Perspectives

Coherent Marketing has worked with SCORE Raleigh for the past several years to help small businesses improve their online security. In an increasingly-connected world, small businesses are vulnerable to a range of malicious attacks. And because of this connectedness, an intrusion in one area can translate into a much broader problem. A successful malicious attack can be terminal to a small business.

Our online seminar is a cost-effective way to learn the basics that a small business needs to avoid a costly hack or ransomware.

Many small business owners are focused on doing what they need to do to keep their business running and may not have online security expertise.  They may not know, for example, that a hack of the business router exposes the entire network to the intruder and can result in snooping, gathering of bank account passwords and the injection of ransomware.They may also think that because they are a small business, it isn't worth trying to hack them. They won't necessarily know that bots do most of the work and crawl the web looking for vulnerabilities. 

So if a small business isn't keeping the computers and hardware up to date, they can be infected with a worm that then subsequently might upload itself to the company website during website content editing, resulting in the website being blacklisted. A blacklisted site can result in a loss of sales if it is an eCommerce site, or a loss of confidence by potential clients.

We are also seeing the growth of the Internet of Things (Iot). Many of these so-called smart products have poor security, and when connected to a business network, provide a straightforward entry point to a hacker or even a bot. Is having an app-controlled coffeemaker really worth putting your business at risk?  We provide ways for companies to assess whether they want a smart TV or some other device on their network. 

With smartphones carrying apps now the norm rather than the exception, visitors to your premises connecting to your network may also compromise your security unless your network is set up properly. An app with a side-loaded trojan being used by a corporate employee on the network can also expose account information and other assets.  You should know what you should be doing to prevent this kind of unintentional use from negatively impacting your company.

And COVID-19 created an environment in which many businesses implemented online and remote working.  How are these practices a risk and what should you be doing?

As alarming as all of these issues are, the good news to small business owners is that following straightforward, good practices can eliminate much of the risk. For the rest, having an effective backup plan can restore security failures quickly and with little downtime.

In our two-hour seminar, we cover the following areas:

  • How your hardware, online marketing and business files are all connected.
  • Your router and network.
  • IoT and smartphones.
  • Computer and other hardware.
  • Password management.
  • Backups.
  • Email – how it works, and how it works for hackers
  • The nasties - malware, scams, ransomware, phishing, and worse.
  • What you need to do to secure your website.
  • Ownership of online infrastructure and properties.
  • Examples and what to look out for.
Schedule an online security seminar

If you believe you may be at risk, want to learn more, or would like a refresher on security practices for your small business, contact us to schedule a Zoom or Skype online seminar. We have found that our online seminar provides a good baseline from which to start your own internal assessment, and it also provides you with the opportunity to ask questions specific to your business.  (Note that we do not need to access your files or website, and we won't be asking for any passwords.)

 

CONTACT US

 

Show comment form

From Our Blog

  • Unveiling Joomla: A Journey Through Its Origins and Impact


    As we embark on a journey into the realm of content management systems, one name stands out prominently: Joomla. In this article, we delve into the roots of Joomla, its etymology, and its significance in the digital landscape.

    Let's commence our exploration with the name itself. While Joomla may seem like a coined term to some, its origins trace back to the Swahili language, particularly the word "jumla," meaning "all" or "as a whole." This linguistic connection not only adds depth to Joomla's identity but also reflects its inclusive nature, catering to diverse communities across the globe.

    Read more …

  • Cost-effective content marketing

    Fresh content on a website is one of the most important ways search engines rank where you will be found - on page one, or buried.

    Content marketing uses online content to increase the visibility of an organization and is an effective marketing method. Done right, it can help you get to page one.

    Many organizations have experienced staff, provide good services, and have everything needed to create great content with the regularity needed for this kind of marketing, but find it difficult to do so. We can solve that for you. We will turn what it is you do into effective web content. In short, we make content marketing easy for you. Contact us to find out about our rates and to discuss how we can help.

    Read more …

  • Consortiums, initiatives, associations and partnerships

    They all have the same challenge - and advantages. They require everyone to get in the boat, to row in sync together, and to row in a shared direction.

    Integrated Media Strategies has more than a decade of experience working highly successfully with these kinds of communications projects. We have spent hours in committees getting groups of people to come to agree on shared areas where strategic positioning of messaging can benefit all parties. And then working with those partners to implement the communications tactics to make it all work. We like herding cats.

    Read more …