{"id":1064,"date":"2019-03-26T06:52:49","date_gmt":"2019-03-26T06:52:49","guid":{"rendered":"https:\/\/hotlineit.com\/?p=1064"},"modified":"2019-03-27T01:53:37","modified_gmt":"2019-03-27T01:53:37","slug":"8-essential-tips-for-smes-to-protect-their-business-data","status":"publish","type":"post","link":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/","title":{"rendered":"8 essential tips for SMEs to protect their business\u2019 data"},"content":{"rendered":"\n

Is your business at risk of being hacked? Hacking and cybersecurity concerns have become so widespread-enough among small and medium-sized enterprises around Australia that an entire industry has sprung up around protecting them.<\/h3>\n\n\n\n

Australian government agency, the Australian Cyber Security Centre (ACSC), has put together a list of guidelines designed to help small and medium-sized business owners mitigate the risk of cyber security incidents. In an attempt to simplify an otherwise complex range of challenges facing SMEs today, it\u2019s been branded \u2018The Essential 8.\u2019<\/p>\n\n\n\n

These essential, fundamental guidelines have been created with the knowledge that there isn\u2019t a single \u2018magic button\u2019, or mitigation strategy, which is guaranteed to prevent cyber security incidents. Instead, it\u2019s the ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.<\/p>\n\n\n\n

Follow these important tips and take comfort in your business being better protected from online threats:<\/p>\n\n\n\n

1. Do some application \u2018whitelisting\u2019<\/h2>\n\n\n\n

This is the practice of specifying a list of approved software applications which can be active on your computer system or network. The goal of whitelisting is to protect computers and networks from potentially harmful applications and malicious programs including .exe, DLL, and scripts. Apply a process of application whitelisting and all non-approved applications (including malicious code) will be prevented from up-ending your IT system.<\/p>\n\n\n\n

2. Consider using \u2018patch applications\u2019<\/h2>\n\n\n\n

Patching, or patch management is process which involves acquiring, testing, and installing multiple code changes, or \u2018patches\u2019 to a computer system. Much like sewing a patch onto a pair of jeans to cover a hole, this process is more of a stop-gap solution. This set of changes to a software program will update, fix, or improve security vulnerabilities and other bugs. In the absence of a patch, a vulnerability in application security can be used as a way for malicious code to enter the system.<\/p>\n\n\n\n

3. Configure Microsoft Office macro settings<\/h2>\n\n\n\n

It\u2019s sometimes the case that Microsoft Office documents containing built-in macros can be dangerous. Macros are basically bits of computer code, and they have been vehicles for malware over time. Modern versions of Office contain security features to protect you from macros. By configuring the macro settings on your Microsoft Office platform to block internet macros, you\u2019ll allow solely vetted macros either in \u2018trusted locations\u2019 with limited write access or digitally signed with a trusted certificate.<\/p>\n\n\n\n

4. Do some user application \u2018hardening\u2019<\/h2>\n\n\n\n

Flash, some online ads, and Java have often been popular ways for hackers to deliver malicious code to systems. By removing or limiting the permissions of internet plug-ins and programs, you\u2019ll be adding a safeguard against these threats. Configure your web browsers to block Flash (in fact, it\u2019s best practice uninstall it entirely), as well as ads and Java on the internet. Also, disable all the Microsoft Office features you don\u2019t need; and do this with web browsers and PDF viewers, too.<\/p>\n\n\n\n

5. Restrict administrative privileges<\/h2>\n\n\n\n

Administrative privileges give the user control to make significant changes, and enable them to bypass critical security settings and access sensitive information. By restricting these privileges to a select few in your organisation, you\u2019re ensuring that the ways and means by which would-be hackers can infiltrate your system is reduced.<\/p>\n\n\n\n

6. Use patch operating systems<\/h2>\n\n\n\n

As we mentioned with the second of our Essentially 8, the patching process is also important for your operating system, as well as your applications. Weaknesses in the security of your operating systems can be used to further your systems\u2019 compromise. This is especially the case if your operating systems haven\u2019t been kept up-to-date.<\/p>\n\n\n\n

7. Make sure your system requires multi-factor authentication (MFA)<\/h2>\n\n\n\n

This is the practice or requiring two or more forms of identification to enter a system. Usually this is going to be at least two of the three key details: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is). A lot of systems use various MFAs, including having users input passwords, as well as finger print IDs, entering security keys or PINs, and tokens or one-time passcodes, sent via SMS or apps.<\/p>\n\n\n\n

8. Ensure you do daily backups<\/h2>\n\n\n\n

Backing up important new or changed data, as well as software and configuration settings, is an important IT security measure. As is making sure that you store that data in disconnected (that is, not linked) facilities for at least three months. You also need to be able to test if this data can be restored when you need it, so make sure you test this on a regular basis, as well as when IT infrastructure changes take place. You should be backing up your data at least daily, and if you process a lot of transactions in a day, even more frequently if possible.<\/p>\n\n\n\n

You shouldn\u2019t have to handle all of these processes and protocols on your own, so ensure you hire the services of an IT firm<\/strong><\/a> which can implement these sorts of security measures, so you can get back to the business of running your business, without worrying that you might be vulnerable to a cyber-attack.<\/p>\n","protected":false},"excerpt":{"rendered":"

Is your business at risk of being hacked? Hacking and cybersecurity concerns have become so widespread-enough among small and medium-sized enterprises around Australia that an entire industry has sprung up around protecting them. Australian government agency, the Australian Cyber Security Centre (ACSC), has put together a list of guidelines designed to help small and medium-sized business … Read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":1065,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[6],"tags":[20],"acf":[],"yoast_head":"\n8 Essential Tips For SMEs To Protect Their Business\u2019 Data | Hotline IT<\/title>\n<meta name=\"description\" content=\"ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Essential Tips For SMEs To Protect Their Business\u2019 Data | Hotline IT\" \/>\n<meta property=\"og:description\" content=\"ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Hotline IT\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-26T06:52:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-27T01:53:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hotline IT Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hotline IT Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/\"},\"author\":{\"name\":\"Hotline IT Staff\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c\"},\"headline\":\"8 essential tips for SMEs to protect their business\u2019 data\",\"datePublished\":\"2019-03-26T06:52:49+00:00\",\"dateModified\":\"2019-03-27T01:53:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/\"},\"wordCount\":874,\"publisher\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"IT Risks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/\",\"url\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/\",\"name\":\"8 Essential Tips For SMEs To Protect Their Business\u2019 Data | Hotline IT\",\"isPartOf\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg\",\"datePublished\":\"2019-03-26T06:52:49+00:00\",\"dateModified\":\"2019-03-27T01:53:37+00:00\",\"description\":\"ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage\",\"url\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg\",\"contentUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg\",\"width\":880,\"height\":600,\"caption\":\"protect business data\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.hotlineit.com\/#website\",\"url\":\"https:\/\/staging.hotlineit.com\/\",\"name\":\"Hotline IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.hotlineit.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.hotlineit.com\/#organization\",\"name\":\"Hotline IT\",\"url\":\"https:\/\/staging.hotlineit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg\",\"contentUrl\":\"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg\",\"width\":1,\"height\":1,\"caption\":\"Hotline IT\"},\"image\":{\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c\",\"name\":\"Hotline IT Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.hotlineit.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g\",\"caption\":\"Hotline IT Staff\"},\"url\":\"https:\/\/staging.hotlineit.com\/author\/hotline-it-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Essential Tips For SMEs To Protect Their Business\u2019 Data | Hotline IT","description":"ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"8 Essential Tips For SMEs To Protect Their Business\u2019 Data | Hotline IT","og_description":"ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.","og_url":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/","og_site_name":"Hotline IT","article_published_time":"2019-03-26T06:52:49+00:00","article_modified_time":"2019-03-27T01:53:37+00:00","og_image":[{"width":880,"height":600,"url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg","type":"image\/jpeg"}],"author":"Hotline IT Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hotline IT Staff","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#article","isPartOf":{"@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/"},"author":{"name":"Hotline IT Staff","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c"},"headline":"8 essential tips for SMEs to protect their business\u2019 data","datePublished":"2019-03-26T06:52:49+00:00","dateModified":"2019-03-27T01:53:37+00:00","mainEntityOfPage":{"@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/"},"wordCount":874,"publisher":{"@id":"https:\/\/staging.hotlineit.com\/#organization"},"image":{"@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg","keywords":["cybersecurity"],"articleSection":["IT Risks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/","url":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/","name":"8 Essential Tips For SMEs To Protect Their Business\u2019 Data | Hotline IT","isPartOf":{"@id":"https:\/\/staging.hotlineit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage"},"image":{"@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg","datePublished":"2019-03-26T06:52:49+00:00","dateModified":"2019-03-27T01:53:37+00:00","description":"ACSC\u2019s suggestion that employing these eight strategies will make it much harder for would-be hackers to compromise your system or your business\u2019 livelihood.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/8-essential-tips-for-smes-to-protect-their-business-data\/#primaryimage","url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg","contentUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2019\/03\/protect-business-data.jpg","width":880,"height":600,"caption":"protect business data"},{"@type":"WebSite","@id":"https:\/\/staging.hotlineit.com\/#website","url":"https:\/\/staging.hotlineit.com\/","name":"Hotline IT","description":"","publisher":{"@id":"https:\/\/staging.hotlineit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.hotlineit.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.hotlineit.com\/#organization","name":"Hotline IT","url":"https:\/\/staging.hotlineit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/","url":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg","contentUrl":"https:\/\/staging.hotlineit.com\/wp-content\/uploads\/2018\/10\/HotlineIT-logo-tagline.svg","width":1,"height":1,"caption":"Hotline IT"},"image":{"@id":"https:\/\/staging.hotlineit.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/60309ccdd137c6e95cb566c980a2d07c","name":"Hotline IT Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.hotlineit.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99f0492d73d3f156919f589ae7ef3c9f?s=96&d=mm&r=g","caption":"Hotline IT Staff"},"url":"https:\/\/staging.hotlineit.com\/author\/hotline-it-staff\/"}]}},"_links":{"self":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts\/1064"}],"collection":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/comments?post=1064"}],"version-history":[{"count":0,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/posts\/1064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/media\/1065"}],"wp:attachment":[{"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/media?parent=1064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/categories?post=1064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/staging.hotlineit.com\/wp-json\/wp\/v2\/tags?post=1064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}