Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit.
Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances. This makes it the responsibility of every business, especially those collecting and storing customer information, to implement a multi-pronged approach to safeguard such information.
Yes, we’re looking at you, Mr. Pizza Shop Owner, who has our names, addresses, phone numbers and credit card information stored to make future ordering easier and hassle free.
Today’s SMB Needs a Robust Security Plan
Protecting your business and its reputation comes down to developing, implementing and monitoring a robust security plan that adequately addresses everything from physical access and theft to the threat of compromised technology security. This involves defining and outlining acceptable uses of your network and business resources to deter inappropriate use. Here are four key components to consider.
#1 Network Security Policy
#2 Communications Policy
Use of company email and Internet resources must be outlined for legal and security reasons. Restricting data transfers and setting requirements for the sharing or transfer of digital files within and outside of the network is recommended. Specific guidelines regarding personal Internet use, social media and instant messaging should also be clearly outlined. If the company reserves the right to monitor all communication sent through the network or any information stored on company-owed systems, it must be stated here.
Restrictions should be set on the distribution of proprietary company information or the copying of data.
#4 Inappropriate Use
Obviously, any use of the network or company-owned system or device to distribute viruses, hack systems or engage in criminal activity must be prohibited with the consequences clearly noted. Any website that employees cannot visit should be identified if not altogether blocked and restricted. For instance, downloading an entire season of True Blood from a Bit Torrent site isn’t an acceptable use of company Internet resources.
Every employee must know these policies and understand the business and legal implications behind them. Companies must also make sure these policies are clear and understood by all, and most importantly, strictly enforced.