Are You at Risk? Use Our Cybersecurity Checklist

By Scott Dawson
May 27, 2022

Today’s cyber threats can impact any company, regardless of size or industry. But did you know that 43% of cyber-attacks are aimed at small businesses, according to Accenture’s Cost of Cybercrime Study? On top of that, only 14% of those businesses are prepared to defend themselves.

Small businesses often lack the cybersecurity resources and expertise of larger companies. This makes them easy targets for hackers. As cybercriminals discover new ways to extort and defraud small businesses, the threats continue to evolve and expand.

We’re no longer dealing with lone hackers in basements. According to the FBI’s Internet Crime Report, cybercrime has become a multi-billion dollar industry—and that industry keeps growing.

The risk doesn’t only come from actual cyberattacks. Companies also face the risk of compliance failure, lost customer trust, and missed contract opportunities.

How Much Importance Should You Place on Cybersecurity?

Many business owners are not sure how much importance to place on cyber protections. You can use this checklist to better understand how cyber risks might affect your business. Consider the following questions:

      • Do you handle any critical or sensitive information, such as trade secrets, customer data, research, company financial information, or personally identifiable information?
      • Do your customers ever ask about your company’s cybersecurity practices or include it in vendor surveys?
      • Are you required to meet any laws, regulations, or standards related to cybersecurity (e.g. PCI, DFARS/CMMC, HIPPA, GDPR, or others)?
      • Have you been turned down by an insurance company for a cyber policy?
      • Do you have employees working at home using their home networks and/or personal devices?
      • Have you faced a cyberattack in the past year, such as ransomware, computer virus, denial-of-service (DOS) attack, identity theft, or breach?

If the answer to any of the above is “yes,” you have a compelling need for cybersecurity. Failure to comply with cybersecurity regulations can result in lost contracts and costly fines. The rise of telework also increases the need for cybersecurity: the more devices and networks your company uses, the higher the risk.

Now consider the following questions:

      • Do you have an ongoing employee training program for cybersecurity practices?
      • Do you have a recovery plan to respond to cybersecurity incidents?
      • Do you regularly monitor executive-level reports or metrics regarding your company’s cybersecurity and cyber-related incidents?
      • Do you maintain a list of the top cybersecurity risks faced by your company, and do you have plans to address them?
      • Do you regularly conduct internal or 3rd-party audits, scans, or assessments of your cybersecurity?
      • Do you regularly test your employees’ ability to spot dangerous emails, such as phishing scams?

If the answer to any of the above is “no,” you likely have gaps in your cybersecurity practices. Most cyber breaches result from basic human error. This makes employee training a top priority. Without ongoing monitoring, updates, and backups, you leave your technologies open to attack.

Review your responses to the checklist questions above. If you find that you have a compelling need for cybersecurity, but you also have gaps in your cybersecurity practices, then your company is at a high risk for cyberattacks.

What Cyberattacks Target Small Businesses?

Cyberattacks can disrupt your normal operations, damage your customer relationships, and worse. According to the Ponemon Institute’s State of Cybersecurity Report, the most common types of attacks on small businesses include:

      • Phishing/Social Engineering: 57%
        These attacks exploit human error to trick employees into giving up sensitive information or clicking bad links. Email security services can scan messages for harmful content, but when it comes to phishing scams, technology only goes so far. Ultimately, you need training to equip your team.
      • Compromised/Stolen Devices: 33%
        Many attacks result from breached devices, whether digitally hacked or physically stolen. This drives home the need for strong passwords and proper encryption.
      • Credential Theft: 30%
        Stolen credentials give hackers an easy way into your systems. It’s especially important to delete unused credentials from your system to cut down on possible infiltration points.

How Core Can Help

Core Business Solutions stands ready to help. We offer audits and scans to measure your business against national and industry cybersecurity standards. We’ll help you ascertain your security posture and find gaps. With that information, we can help you build a simple and effective remediation plan. We can even offer training, expert support, and security technologies to fill the gaps in your security.

Contact us today to learn how we can help your business achieve cybersecurity industry standards.


Related Articles:

CMMC 2.0 Certification Costs

CMMC 2.0 Certification Costs

Do I Need CMMC? Cybersecurity Security Model Certification (CMMC) will soon be required for all Department of Defense contractors. Whether you are a major corporation or a small manufacturer, you’ll...

CMMC Compliance Overview

CMMC Compliance Overview

CMMC for Small Business As small businesses face the requirements of the CMMC, they’ll quickly realize the need for careful,  planning to meet the latest benchmarks. CMMC introduces a major shift in...