Forbes recently alerted entrepreneurs to data showing a record number of cyber attacks on small businesses. The 2012 report by Verizon reveals that 71 percent of the 855 data breaches examined happened to businesses with 100 or fewer employees. It also suggests that small businesses are especially vulnerable.

Is your company at risk?

As Forbes points out, even visiting legitimate websites can expose you to malware that may be used by hackers to access sensitive information. Meanwhile, unsecured company laptops and other devices, as well as tools such as WordPress blogs set up by developers, can expose you to cyber attacks.

Here are a few ways to protect your data and, as a result, your business.

  1. Use the security tools already at your disposal. PCWorld reminds small-business owners that they already have various tools to prevent cyber attacks, provided they use them. By limiting the number of employees given administrator accounts, protecting each account with a different strong password, and setting software restrictions on existing computers and networks, you can greatly reduce your vulnerabilities. The Huffington Post recommends creating a security policy and educating and monitoring employees to ensure they aren’t putting your business at risk.
  2. Choose and use a firewall. Firewalls are like home security systems for your computers. They control the data coming in and out to prevent unauthorized access to your network. The U.S. Computer Emergency Readiness Team provides a detailed guide to both hardware and software firewalls, as well as configuration settings that can be used to reduce your chances of an attack.
  3. Have a mobile device action plan. The Federal Communications Commission provides a comprehensive online resource, the Small Biz Cyber Planner 2.0, to help you create a custom cyber security plan. The FCC also offers a Cyber Security Tip Sheet [PDF] that addresses issues related to mobile devices: Its recommendations include encrypting data, installing security apps on mobile devices used to handle confidential information, instituting procedures for reporting lost or stolen equipment, and using passwords on work phones.


Read more from Intuit Small Business