Impactful Cybersecurity On A Small Business Budget
Getting to best practices in security is a journey – no one gets there in a single leap. These are a few impactful cybersecurity essentials for small budgets.
These quick wins can help you protect email accounts, company computers, and restore from backup if you need to.
Watch the video and reach out to us today to get your essentials in place.
Video Transcript
## Scene 1:
**Speaker:** Zoe Tsoraklidis
Are you unsure about IT solutions for small teams like yours?
**Speaker:** Zoe Tsoraklidis
Do you worry about a small IT budget? That 5 – 10% recommendation doesn’t go very far when you are just starting out.
## Scene 2:
**Speaker:** Zoe Tsoraklidis
Still, it’s important to know that cyber threats don’t discriminate based on company size. Many are fully automated, and will breach any account or device with weak security.
Here are a few essentials to protect your team today.
## Scene 3:
**Speaker:** Zoe Tsoraklidis
Before you even look at your computers – start with your company email domain.
## Scene 4:
**Speaker:** Zoe Tsoraklidis
To increase the trust signals of your outgoing mail, and help protect from impersonation emails, you will want to tackle your DKIM, DMARC and SPF records.
## Scene 5:
**Speaker:** Zoe Tsoraklidis
Download our free guide, linked below, on how to tackle this yourself.
Or, hire your IT support company to do this. It will take an experienced technician one hour to do what is needed.
## Scene 6:
**Speaker:** Zoe Tsoraklidis
Ok, on to computers.
**Speaker:** Zoe Tsoraklidis
You will want to include every computer your company owns. Often, people think that a computer that is rarely used doesn’t need security tools. The opposite is true.
## Scene 7:
**Speaker:** Zoe Tsoraklidis
Lack of use means delayed security patches and updates, which puts the device at greater risk – not less.
## Scene 8:
**Speaker:** Zoe Tsoraklidis
For every computer, be sure to have these three things: A method to automate computer and software updates, antivirus software, and EDR tools for threat monitoring that antivirus can’t handle.
**Speaker:** Zoe Tsoraklidis
EDR will flag suspicious behaviour like mass file encryptions caused by ransomware – things antivirus can’t do.
## Scene 9:
**Speaker:** Zoe Tsoraklidis
Once you have those installed on all computers, remove admin rights from all of them.
**Speaker:** Zoe Tsoraklidis
Make it standard to remove admin rights from every new computer too.
**Speaker:** Zoe Tsoraklidis
## Scene 10:
**Speaker:** Zoe Tsoraklidis
Only one person in your office should have an admin login to install software.
**Speaker:** Zoe Tsoraklidis
Remember, malware is software too, so this one change can block multiple risks.
## Scene 11:
**Speaker:** Zoe Tsoraklidis
An IT provider can install tools to automate installation of your approved apps, so that your team doesn’t have to ask or wait each time. For a few dollars per device, you balance security with workflows.
## Scene 12:
**Speaker:** Zoe Tsoraklidis
Next is backup. Add backup of your email and cloud drives, because that is where your most important data lives. Here again, a few dollars per account protects you. Data loss isn’t always a dramatic attack. People delete stuff. Stuff happens. Get data backup and save everything.
## Scene 13:
**Speaker:** Zoe Tsoraklidis
OK, so now you have protected computers and back up of your important data.
**Speaker:** Zoe Tsoraklidis
Now it’s time for cyber security awareness training for your team. Many successful cyberattacks happen when someone clicks malware or falls victim to phishing emails. Training helps reduce the risk to your company.
## Scene 14:
**Speaker:** Zoe Tsoraklidis
Weekly or monthly micro training is more effective than a once per year course.
**Speaker:** Zoe Tsoraklidis
A training and drip email service such as Bigger Brains, Breach Secure Now, or Know Before will work well.
**Speaker:** Zoe Tsoraklidis
Here at TUCU, we include Bigger Brains subscriptions for all your staff, in our most basic computer security plan.
**Speaker:** Zoe Tsoraklidis
If you have a trusted IT partner, speak with them first, before going direct to any of the above. You will likely get a MUCH better value.
## Scene 15:
**Speaker:** Zoe Tsoraklidis
Having a trusted IT support partner on speed dial, before you need them, is wise.
**Speaker:** Zoe Tsoraklidis
Take time today to look at local IT support companies, speak with a few about their services and your needs, and sign up as a client with one.
**Speaker:** Zoe Tsoraklidis
This way, you have all the necessary discussions, service agreement, and the client onboarding and administrative work complete, so that you can access support swiftly when you need it.
## Scene 16:
**Speaker:** Zoe Tsoraklidis
Even if you don’t need hands on help often, your Managed IT services provider can bundle all the cybersecurity tools we spoke about today – and more – to protect all your computers.
**Speaker:** Zoe Tsoraklidis
They can also make it easier for you to buy new computers, onboard new users, revoke access, or deal with issues, when you need them.
## Scene 17:
**Speaker:** Zoe Tsoraklidis
Every team needs a good IT support company to lean on.
**Speaker:** Zoe Tsoraklidis
Your needs are unique. From essentials to best practices, our team at TUCU will help you as you start and grow your business.
## Scene 18:
**Speaker:** Zoe Tsoraklidis
Discover how we can help you by scheduling your free consultation. We’ll discuss your needs and give you options.
**Speaker:** Zoe Tsoraklidis
Thanks for watching, and enjoy the rest of your day.