Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical Security

Cybersecurity for small businesses

By Corey Nachreiner
local business chalkboard sign

Image via Unsplash

May 22, 2023

While many SMBs mistakenly presume they’re safe from cybercriminals, they often don’t realize that even the smallest business can have valuable information, including customer information or computing resources, which are attractive to threat actors and could result in additional, significant attacks. To attackers, SMBs offer an irresistible combination of monetizable assets and minimal defenses. 

Many small businesses feel like they lack the resources to bolster their company’s security posture. In honor of National Small Business Week earlier this month, here are five simple and effective cybersecurity best practices that will help better protect businesses and their online systems.

Use stronger passwords & leverage password managers 

While authentication technologies like milti-factor authentication (MFA) are becoming more common, passwords still play a huge role in cybersecurity and strong passwords are essential. To make them even stronger, create passwords that are a minimum of 16 characters in length with alphanumeric characters, uppercase and lowercase letters and symbols; or, use long passphrases. Most importantly, passwords should be unique for every login. 

Of course, creating, remembering and using many long and complex passwords isn’t easy. It can lead to some bad practices (like using slightly altered versions of the same password across several accounts). Cybercriminals can easily guess a password based on an existing or old one, due to the accessibility of billions of stolen passwords online. Use password managers to create and utilize unique and complex passwords. This will make it easier for employees to practice good password hygiene, and make it simple to auto-generate and securely vault complex passwords (meaning employees only have to remember the master password for the vault). To stop the most frequently exploited cybersecurity weaknesses, be sure to combine strong passwords and password managers with MFA. 

Use multi-factor authentication 

Security leaders should add MFA to their corporate and web-based logins and system protocols, regardless of what size their business is. Combining multiple factors of authentication — such as facial scans or biometric fingerprints, a mobile phone or hardware key and a password — even if an attacker gains access to a password with one technique such as email phishing, they’ll have to employ a second (and sometimes third) factor of authentication to be able to take over an account. 

Historically used most by governments and large enterprises, MFA has recently become more accessible to even the smallest accounts, personal devices and businesses. Today, it’s one of the most influential and essential authentication best practices available. In fact, the latest cloud-based MFA solutions can use employees’ smartphones to authenticate, and usually don’t require specialized hardware. 

Keep devices up to date: Malicious actors are constantly searching for vulnerabilities in software and hardware that will allow them to infiltrate networks and devices, which is why regularly updating both software and hardware with the latest security updates and patches is so critical. The most recent software update could be the only defense between employees and a cybercriminal that’s trying to install malware. These security updates help block ransomware and malware entries in the software to protect a device from attacks. Be sure to keep them up to date.

Educate & train: In the face of a cyberattack, employees are an SMB’s first line of defense, so they need to be aware of the possible dangers and access points a hacker may try to break through. Employee training and education should focus on security best practices, proper protocols, prohibited actions and how to solve problems stemming from malicious or suspicious cyber activity.

Ensure employees understand the potential consequences of a breach (data loss, loss of revenue, reputational damage, etc.) and are aware of the latest risks (inputting sensitive PII or company information into a tool like ChatGPT, as one timely example. Encourage employees to not only think about it, but take it seriously. Incorporate programs that focus on employee interaction. And, most importantly, reward those who do the right things or are the most actively involved. 

Consider outsourcing security to a managed service provider (MSP): It’s often assumed that only large enterprises need to have, or can even afford to hire cybersecurity experts to protect them from cyber vulnerabilities and attacks from malicious actors. And historically, small businesses have focused their limited IT resources on everything but cybersecurity. But now more than ever, these companies need online protection just as much as the bigger organizations. While hiring full-time, in-house cybersecurity staff might not be practical, many SMBs can get enterprise-grade security by working with an MSP. 

Small businesses aren’t at any less at risk of falling victim to cyber attacks. Malicious actors know that SMBs typically don’t have a well-funded IT infrastructure or staff that is adequately trained and up to date on the latest security risks and best practices (much less dedicated IT personnel or staff with security expertise to manage things for them). It’s important to keep in mind that the size of an organization is rarely proportional to the threats it faces — whether it be malware like ransomware, data theft, phishing attacks or otherwise. Fortunately, these five simple tips will go a long way toward keeping small businesses safe and secure. 

KEYWORDS: credentials malicious software MSP multi-factor authentication SMB security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Corey nachreiner
Corey Nachreiner is the CTO of WatchGuard Technologies. A front-line cybersecurity expert for nearly two decades, Nachreiner regularly contributes to security publications, speaks internationally at leading industry trade shows like RSA and has written thousands of security alerts and educational articles for WatchGuard’s Secplicity blog. A Certified Information Systems Security Professional (CISSP), Nachreiner enjoys "modding" any technical gizmo he can get his hands on and considers himself a hacker in the old sense of the word.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber6-900px.jpg

    Security Predictions for 2020

    See More
  • Woman with luggage and laptop on beach

    Summer travel plans? Don’t get scammed while you’re away

    See More
  • CA Attorney General Releases Cybersecurity Guide for Small Businesses

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing