Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Five Steps to Protecting Data in Small- and Medium-Sized Businesses

Security plans help SMBs safeguard customer identities and preserve business vitality

By Dale Dabbs
July 10, 2012

databreachWe read it in the headlines all too often: “Facebook, PayPal Users Urged to Check Logins After Hacking,” “Sony Hacked Again; 25 Million Entertainment Users’ Data at Risk,” “Zappos Says Hacker May Have Accessed Info on 24 Million Customers,” and most recently, “MasterCard, Visa Warn of Credit Card Data Theft.”

Clearly, fraud that leads to identity theft remains a very real threat. Once hackers infiltrate businesses’ networks, they can access customers’ personal information and use it to assume false identities, open credit cards or apply for loans in customers’ names.

While we read about the large-scale attacks on big business, businesses of all sizes face a certain risk. In fact, small- and medium-sized businesses (SMBs) remain especially vulnerable as organized crime shifts its focus to smaller merchants that may have less stringent security measures in place.

This threat to businesses and their confidential customer data demands proactive information security and fraud protection plans, as well as incident response protocols. While all businesses need to address security, for SMBs the stakes are especially high: security breach laws and regulations continue to tighten and notification requirements are becoming more stringent. SMBs without the infrastructure to adequately comply with these laws could, in the event of an attack, incur expenses that climb to hundreds of millions of dollars, threatening the viability of their operations.

Though it may sound overwhelming – another area to address amidst the chaos of running the business – there are ways to protect against and effectively address fraud and identity theft. It just takes some planning and forethought, or perhaps an attitude shift around security. SMBs need to adopt an approach that makes security and risk management an integral part of operations, a built-in component of every project and expansion, rather than an additional item at the bottom of the “to-do” list.

 

The Letter of the Law … and its Consequences

While Congress continues to work toward federal consumer protection legislation, at present, data breach disclosure laws in 46 states govern all organizations doing business within their jurisdictions. These regulations require merchants to notify victimized customers in the event of an attack on the businesses’ networks and provide customers with guidance on next steps and recovery measures. If businesses fail to undertake these actions in a timely manner, they can face steep fines, enforcement actions from state and federal regulators, and lawsuits from their customers.

The penalties merchants can incur easily become onerous and complex. A company with hundreds of thousands of victimized customers across 10 states would, first of all, have to meet the disclosure criteria of all 10 states’ regulations. Then there are the costs of remediation, which average $214 per affected customer record. These numbers quickly climb to millions of dollars, without factoring in any additional regulatory actions states may bring.

 

A Two-Pronged Approach to Business and Customer Protection

To protect their customers and ensure they can comply with the data disclosure laws, businesses need to develop comprehensive security plans. These policies should contain two lines of defense: precautionary measures and protocols for breach response.

For front line protection that reduces the chance of becoming data breach targets or victims, businesses should take these steps:

  • Assess current security practices and potential gaps. Common areas of vulnerability include firewall adequacy, anti-virus and anti-malware protection and warning systems to indicate threats of attacks.
  • Develop plans for privacy and securitythat address backup and recovery, compliance and due diligence practices. Most importantly, businesses need systems to identify the location of their customers’ confidential information – databases, contact lists, financial records – and focus on protecting these key areas. 
  • Train employees so they know how to execute the security plans. Incorporate continuing education to keep employees up to speed on security practices.

In addition to prophylactic measures, SMBs need action plans ready in case breaches occur. Companies prepared to manage breach situations can respond efficiently and effectively, minimizing financial and reputational damage as well as harm to customers. Thorough preparation demands the following:

  • Breach incident planningthat includes designing a breach process flow, developing a forensics checklist, assigning internal breach incident team roles and drafting an external notification guide.
  • Access to post-incident supportto ensure businesses have the resources they need to carry out the recovery and customer notification processes. These supports could range from customized victim notification letter production to call center support to handle victim concerns to an outside forensic expert to help investigate root causes of the breach and isolate vulnerabilities.

While developing security plans like these takes time and energy, it’s an up-front investment that SMBs must make to help protect their customers and their businesses.  In addition to losses from the breach itself, SMBs that suffer an attack can lose up to 25 percent of their business because of decreased consumer confidence in their brand. These are clearly losses no company can sustain. With the right approach to security and fraud protection in place, they shouldn’t have to.  

KEYWORDS: credit card data breach data theft retail security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dale Dabbs, President and CEO, EZShield

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • employees-working-around-table.jpg

    How small & medium-sized businesses can shore up cyber defenses

    See More
  • Provides Cost-Effective Surveillance for Small- and Medium-Sized Businesses

    See More
  • Cyber Insurance Rates, Purchases and Coverage

    Small-to-Medium-Sized Enterprises More Likely to Adopt Cyber Insurance

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing