{"id":6389,"date":"2017-01-26T06:02:48","date_gmt":"2017-01-26T14:02:48","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/26\/news-226\/"},"modified":"2017-01-26T06:02:48","modified_gmt":"2017-01-26T14:02:48","slug":"news-226","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/01\/26\/news-226\/","title":{"rendered":"Data Privacy Day 2017: Tips for Protecting Small Businesses"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Data Privacy Day is on January 28, and I\u2019m willing to bet this isn\u2019t a day most people are aware of. However, with cyber threats such as ransomware, data breaches and Business Email Compromise (BEC) scams plaguing the small business landscape, spending time in observance of Data Privacy Day should be a priority.<\/p>\n<p>In 2016, our researchers witnessed a <a href=\"http:\/\/blog.trendmicro.com\/ransomware-growth-will-plateau-in-2017-but-attack-methods-and-targets-will-diversify\/\">400 percent increase<\/a> in ransomware families and don\u2019t foresee that number becoming stagnant any time soon. We <a href=\"http:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/predictions\/2017\">predict<\/a> a 25 percent growth in ransomware families throughout this year, with more attackers focusing their efforts on businesses. Additionally, BEC scams quickly became one of the biggest enterprise threats last year with threat actors cashing in on roughly $3 billion. Much like ransomware attacks, these threats are only predicted to increase in sophistication and volume throughout 2017.<\/p>\n<p>As a small business, there are a number of steps laid out below that you can take to ensure these nightmares don\u2019t become your reality.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td><strong>1. Implementing multi layered protection<\/strong> &#8211; Small businesses typically only focus on protecting their endpoints, but don\u2019t consider other potential threat vectors. It\u2019s crucial to make sure every device with access to your data and\/or network is protected, including mobile devices. As seen with the recent WhatsApp and <a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/fake-apps-take-advantage-mario-run-release\/)\">Super Mario Run<\/a> exploits, mobile devices are becoming a more popular target for hackers.<\/p>\n<p><strong>2. Securing email<\/strong> <strong>servers<\/strong> &#8211; According to our <a href=\"http:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\">2016 Midyear Security Roundup Report<\/a>, 71 percent of ransomware originates via email, making it the most popular vehicle for threats alongside BEC scams. Therefore, it\u2019s imperative to not only have additional protection in place for your email, but to also be wary of messages requesting money transfers, even if it appears to be from a legitimate source.<\/p>\n<p><strong>3. Backing up all information <\/strong>\u2013 Backing up your data is critical to ensuring company information is safe from disruption or extortion in the event of a data breach. It\u2019s recommended to follow the 3-2-1 approach: have <strong>three<\/strong> copies of your data stored in <strong>two<\/strong> different locations with <strong>one<\/strong> copy stored off site.<\/p>\n<p><strong>4. Educating users<\/strong> \u2013To make a profit, cybercriminals rely on unsuspecting users to open a malicious link or file, or authorize a fraudulent wire transfer. Educating your employees on what types of suspicious activity to be on the lookout for could save your organization from being a threat actor\u2019s next victim. It\u2019s also important to make them aware of what to do when they experience something that doesn\u2019t look right, and let them know there\u2019s no shame in being overly cautious.<\/p>\n<p><strong>5. Protecting the cloud<\/strong> &#8211; Many cloud offerings provide little to no security, which is important to remember when leveraging cloud solutions such as file sharing, hosted email, etc. Fortunately Trend Micro, offers <a href=\"http:\/\/www.trendmicro.com\/us\/business\/cloud-data\/index.html\">Hybrid Cloud Security Solutions<\/a> that provide protection within these hosted environments.<\/p>\n<p><strong>6. Patching and updating<\/strong> &#8211; Out of date software makes it easier for threats to enter and attack a small business. Being diligent about upgrading to the latest version of your security software will mitigate the risk of vulnerabilities being exploited. It\u2019s also important to make sure your operating systems are up to date and decommission unsupported operating systems such as Windows XP and Windows 2003.<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Data Privacy Day exists to generate respect for privacy, safeguard data and enable trust throughout your small business. Trend Micro offers a variety<a href=\"http:\/\/www.trendmicro.com\/us\/small-business\/index.html\"> security solutions<\/a> for small businesses, which will assist in protecting your network. Setting aside one day a year, if not more, to implement these tools will save you time, money and credibility in the long run.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/data-privacy-day-2017-tips-protecting-small-businesses\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-300x205.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-125x85.jpg 125w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-640x438.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-440x301.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam-380x260.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/tech-support-scam.jpg 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Data Privacy Day is on January 28, and I\u2019m willing to bet this isn\u2019t a day most people are aware of. However, with cyber threats such as ransomware, data breaches and Business Email Compromise (BEC) scams plaguing the small business landscape, spending time in observance of Data Privacy Day should be a priority. In 2016,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714,11096],"class_list":["post-6389","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security","tag-small-business"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6389"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6389\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}