Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How Small Businesses Can Improve Cybersecurity Without Breaking the Bank

By Matthew Bradley
Fraud Cybersecurity Banking in Canada
January 14, 2020

While organizations of all sizes have benefited from the efficiencies and conveniences of taking their business digital, it’s not without risks. Cybersecurity in today’s hyperconnected world is a necessity for large, medium and small businesses alike. Smaller businesses may be more prone to cyberattacks as they typically have fewer resources dedicated to cybersecurity. 

One of the primary motivations for cybercriminals is financial gain. In the last few decades, cybercriminals have grown in technical and operational sophistication, and are a pervasive threat to organizations holding personally identifiable information or payment details. This information allows cybercriminals to profit from fraudulent activity or reselling data. While large businesses with more than 100 people have more data to steal, small businesses may be more attractive targets of opportunity especially for less sophisticated cyber criminals.

Lack of time, budget and knowledge are three common reasons why businesses may not have adequate cybersecurity today. Implementing the proper tools for protection can sometimes come with a hefty price tag, making it harder for small businesses to obtain the proper tools and education around cybersecurity. However, there are a few simple, cost effective practices to keeping data and devices secure without breaking the bank. 

  • Educate employees - Employees can often be the weakest link in a company’s fight against cyberattacks. One of the simplest and most effective ways to protect your business from a cyberattack is to train employees about cybersecurity frequently. Companies can do this by e-learning, onboarding talks and hosting regular seminars for employees on how to identify potential threats. This preventative measure will help employees to avoid falling victim to phishing and other scams.
  • Multifactor identification - Multifactor identification is easily supported by multiple channels and a quick win when it comes to protecting data on both personal and professional devices. Even if a cybercriminal obtains a person’s password, it will be more difficult to use it when multifactor identification is in place. Using multifactor authentication makes your network a more difficult target, which could be enough of a deterrent for criminals to move on to another target.
  • Implement strong password policies – Creating and enforcing strong password policies is an efficient way to improve cybersecurity. Be sure that all employees change their passwords every 90 days. Additionally, passwords should be complex and no single password should be used for more than one log in. This tedious but effective precautionary measure is a powerhouse against cyberattacks and is a successful way to reduce great risk in an economical way.
  • Install Up-to-Date Antivirus Software - Phishing attacks are one of the most common attacks used against businesses and business travelers. These types of attacks are when cybercriminals use text messages and emails to impersonate legitimate actors, usually involving malicious links or attachments used to install malware. Having up-to-date antivirus software on all company devices and networks is one way of preventing malware and viruses from being installed on your network. 
  • Back up your data regularly - Backing up your businesses data regularly will allow you to restore data to a point in time before a potential breach occurred, without losing all of the data. To ensure that you will have the latest backup if you ever need it, check your backup regularly to ensure that it is functioning correctly.

It’s also important to remember that employees traveling for business can pose a cybersecurity risk to the organization.

According to International SOS’ most recent Travel Risk Outlook study, it was revealed that less than a third of organizations include cybersecurity in their travel risk management and mitigation policies. Because cybersecurity threats are not constrained by geographic boundaries, and employees are required to access company information on mobile devices, including laptops, smartphones and tablets, while traveling for business, business travelers face an increased risk to cyberattacks.

Potential attackers may control the infrastructure on which communications travel, or have greater opportunity to gain physical access to a target and their portable devices. Business travelers are also far more likely to connect to unsecured Wi-Fi networks while traveling, exposing themselves to greater data vulnerability while in transit. Luckily, there are cost effective precautionary measures that businesses and business travelers can implement ahead of a trip to help reduce the risk of cyberattacks.

  • Research the potential cyber threats specific to the location.
  • Minimize the number of devices employees take and remove any unnecessary or highly sensitive data prior to the trip.
  • Avoid sharing the exact location/purpose of a business trip on the internet.
  • Ensure all software on any devices used for business is up-to-date.
  • Educate travelers about the risks while traveling.

As technology continues to evolve, cyberattacks are becoming more complex. The longer a business waits to implement simple measures to reduce the risk of attacks, the more vulnerable and attractive they become to the cybercriminal. Although cyberattacks come at unexpected moments, implementing these simple mitigation steps can reduce or eliminate a hacker’s attempt to gain access to your business’s data.

KEYWORDS: cyber security cybersecurity multi-factor authentication passenger security Small to Medium Business (SMB) security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matthew bradley

Matt Bradley, Vice President of Global Security Solutions at OnSolve. A veteran security operations expert for more than two decades, Bradley brings deep first-hand knowledge of security operations management and understanding of the critical challenges facing organizations the future. Most recently, Bradley served as Regional Security Director for the Americas at International SOS and Control Risks, where he led the security services business and advised key executives on risk management solutions. Prior to International SOS and Control Risks, Bradley worked in Honduras as the Security Director for Tigo Honduras where he handled all matters relating to physical security; health, safety and environment; crisis management; and fraud investigation, and as first as a General Manager for I Solution Security, where he advised on security matters for the Honduran President, Minister of Security, and Minister of National Emergency Commission. Previously, Bradley led a distinguished 14-year career with the Central Intelligence Agency (CIA).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • mass notification freepik

    How to optimize critical communications in the age of COVID-19 (and beyond)

    See More
  • Cybersecurity for Travelers - Security Magazine

    The Crucial Role Prevention Plays Against 2020’s Top Business Travel Threats

    See More
  • travel-enews

    How to Keep Travel Security Education Relevant & Engaging for Employees

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!