology usage agreements, but fail to offer cybersecurity training. Teach employees to be suspicious. Two areas of focus include: • Internet: When Googling a topic, don’t click on unfamiliar websites that have atypical URL formats or poorly written descriptions. Although search engines continually root out malicious websites, scammers can create and advertise pages just like reputable companies. • Emails: Don’t open emails from unknown sources. Set up an email view to include content previews, and delete messages that don’t belong. Also, cybercriminals often send emails that appear with the name of a colleague or associate, but the actual email address does not match the

For the latest news on COVID-19 and its effects on SWFL businesses, visit www.swfloridabusinesstoday.com/ covid-19-tips-for-business/ actual domain. Report all spam to your company’s IT professional or consultant. Password Requirements It’s shocking, but “password” and “123456” remain among the most common passwords. That’s equivalent to leaving your car unlocked with a sticky note saying “steal me.” Passwords should have a minimum length of at least seven characters and require a capital letter, lowercase letter, number and special character. The more complex, the better. Some platforms even allow complete sentences, which make it much more difficult for hackers and bots to gain access. Entrust Security to an IT Professional Cybercriminals don’t know, and likely don’t care, if your business pulls in $10 million in annual revenue or $10,000 in revenue. You’re just a nameless, faceless victim to them. In lieu of hiring an in-house IT expert, many small businesses use an IT consultant as an extension of their team. Good technology empowers businesses to leverage solutions for their respective industries while identifying threats before they cause any disruptions. Cybercriminals are prowling. The key is locking the door and hiding valuables, so they move to an easier target. John Joyce is an owner of CRS Technology Consultants, a Cape Coral-based IT company founded in 1988. For more information, visit CRSTC.com or call (239) 542-8450.

IN BUSINESS SINCE 2010

2009

1999

Build your business as an asset not a job!

Let us Bring You Full

CIRCLE

Commercial Property Liability • Work Comp Auto • Contractors HOA / COA

Sergio DeCesare can help

• Certified Business Profit & Growth Expert • Certified Business Value Builder ™ • Certified Business Exit Strategist

Marketing I Public Relations I Social Media Management Graphics I Event Management

(239) 580-7408

IN BUSINESS SINCE 2010

Helping you protect your Business or Association. Call us today to discuss your coverages and options. Celebrating 29 years in business / Family Owned

sergio@maxbusinessprofits.com

www.MaxBusinessProfits.com

Licensed and Insured

www.LciQuotes.com • 239-656-5551

390 Pondella Rd #1, N Ft Myers, FL 33903

2015

2018

2004

SUMMER BREAK! 10% OFF

Results Based Business Consulting

Upgrade to be�er technology solu�ons working with a family team that has over 30 years experience. Serving SWFL since 2004.

For Teachers, Faculty & Administration*

Greg Steiner glsteiner57@gmail.com (203) 505-2605

Breakfast - Lunch Espresso Bar - Pastry Monday-Saturday 8:00-2:00 / Sunday 9:00-1:00

IT Infrastructure Installa�on and Support VOIP Phones

(239) 542-6080 perkandbrew@gmail.com perknbrew

Sea Breeze Associates, LLC

1021 Cape Coral Pkwy. E., #A Cape Coral, FL 33904 * Some restrictions apply

1990

®

Fort Myers - North

2007

Michelle Borders O: (239) 293-4697 C: (239) 293-0670

Office 365 Migra�on and Maintenance

naplesnetworkservices.com

2016 MERGER

for every purpose • Collegiate • Military • State

• Pennants • Custom 239.791.8810

Signarama-FortMyersNorth.com

Tax Preparation • Estate Planning For Individuals & Businesses 239.939.5303 • 239.481.4114 www.SolomonHoover.com 1342 Colonial Blvd., Ste. B-11 • Fort Myers, FL 33907


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.