Skip to main content

The Importance of Cybersecurity Health Check for Small Businesses

 

 According to the International Labor Organization (ILO), small businesses have become the engine of economic growth and social development across all countries, accounting for a staggering 70% of employment worldwide.

Obviously, these small businesses rely heavily on the internet and other online platforms and resources, which form integral components and enabling tools for their transactions. This has become even more prevalent since the pandemic period. Regarding online safety, it is estimated that over 40% of these small businesses have experienced a cyber attack. The type of cyber attacks that are more commonly aimed at small businesses include Social Engineering attacks like Email Phishing and telephone phishing otherwise known as "vishing" 

There are a few factors that make small businesses to be vulnerable to attacks. Cyber criminals assume that small businesses have weaker security measures in places, making them easier to crack than the larger enterprises. Also, they have smaller budgets which means they are not financially prepared for an attack, and most do not have cyber insurance. Poor or non-existent employee cyber awareness education/training is another huge factor, considering the fact that 95% of cybersecurity breaches are attributed to human error.

What is Cybersecurity Health Check?

The Cybersecurity Health Check is aimed to help small businesses understand and minimize their cybersecurity risk by systematically identifying the weaknesses and strengths of their cybersecurity policies and implementations. It provides a checklist showing areas where they are doing well and where they can improve in order to mitigate risks. It can include vulnerability scans of the organizational local or cloud infrastructure and systems. 

A cyber health check also offer the advantage of helping the small business to establish and proof compliance with regulatory information security requirements such as the ISO 27001.

What activities are involved in Cybersecurity Health Check?

  • Conducting vulnerability assessment on IT assets - internal IT infrastructure, cloud platforms and end-user devices
  • Document identified risks and understand remediation actions needed
  • Determine level of preparedness and response to possible cyber attacks
  • Determine the level of staff cyber awareness
  • Provide a snapshot of the current cybersecurity posture

Outcome/Benefits of Cybersecurity Health Check?

The outcome of a cybersecurity health check is a detailed report describing current risk status and vulnerabilities/exposures - with reference to best practice frameworks such as the ISO 27001, NIST controls, CIS 20 Critical Controls, Cyber Essentials, etc. and of course some recommendations for reducing the identified cyber and compliance risks effectively and in line with business objectives. Other benefits include:

  • The small business can focus more on innovation and growth
  • Financial losses due to data theft or ransomware are drastically minimized or eliminated
  • New business opportunities can be secured such as government contracts because of compliance to regulations.

Comments

Popular posts from this blog

WEB SERVER AND BROWSER INTERACTION

At one time or the other, you may have used or heard such expressions as “Downloading file from server”, “server is slow”, “Authentication required for server access”, and so on. These are everyday expressions used in the present Information Age. Now let us take a closer look at what a server really is, with emphasis on the type of server that makes it possible for access to the Information Superhighway – the Internet, known as Web Servers , as well as what actually happens when an internet user tries to access a website via a Web Browser by sending a (Hyper-Text Transfer Protocol) HTTP request to the web server. WHAT IS A SERVER? A server is basically a computer program that serves some sort of content to a client using a specified protocol. The term server also refers to the computer or virtual machine running the server program, which in fact is the most common use and understanding of the term. Today, most enterprise organisations with computer network infrastructure do host th...

INTERNET PENETRATION - Nigeria Top Three in Global Online Search

Over the years Internet penetration has greatly improved across the developing countries of the world especially Nigeria which now has over 92 million internet users. Finding information online has become a common practice as people comfortably search for information using web search engines, especially Google  and get relevant search results that answers their questions and further provides them insight to related articles, events, photos, news and even map locations. Thanks to Google Map Local Guides like myself who diligently contribute to improve the map by sharing knowledge of the local environment. The mobile internet revolution has made it possible for people even in the rural areas to have access to internet on their mobile devices. During my University days, precisely in the year 2008, I carried out a questionnaire research on the topic: "How Effectively Do You Utilize Your Mobile Phones For Internet Access", the responses were amazing as people were alrea...

WHATSAPP: HOW TO BACKUP CHATS & MEDIA ON GOOGLE DRIVE

With Google Drive cloud storage service you can backup WhatsApp media which includes chats, photos, videos, audio and documents. It is goodbye to data loss! The importance of performing this backup is if you change or lose your device you can always retrieve all your previous media files with ease. Google has recently announced a new agreement with WhatsApp regarding backup of WhatsApp chats and media on Google Drive which will allow users have extra storage different from their normal Google Drive storage quota. The announcement reads; "Due to a new agreement between WhatsApp and Google, WhatsApp backups will no longer count against Google Drive storage quota. However, any WhatsApp backups that have not been updated in more than a year will automatically be removed from storage. This policy will go into effect for all users on November 12, 2018 though some users may see the quota benefits earlier. To avoid the loss of any backups, we recommend that people manually back up...