Skip to main content

The Importance of Cybersecurity Health Check for Small Businesses

 

 According to the International Labor Organization (ILO), small businesses have become the engine of economic growth and social development across all countries, accounting for a staggering 70% of employment worldwide.

Obviously, these small businesses rely heavily on the internet and other online platforms and resources, which form integral components and enabling tools for their transactions. This has become even more prevalent since the pandemic period. Regarding online safety, it is estimated that over 40% of these small businesses have experienced a cyber attack. The type of cyber attacks that are more commonly aimed at small businesses include Social Engineering attacks like Email Phishing and telephone phishing otherwise known as "vishing" 

There are a few factors that make small businesses to be vulnerable to attacks. Cyber criminals assume that small businesses have weaker security measures in places, making them easier to crack than the larger enterprises. Also, they have smaller budgets which means they are not financially prepared for an attack, and most do not have cyber insurance. Poor or non-existent employee cyber awareness education/training is another huge factor, considering the fact that 95% of cybersecurity breaches are attributed to human error.

What is Cybersecurity Health Check?

The Cybersecurity Health Check is aimed to help small businesses understand and minimize their cybersecurity risk by systematically identifying the weaknesses and strengths of their cybersecurity policies and implementations. It provides a checklist showing areas where they are doing well and where they can improve in order to mitigate risks. It can include vulnerability scans of the organizational local or cloud infrastructure and systems. 

A cyber health check also offer the advantage of helping the small business to establish and proof compliance with regulatory information security requirements such as the ISO 27001.

What activities are involved in Cybersecurity Health Check?

  • Conducting vulnerability assessment on IT assets - internal IT infrastructure, cloud platforms and end-user devices
  • Document identified risks and understand remediation actions needed
  • Determine level of preparedness and response to possible cyber attacks
  • Determine the level of staff cyber awareness
  • Provide a snapshot of the current cybersecurity posture

Outcome/Benefits of Cybersecurity Health Check?

The outcome of a cybersecurity health check is a detailed report describing current risk status and vulnerabilities/exposures - with reference to best practice frameworks such as the ISO 27001, NIST controls, CIS 20 Critical Controls, Cyber Essentials, etc. and of course some recommendations for reducing the identified cyber and compliance risks effectively and in line with business objectives. Other benefits include:

  • The small business can focus more on innovation and growth
  • Financial losses due to data theft or ransomware are drastically minimized or eliminated
  • New business opportunities can be secured such as government contracts because of compliance to regulations.

Comments

Popular posts from this blog

WEB SERVER AND BROWSER INTERACTION

At one time or the other, you may have used or heard such expressions as “Downloading file from server”, “server is slow”, “Authentication required for server access”, and so on. These are everyday expressions used in the present Information Age. Now let us take a closer look at what a server really is, with emphasis on the type of server that makes it possible for access to the Information Superhighway – the Internet, known as Web Servers , as well as what actually happens when an internet user tries to access a website via a Web Browser by sending a (Hyper-Text Transfer Protocol) HTTP request to the web server. WHAT IS A SERVER? A server is basically a computer program that serves some sort of content to a client using a specified protocol. The term server also refers to the computer or virtual machine running the server program, which in fact is the most common use and understanding of the term. Today, most enterprise organisations with computer network infrastructure do host th

MOBILE NETWORK PORTABILITY (MNP) COMING SOON IN NIGERIA

What is Mobile Network Portability (MNP)? Mobile Number  Portability allows mobile telephone users to migrate from one service provider to another and still retain their telephone numbers. It provides a platform whereby a subscriber on any of the existing GSM and some of the CDMA networks can switch from one service provider to another and still retain their phone numbers. For instance, with your current MTN line you can decide to migrate to ETISALAT or vice-versa, and still retain your "stable and popular" phone number. How MNP Works For instance, subscriber A whose original service provider is network P, might wish to change or port to network Q. This can be achieved by subscriber A sending a porting request to network Q, network Q sees the request coming from a user on network P and then contacts them accordingly to setup the process of exchange and transference of subscriber details, this is the most common and it is known as "Recipient-led" porting. Once a

INTERNET PENETRATION - Nigeria Top Three in Global Online Search

Over the years Internet penetration has greatly improved across the developing countries of the world especially Nigeria which now has over 92 million internet users. Finding information online has become a common practice as people comfortably search for information using web search engines, especially Google  and get relevant search results that answers their questions and further provides them insight to related articles, events, photos, news and even map locations. Thanks to Google Map Local Guides like myself who diligently contribute to improve the map by sharing knowledge of the local environment. The mobile internet revolution has made it possible for people even in the rural areas to have access to internet on their mobile devices. During my University days, precisely in the year 2008, I carried out a questionnaire research on the topic: "How Effectively Do You Utilize Your Mobile Phones For Internet Access", the responses were amazing as people were alrea