• Link to Facebook
  • Link to Instagram
  • Link to LinkedIn
  • Link to Youtube
  • Link to Pinterest
  • Link to Mail
  • Link to Rss this site
02 9907 7777
Websites 4 Small Business - Website Design & Development
  • Home
  • Services
    • Website Design
    • Website Audit
    • Create Your Own Website – Web Design Coaching
    • Website Redesign
    • Website Design Extras
    • Business Logo Design
    • Domain Name Registration
    • Webhosting
    • Small Business Marketing
    • SEO Search Engine Optimization
  • Pricing
  • Testimonials
  • Portfolio
    • Website Design Gallery
    • Website Redesign Gallery
    • Business Logo Gallery
  • Blog
  • About
    • About Us
    • Guest Posts
    • In the Media
    • Business Partners
    • Privacy Policy
    • Service Provider Terms and Conditions
  • Guides
  • Industry
    • Coaches and Consultants
  • Learn
    • The Complete Guide to Website Design & Redesign
    • The Complete Guide to Website Conversion & Growth
    • The Complete Guide to Website Content & Visibility
    • The Complete Guide to AI & Automation
    • All Tutorials
  • Resources
    • FAQ
    • Ultimate Website Design Blackbook
    • 7 Powerful Ways to Promote Your Business for Free
    • FREE Downloadables
    • Savvy Woman’s Practical Guide to Online Business
    • Website Design Humour – Max vs Jordan
    • Website Audit Videos
    • Videos
    • Business Tools
    • Technical Jargon Explained
    • Search Engines and Directories
    • WordPress How To
      • How To Edit Pages Using the Enfold Theme
      • Enfold Theme Video Tutorial
      • How to Back Up WordPress Using CPANEL
      • How to Upgrade your WordPress Website
  • Contact
  • Click to open the search input field Search
  • Menu Menu
You are here: Home1 / Small Business Blog2 / Privacy and Security3 / Secure Your Business From Data Breaches

Secure Your Business From Data Breaches

Identity theft is increasing on a global scale, with financial information and client records considered foundational data for cyber criminals that indulge in this practice, whether for strict financial gain or use in fraudulent transactions. The normal practice is that harvested data is used to create other accounts (such as bank, email or other) or indeed continue using existing accounts but changing passwords to prevent legitimate access.

Small to medium enterprises obviously store both financial and health information and are prime targets for hackers. In August 2014. These criminals do not care about your business information but focus more on your personal details such as date of birth, address, etc., using them for services or credit applications.

Australia has had its fair share of data breaches. In 2012, ransomware (software that locks down a computer until a ‘ransom’ is paid using an untraceable digital currency such as Bitcoin) was used to compromise the operations of a Gold Coast medical centre.

Luckily, with a little knowledge and some forward planning, you can protect your medical practice from most of these data breaches. I say most, as even large enterprises are successfully breached by highly skilled hackers on occasion and few servers can continue operation if thousands of hackers launch a simultaneous attack.

The first logical step is to identify all possible weaknesses in your IT infrastructure. Small or medium sized  businesses are no different from companies in other industries in this respect, even though the database will store is often more valuable or simply more concentrated. All companies store their data in some or all of the following locations:

  • Local networks and workstations that may or may not include a server
  • Wireless networks – use of strict security protocols with passwords is essential as the entire network is compromised if unsecured
  • Portable devices such as mobiles, tablets and laptops. Best practice is to have a policy in place for remote wiping of data in case of loss or theft. An even better practice is to store data remotely and never on a portable device, providing secure remote access only to authorised devices.
  • Physical storage – anything that he is used to store paper-based documentation, such as filing cabinets
  • The cloud – use of a reputable cloud service provider will ensure that encryption is standard. For maximum protection, this cloud provider is certified to the highest security standards and has experience of the health industry.
  • Employee devices – should only be allowed if a defined bring your own device (BYOD) policy that protects your business is in place

Evaluating the security of the entire IT and business structure is a task for professionals with specific skills in penetration testing or ethical hacking as it is more commonly known. These experts think like hackers and can easily identify potential issues, including possible lapses in physical security procedures.

This can include rubbish disposal as valuable information is often obtained by hackers from the company’s recycling bins and even from landfills. This makes crosscut shredding and secure disposal of documents a necessity for any medical practice.

Shoulder surfing is another technique that can compromise data and simply involves visitors looking over the shoulder of staff members as they work on medical records. Staff awareness and training is the only real prevention for this.

It is fair to say that your staff can unwittingly cause data breaches, as hackers use many avenues of attack to gain access to your network. Consequently, it is very important that you and your staff are aware of the methods that hackers use to harvest data illegally. I cannot emphasise enough the importance of staff training in this area.

The most common methods of hacker attack are:

  • By email – Staff members must never open and attached document from an unknown sender, as the attachment is likely a virus that will either grab, destroy or in another way compromise the business
  • On the internet – Many companies have a white list of trusted websites and prevent access to all orders. This may not be practical but staff should only interact with trusted sites and never download to work-related devices
  • Social media -be careful what you post online as hackers use this information to guess passwords or work habits
  • Software exploits and vulnerabilities – your IT staff or service provider must be diligent in applying security updates and patches as soon as they are available. Hackers will take advantage of any delays in this area. Companies that still use Windows XP are common targets since Microsoft has ended support
  • Security questions – if password retrieval is unsuccessful hackers will try to guess the answers to related security questions. When successful, the current password is changed and the legitimate user can no longer access the account.
  • Burglary – breaking into the actual premises provides direct access to the IT network
  • Cameras – most smartphones and portable devices include this is a standard feature
  • Rubbish – mentioned earlier but worth mentioning again. Use crosscut shredders or incinerators when disposing of documents
  • Portable devices – when lost or stolen, company information is compromised if stored on the actual device
  • Old hardware – data recovery is possible from hard drives memory sticks and other storage devices. Ensure secure destruction and never donate or resell computers with hard drives or other storage media intact. Industry professionals recommend total destruction of older hard drives with a metal spike or degausser (removes the magnetic field and therefore the data from a hard drive). Alternatively, use an incinerator or retain a company that specialises in data destruction.

Companies that take their security seriously and employ the tips outlined above can considerably reduce their chances of a data breach, making the hackers’ goals much more difficult to achieve. In fact, they were more than likely move on to an easier target.

Security diligence is essential, considering the ongoing rise in cybercrime. Carry out regular security checks on an ongoing basis. Intermittent checks will not suffice as new tracts appear on a daily basis. This approach and due diligence on our part, protects our medical data, despite the best efforts of those seeking to extract it.

————–

Rob Khamas is an eHealth & technology solutions strategist with REND Tech Associates.

Award Winning Website Designer

Wait. You Can Do That?

Use AI to get more done in less time – without adding more tools.

Wait! You can do that? Save 10–12 hours a week as a solo business owner using AI

Get the guide →

Many Happy Customers

I just wanted to say thank you for again building my new website, it looks fabulous and reflects my style totally. Thank you also for listening to my requests and not giving up until I was happy with the end result. As always you are a pleasure to work with and your knowledge and skill, not to mention your patience is unquestionable. I would happily recommend you to anyone seeking help with web design.

Danielle DuBois – Your Marriage Celebrant

****

I am delighted with your design of our web site. Your design ideas have always been in line with the company look and are fresh and innovative, as well as being easy to read and understand. Your suggestions regarding adding value to the web site and on how to get the site to work harder have been invaluable.

Not only have you fulfilled our design wishes, but you have also given that oh so necessary ongoing support. I have found this to be incredibly helpful and, for a small business, financially manageable. Now, if only you could bottle your creativity, enthusiasm and efficiency …..! Thanks Ivana! I look forward to continuing to work with you!

Louise Brogan - All Money Matters

Let's Connect

Facebook YouTube Twitter LinkedIn Pinterest

Follow us on Facebook

Download Library of Free Resources To Help You Grow Your Business

Resource Consulting Business

Categories

  • Accounting
  • Artificial Intelligence
  • Branding
  • Business Management
  • Business Online
  • Business Start-Up
  • Content
  • Customer Service
  • Domains & Webhosting
  • Email marketing
  • Finances
  • Legal
  • Marketing
  • Privacy and Security
  • Search Engines
  • Small Business
  • Social Media
  • Software
  • Staff
  • Technology
  • Time Management
  • Uncategorized
  • Website Design
  • Website Marketing
  • Work At Home
  • Workspace
Search

Recent Posts

  • Best Coworking Spaces in Melbourne for Web Designers
  • The Hidden Cost of Manual Finance Admin in Small Business
  • Why Australian Digital Marketers Are Investing in a Proper Home Office
  • AI Tools for Creating Marketing Presentations: Which Let You Edit Directly?
  • How Dark AI Differs from Traditional Cybercrime Tools
  • How to Run a Proper Website Chatbot Comparison Before You Commit
  • Clean Sites, Credible Businesses: The Outdoor Builder’s Guide to Local SEO and Job Site Logistics
  • When Your Website Success Creates Legal and Financial Challenges with Online Marketing
  • Why AI Video Creation Is the Biggest Shift in Content Production Since the Smartphone
  • Choosing an SEO Agency: A Practical Small-Business Guide

Contact Us

Tel: 02 9907 7777 – 0405 636 204
Email: ask@web4business.com.au
Location: Narrabeen NSW 2101, Australia
Areas: Website Design by Location

Must-Have Business Tools

Wait. You Can Do That?
Save 10 – 12 hours a week with AI

GetResponse Automation

Envato Market

Dropbox

Some content on this site may include paid placements. All content is reviewed to ensure relevance and quality for small business owners.

Award Winning WordPress Website Designer in Sydney for Small Businesses and Professionals

 

Connect

Facebook YouTube Twitter LinkedIn Pinterest

Solutions

Small Business Website Design & Development
Website Audit
Create Your Own Website – Web Design Coaching
Website Redesign
Business Logo Design
Domain Name Registration
Webhosting
SEO Search Engine Optimisation

Resources

Guest Posts & Editorial Features

Privacy Policy

 

© Copyright - Websites 4 Small Business - Enfold Theme by Kriesi
Link to: Data Security In The Age Of The Mobile Worker Data Security In The Age Of The Mobile WorkerData Security In The Age Of The Mobile Worker Link to: Keeping Computer and Network Safe for SMEs Keeping Computer and Network Safe for SMEsKeeping Computer and Network Safe for SMEs
Scroll to top Scroll to top