Five cyber security best practices every business should know

As more and more of our lives migrate online, the reality is that cybersecurity now a vital consideration for every type of business, regardless of size or sector. This is especially pertinent for the inherently vulnerable small business community without the technological defences or security intel needed to ward of attacks. But, the good news, according to Chris Pottrell founder and MD of Nebula IT consultancy, is that there are some relatively simple and cost-effective measures small business owners can to take to better themselves: 

It’s no secret that the past two years have seen our society become even more, if not entirely dependent, on the continued availability of connected technologies amid the rapid shift of work to remote and hybrid offices. But as well as significant benefits, the increasing rate of digitalisation has enabled cybercrimes to be committed in newer, more creative ways as hackers take advantage of the vulnerabilities and gaps in security by businesses. 

The result is that cybercrime continues to grow at pace. Last year a national study estimated that 39 per cent of all UK businesses had encountered a cyber-attack over the past 12 months coming in at an average cost of £4,200.1 Worse still, Google’s 2023 cybersecurity predictions expect this illicit economy will only continue to expand and diversify.

And this issue is even bigger for small businesses. This is because they often have fewer resources and lack security expertise, leaving them even more exposed to the latest online scams and attacks. In fact, of all cyberattacks it’s estimated 43% target small businesses and SME startups – with 60% going out of business within six months.2

As such, it’s more important than ever for small businesses not to overlook investing in cybersecurity, both technology and user education. Fortunately, there are some basic cyber defences that can help to protect any small enterprise:

1: Make cybersecurity awareness a priority. Phishing and viruses are two common methods of attack and, perhaps surprisingly, these types of breaches are typically caused by human error. Whether through haste or lack of awareness, it’s your own employees who pose the biggest threat to your IT infrastructure. 

That’s why it’s so important to take a proactive, ongoing approach to educating your entire workforce about cyber security threats and countermeasures. This should include regular cybersecurity training sessions. Your employees should understand how published information about your systems and operation can reveal potential vulnerabilities. 

This should be supported with easy-to-follow procedures for employees designed to help mitigate the risk. Ensure they are alert to suspicious emails, even those purporting to be from trustworthy sources, delete them without clicking and notify IT; allow only a few to have access to confidential information; choose strong passwords and keep them stored safely and separately; install secure configuration to minimise the information that digital devices disclose and back up data regularly, so it can be retrieved should a crisis occur.

2: Ensure all the cybersecurity basics are in place. Beyond developing an employee-centric security approach, there are a range of network security measures every business should take. This should start with secure network design; applying network perimeter defences to block out any insecure or unnecessary websites and services, along with malware protection to block malicious emails and prevent malware being downloaded from websites. It also means enforcing VPN for remote access, encryption-in-transit and for data-at-rest, and authenticating all users access. You could also institute least-privilege security so that each employee is only granted the minimum system resources and authorisations they need to perform the job in hand. This means if a user account becomes compromised (such as through phishing) or a computer system is hacked (such as by exploiting a zero-day vulnerability), you can help contain the damage.

3. Ensure breaches can be managed effectively. Now that you have the basics in place, you should be well placed to successfully exploit and mitigate known vulnerabilities with just a few controls. This means applying patches and fixes to operating systems, applications and drivers to prevent attacks which exploit software bugs. It should also entail introducing additional malware protection on the internal network at key points of vulnerability. This sounds simplistic, but failure to conduct these types of updates in a timely fashion is a leading cause of breaches.

4. Monitor and analyse the network. Business owners cannot afford to underestimate the importance of continuing to monitor their network in order to detect and address anomalies. This should involve keeping a log of everything – every transaction, every privileged login to your network, every failed password attempt. Collecting this information and making it available for analysis will not only help detect and address a breach before it escalates into something bigger, but to pre-empt similar points of entry or system constraints – and take the appropriate remedial action.

5. Keep a finger on the pulse at all times. One of the most important concepts to grasp with cybersecurity is that maintenance is a constant job. New attacks develop monthly, if not daily, and your approach to guarding against them must be constant. That’s why, even though the aforementioned measures will safeguard you from the majority of standard attacks, it’s crucial not to get complacent and keep a finger on the pulse. This means maintaining a good understanding of what constitutes ‘normal’ activity on your network (see point 4) and ensure a rapid response to even the slightest anomalies. As part of this, conduct pen tests regularly and thoroughly; not only do systems become less secure if not maintained properly but attackers become more sophisticated. 

Whilst these actions do not guarantee you will not be hit, they will greatly minimise the growing cyber risk for your small business – helping your small business continue to grow without becoming another cybercrime statistic. 

Cyber security is a complex issue and if you’re unsure on managing the risks then get in touch at enquiries@nebulaIT.com. For further information please visit https://nebulait.co.uk

Chris Pottrell

founder and MD of Nebula IT consultancy

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...