{"id":11438,"date":"2020-01-30T15:01:22","date_gmt":"2020-01-30T13:01:22","guid":{"rendered":"https:\/\/www.become.co\/blog\/?p=11438"},"modified":"2020-04-02T11:43:55","modified_gmt":"2020-04-02T08:43:55","slug":"small-business-cyber-security-plan","status":"publish","type":"post","link":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/","title":{"rendered":"How to Build a Small Business Cyber Security Strategy"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">Something smells phishy\u2026<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Or is that spam? Either way, it\u2019s something to avoid &#8211; that\u2019s for sure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Okay, enough puns. In our computer-driven world, cyber threats lurk behind every click we make and every file we take. This is quite a serious subject.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wondering how you can prepare your small business against cyber attacks? Keep scrolling to find out!<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is small business cyber security?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Also referred to as small business IT security, small business cyber security is the practice of ensuring that a small business\u2019s digital network (and the data within it) is safe from threats in cyberspace.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Feeling a little doubtful that your small business will be the target of a hack-attack? We don\u2019t want to frighten you, but the <\/span><a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">stats<\/span><\/a><span style=\"font-weight: 400;\"> show that in 2018, small organizations were more likely than larger organizations to be targeted with email spam, phishing, and malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reason? Small business network security is often weaker than that of larger companies, typically because of the amount of resources being invested in developing a strong cyber security business plan. It\u2019s high time that small business owners take cyber security concerns more seriously and put more emphasis on protecting their digital networks!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Still not convinced? See what the numbers have to say about the importance of small business network security&#8230;<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why do small businesses need to invest in cyber security?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While we certainly hope you don\u2019t fall into these statistics, if you need some proof that a cyber security business plan is <\/span><i><span style=\"font-weight: 400;\">completely necessary<\/span><\/i><span style=\"font-weight: 400;\"> for the health and stability of your business, here you have it!<\/span><\/p>\n<p><b>Small business IT security stats:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In 2018, the <\/span><a href=\"https:\/\/pdf.ic3.gov\/2018_IC3Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Internet Crime Complaint Center<\/span><\/a><span style=\"font-weight: 400;\"> received over 20,000 scam complaints with losses reported of over $1.2 billion.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Small businesses make up <\/span><a href=\"https:\/\/www.nist.gov\/mep\/manufacturing-infographics\/cybersecurity-strengthens-us-manufacturers\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">58%<\/span><\/a><span style=\"font-weight: 400;\"> of all cybercrime victims.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The average cost of a small business cyber attack is roughly <\/span><a href=\"https:\/\/www.hiscox.com\/documents\/2018-Hiscox-Small-Business-Cyber-Risk-Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">$35k<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Nearly 50% of all small businesses experienced a cyber attack in the past 12 months.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.sec.gov\/news\/statement\/cybersecurity-challenges-for-small-midsize-businesses.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">60% <\/span><\/a><span style=\"font-weight: 400;\">of small businesses that experience a data breach go out of business within 6 months of the cyber attack.<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/chiefexecutive.net\/almost-90-cyber-attacks-caused-human-error-behavior\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">90%<\/span><\/a><span style=\"font-weight: 400;\"> of all cyber attacks are the result of human error within an organization.<\/span><\/li>\n<\/ul>\n<p><b>Which risks can be avoided with small business network security?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The first thing that probably comes to mind when you think about a small business cyber security breach is the financial damage it can cause. While that\u2019s definitely something to be concerned about, there are other ways that your business can be harmed as a result of a faulty or non-existent cyber security business plan.<\/span><\/p>\n<p><b>Small business IT security is important to protect:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Client personal information<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Client financial information<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Your business\u2019s bank details<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Your business plans or designs<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Other sensitive personal or business-related information<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-11047 size-full\" src=\"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/12\/GettyImages-1090870004-1.jpg\" alt=\"\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/12\/GettyImages-1090870004-1.jpg 1024w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/12\/GettyImages-1090870004-1-300x200.jpg 300w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/12\/GettyImages-1090870004-1-768x512.jpg 768w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/12\/GettyImages-1090870004-1-1200x800.jpg 1200w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/12\/GettyImages-1090870004-1-405x270.jpg 405w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><b>What are the consequences of a small business cyber security failure?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If your small business cyber security plan isn\u2019t effective at warding off hackers, the potential consequences can be devastating. Some of the damages are repairable, others not so much.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Damage to your business\u2019s reputation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">We\u2019re living in the digital age where businesses are expected to protect their own digital data, as well as that of their clients. Falling victim to a cyber attack can leave a bad mark on your business that\u2019s unlikely to be forgotten, particularly by those clients were may have been impacted.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It takes lots of time to build up a reputation of reliability, and only a short time to ruin it. Bolster your small business IT security to keep your reputation untarnished by the stain of a harmful data breach.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Financial damage as a result of theft<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Perhaps the most common concern regarding small business cyber security failures is having money stolen. Needless to say, you don\u2019t want that to happen to your business. You work hard for your money. Put some of it towards building up a strong and resilient cyber security business plan so that you can keep the rest of your funds safe from hackers!<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Interference of normal business operations<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You might catch a small business network security breach early enough to stop any real or long-lasting damage from being done. But still, you\u2019ll have to take precious time away from conducting business-as-usual to \u2018plug the holes\u2019 that allowed the cyber attack to happen in the first place.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Put a small business cyber security plan into action <\/span><i><span style=\"font-weight: 400;\">before <\/span><\/i><span style=\"font-weight: 400;\">the threat hits you, so you don\u2019t end up wasting time later on down the line. It could reduce downtime from data breaches by roughly <\/span><a href=\"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/2020-data-privacy-cybersecurity-series-jan-2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">20%<\/span><\/a><span style=\"font-weight: 400;\">!<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Costliness of clearing the threat<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Besides the financial damage and the time that you\u2019ll have to invest in preventing a future data breach, there\u2019s the cost involved in clearing an existing threat if a cyber attack is successful. Of course, even if you\u2019ve developed a cyber security business plan, there\u2019s always a chance that your business\u2019s network can be compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In that case, what\u2019s the point of having a small business cyber security plan? Well, consider this: a 2020 Cisco report showed that businesses with higher accountability had breach costs <\/span><a href=\"https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/2020-data-privacy-cybersecurity-series-jan-2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">10%<\/span><\/a><span style=\"font-weight: 400;\"> lower than businesses that were less prepared to handle a cyber attack.<\/span><\/p>\n<blockquote>\n<p><b>Small business cyber security isn\u2019t just about preventing data breaches, it\u2019s about handling them effectively in the event that they occur. If the first domino gets knocked over, you&#8217;ll want to be able to stop the chain reaction. Just think about it as part of your <\/b><a href=\"https:\/\/www.become.co\/blog\/business-disaster-recovery\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>business disaster recovery plan<\/b><\/a><b>.<\/b><\/p>\n<\/blockquote>\n<h2><span style=\"font-weight: 400;\">How to implement a small business cyber security plan<\/span><\/h2>\n<p><b>Step-by-step guide for setting up a cyber security strategy:<\/b><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Assess potential risks<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Educate employees<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Develop cyber security policies<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Back up important data<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Keep systems and software up-to-date<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Protect your Wi-Fi network<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Use antivirus software<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Enlist professional help<\/span><\/li>\n<\/ol>\n<h3><span style=\"font-weight: 400;\">1. Assess potential risks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Every business will have different cyber vulnerabilities. That\u2019s why it\u2019s key that you take the time to evaluate where your business\u2019s cyber-weaknesses are. Otherwise, it won\u2019t be clear how to best protect your small business from hackers, and you may wind up wasting time, money, and energy on building up a cyber security business plan that doesn\u2019t fit your needs.<\/span><\/p>\n<p><b>Some questions you should ask:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What sensitive data do you keep?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Where do you store your data?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Who can access that data?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">And so on<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">2. Educate employees<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Your employees have access to your network, and so they need to be trained on how to protect your business against cyber threats. There\u2019s no way around it. They may be nice people and do great work, but if they end up being responsible for your network being breached whether intentionally or not, your business will feel the hurt.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Train your employees to recognize suspicious emails, to use strong passwords on all of their work-related devices, to not log in to the business network from unsecured locations, and so on. If properly prepared, your employees can act as your first line of defense against cyber attacks.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Develop cyber security policies<\/span><\/h3>\n<p><b>The exact policies you put into place can vary, but generally, you\u2019ll want to:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Limit access and use of business devices to authorized individuals only<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Establish unique user accounts for each of your employees<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Require the use of strong passwords<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have employees lock their computers (!)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Grant administrative access only when absolutely necessary<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">4. Back up important data<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">On a normal basis, your business\u2019s important data should be backed up to an external location (or to the cloud, as it\u2019s called). That includes financial data, HR files, spreadsheets &amp; databases, designs, plans, blueprints, and so on. If done on a regular schedule, backing up your files can prove to be extremely useful when if you find yourself recovering from a data breach.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4100\" src=\"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/01\/iStock-813062006-1.jpg\" alt=\"Cyber Security Business Plan\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/01\/iStock-813062006-1.jpg 1024w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/01\/iStock-813062006-1-300x200.jpg 300w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/01\/iStock-813062006-1-768x512.jpg 768w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2019\/01\/iStock-813062006-1-405x270.jpg 405w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h3><span style=\"font-weight: 400;\">5. Keep systems and software up-to-date<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This may seem pretty basic, but instead of clicking \u2018dismiss\u2019 on that software update like you\u2019ve been doing for the past few months, take the time to let your system update. Those updates might seem like an inconvenience in terms of time, but they serve to patch those holes that hackers can potentially slip through to get into your network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The five minutes you spend letting your software update itself will seem like nothing when compared to the days or weeks it can take to recover from a cyber security breach.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">6. Protect your Wi-Fi network<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If left unprotected, your Wi-Fi network can act as a doorway that gives hackers direct access to your business\u2019s data. Considering how easy it is to secure your Wi-Fi network, and the potential damage that can result from leaving it unsecured, there\u2019s truly no reason your wireless internet shouldn\u2019t already be protected. Make sure that your Wi-Fi is password-protected, encrypted, and undiscoverable to third parties.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">7. Use antivirus software<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Software is something of an arms race. Hackers try to develop better ways to infiltrate networks, and the \u2018good guys\u2019 try to builder stronger walls of defense to keep networks safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While they may not be flawless, antivirus software can be a huge help in keeping your small business cyber security plan strong. The best antivirus software will not only detect threats, but actively eliminate them and keep all of your devices unharmed.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">8. Enlist professional help<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If you\u2019re not the most tech-savvy person, there\u2019s no need to worry. There are plenty of cyber security consultants whose services you can incorporate into your small business IT security plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It should go without saying that you should do your due diligence when hiring a small business cyber security consultant. You\u2019ll usually be better off hiring someone from a firm rather than an individual, as it could be harder to confirm the reliability of a freelancing consultant. That being said, a professional cyber security consultant from a firm could cost a pretty penny. Luckily, there are solutions for that as well.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to finance a small business security plan<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Developing and deploying a strong and effective cyber security business plan can be expensive depending on how resilient you want your defenses to be. That shouldn\u2019t stop you though, as having weak small business network security can turn out to be expensive as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What\u2019s the solution?<\/span><\/p>\n<p><a href=\"https:\/\/www.become.co\/blog\/alternative-business-funding\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Alternative business loans<\/span><\/a><span style=\"font-weight: 400;\">. Technology has opened doors to new ways for small businesses to obtain financing quicker and easier than ever before. Take <\/span><a href=\"http:\/\/www.become.co\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Become<\/span><\/a><span style=\"font-weight: 400;\">, for example. With dozens of top lenders in one <\/span><a href=\"https:\/\/www.become.co\/blog\/online-marketplace-for-business-lending\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">online lending marketplace<\/span><\/a><span style=\"font-weight: 400;\">, Become empowers small business owners with the means of matching with the optimal lender that fits their specific needs.<\/span><\/p>\n<p><b>See which types of business funding solutions are best for small business cyber security plans:<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">1. Unsecured business loan<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If your business doesn\u2019t hold many valuable assets &#8211; or if you prefer to keep them out of harm\u2019s way &#8211; then an <\/span><a href=\"https:\/\/www.become.co\/unsecured-business-loans\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">unsecured business loan<\/span><\/a><span style=\"font-weight: 400;\"> may be the right financing option for you. They don\u2019t require any collateral, which means that the risk is lower for the borrower but higher for the lender.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For that reason, unsecured business loans typically have higher interest rates than other types of business loans. But when the alternative is having a business with a vulnerable digital network, paying interest on a loan is worth the investment.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Business line of credit<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Not sure exactly how you want to design your small business cyber security plan and what costs will come along the way? Then having a flexible form of business financing will be necessary &#8211; in which case a <\/span><a href=\"https:\/\/www.become.co\/business-line-of-credit\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">business line of credit<\/span><\/a><span style=\"font-weight: 400;\"> is the solution you\u2019ll want to consider.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not only can the funds be used to pay for virtually any business-related expense, but they can be used on an as-needed basis (meaning you only pay interest on what you use). This is a great safety-net to have for your business\u2019s finances in general, not only with specific regards to small business cyber security.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Asset-based business loans<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Does your business have valuable assets that you\u2019re comfortable using as security for a loan? Then you\u2019ll want to have a look at the <\/span><a href=\"https:\/\/www.become.co\/asset-based-loan\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">asset-based business loans<\/span><\/a><span style=\"font-weight: 400;\">. Since providing collateral reduces the risk on the part of the lender, the interest rates with asset-based loans are typically lower than other forms of business financing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As attractive as the rates and terms may be, you\u2019ll still need to carefully consider how affordable the loan is for your business. You can use the <\/span><a href=\"https:\/\/www.become.co\/blog\/what-is-debt-service-coverage-ratio-dscr\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">DSCR formula<\/span><\/a><span style=\"font-weight: 400;\"> to help you make that determination.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Business equipment loans<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In some cases, you may want (or need) to update your business\u2019s hardware in order to ensure your small business network security. When that\u2019s the situation, <\/span><a href=\"https:\/\/www.become.co\/business-equipment-loans\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">business equipment loans<\/span><\/a><span style=\"font-weight: 400;\"> are the way to go.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best parts of business equipment loans is that the equipment being bought acts as its own collateral. That means these <\/span><a href=\"http:\/\/www.become.co\/business-loans\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">business loans<\/span><\/a><span style=\"font-weight: 400;\"> can help you purchase new computers &#8211; or other equipment &#8211; without putting your other valuable assets at risk.<\/span><\/p>\n<p><a href=\"http:\/\/www.become.co\/apply\/?k=blogbanner\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-11084\" src=\"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2020\/01\/Frame-7-1.jpg\" alt=\"\" width=\"1024\" height=\"329\" srcset=\"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2020\/01\/Frame-7-1.jpg 1024w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2020\/01\/Frame-7-1-300x96.jpg 300w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2020\/01\/Frame-7-1-768x246.jpg 768w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2020\/01\/Frame-7-1-1200x385.jpg 1200w, https:\/\/www.become.co\/blog\/wp-content\/uploads\/2020\/01\/Frame-7-1-604x194.jpg 604w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2><span style=\"font-weight: 400;\">Logging out<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Preparing your business for a cyber attack is not something to take lightly. The impact that a data breach can have on your business is a serious matter and requires careful thought to counteract.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use the information provided here to give your small business cyber security plan a once-over. Of course, you should also bookmark this page for future reference so that you can continue improving your small business IT security as time goes on.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The influence that digital technology has on our world is always growing, and with that influence come threats. Get your small business ready to fight back today!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A small business cyber security plan is a necessary step to your business&#8217;s survival. Learn why that is, and how to make one, here.<\/p>\n","protected":false},"author":1,"featured_media":11441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13,114,1,12],"tags":[306,201],"class_list":["post-11438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aus-resources","category-small-business-wisdom","category-uncategorized","category-us-resources","tag-customer-experience","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Build a Small Business Cyber Security Strategy - Business Funding Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Build a Small Business Cyber Security Strategy - Business Funding Blog\" \/>\n<meta property=\"og:description\" content=\"A small business cyber security plan is a necessary step to your business&#039;s survival. Learn why that is, and how to make one, here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Funding Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-30T13:01:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-02T08:43:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d2y0x0ts101nr7.cloudfront.net\/2020\/01\/Blog-cover-30-1-20-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"568\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Become\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Become\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/\"},\"author\":{\"name\":\"Become\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#\\\/schema\\\/person\\\/813104bb9784ace7d518254945f76ccf\"},\"headline\":\"How to Build a Small Business Cyber Security Strategy\",\"datePublished\":\"2020-01-30T13:01:22+00:00\",\"dateModified\":\"2020-04-02T08:43:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/\"},\"wordCount\":2260,\"publisher\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d2y0x0ts101nr7.cloudfront.net\\\/2020\\\/01\\\/Blog-cover-30-1-20-min.jpg\",\"keywords\":[\"customer experience\",\"technology\"],\"articleSection\":{\"0\":\"AUS Resources\",\"1\":\"Small Business Wisdom\",\"3\":\"US Resources\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/\",\"url\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/\",\"name\":\"How to Build a Small Business Cyber Security Strategy - Business Funding Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d2y0x0ts101nr7.cloudfront.net\\\/2020\\\/01\\\/Blog-cover-30-1-20-min.jpg\",\"datePublished\":\"2020-01-30T13:01:22+00:00\",\"dateModified\":\"2020-04-02T08:43:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d2y0x0ts101nr7.cloudfront.net\\\/2020\\\/01\\\/Blog-cover-30-1-20-min.jpg\",\"contentUrl\":\"https:\\\/\\\/d2y0x0ts101nr7.cloudfront.net\\\/2020\\\/01\\\/Blog-cover-30-1-20-min.jpg\",\"width\":1024,\"height\":568,\"caption\":\"Small Business Cyber Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/small-business-cyber-security-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.become.co\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Build a Small Business Cyber Security Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.become.co\\\/blog\\\/\",\"name\":\"Become - Powering Small Business Funding\",\"description\":\"Become - Powering Small Business Growth &amp; Funding\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#organization\"},\"alternateName\":\"Become\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.become.co\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#organization\",\"name\":\"Become\",\"url\":\"https:\\\/\\\/www.become.co\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.become.co\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/become-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.become.co\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/become-logo.png\",\"width\":521,\"height\":97,\"caption\":\"Become\"},\"image\":{\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.become.co\\\/blog\\\/#\\\/schema\\\/person\\\/813104bb9784ace7d518254945f76ccf\",\"name\":\"Become\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fe7f651e825010ea56157701c4621218ea2afee5a0650ba96e61ae728e20e667?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fe7f651e825010ea56157701c4621218ea2afee5a0650ba96e61ae728e20e667?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fe7f651e825010ea56157701c4621218ea2afee5a0650ba96e61ae728e20e667?s=96&d=mm&r=g\",\"caption\":\"Become\"},\"url\":\"https:\\\/\\\/www.become.co\\\/blog\\\/author\\\/algoseller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Build a Small Business Cyber Security Strategy - Business Funding Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/","og_locale":"en_US","og_type":"article","og_title":"How to Build a Small Business Cyber Security Strategy - Business Funding Blog","og_description":"A small business cyber security plan is a necessary step to your business's survival. Learn why that is, and how to make one, here.","og_url":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/","og_site_name":"Business Funding Blog","article_published_time":"2020-01-30T13:01:22+00:00","article_modified_time":"2020-04-02T08:43:55+00:00","og_image":[{"width":1024,"height":568,"url":"https:\/\/d2y0x0ts101nr7.cloudfront.net\/2020\/01\/Blog-cover-30-1-20-min.jpg","type":"image\/jpeg"}],"author":"Become","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Become","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#article","isPartOf":{"@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/"},"author":{"name":"Become","@id":"https:\/\/www.become.co\/blog\/#\/schema\/person\/813104bb9784ace7d518254945f76ccf"},"headline":"How to Build a Small Business Cyber Security Strategy","datePublished":"2020-01-30T13:01:22+00:00","dateModified":"2020-04-02T08:43:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/"},"wordCount":2260,"publisher":{"@id":"https:\/\/www.become.co\/blog\/#organization"},"image":{"@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/d2y0x0ts101nr7.cloudfront.net\/2020\/01\/Blog-cover-30-1-20-min.jpg","keywords":["customer experience","technology"],"articleSection":{"0":"AUS Resources","1":"Small Business Wisdom","3":"US Resources"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/","url":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/","name":"How to Build a Small Business Cyber Security Strategy - Business Funding Blog","isPartOf":{"@id":"https:\/\/www.become.co\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#primaryimage"},"image":{"@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/d2y0x0ts101nr7.cloudfront.net\/2020\/01\/Blog-cover-30-1-20-min.jpg","datePublished":"2020-01-30T13:01:22+00:00","dateModified":"2020-04-02T08:43:55+00:00","breadcrumb":{"@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#primaryimage","url":"https:\/\/d2y0x0ts101nr7.cloudfront.net\/2020\/01\/Blog-cover-30-1-20-min.jpg","contentUrl":"https:\/\/d2y0x0ts101nr7.cloudfront.net\/2020\/01\/Blog-cover-30-1-20-min.jpg","width":1024,"height":568,"caption":"Small Business Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.become.co\/blog\/small-business-cyber-security-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.become.co\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Build a Small Business Cyber Security Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.become.co\/blog\/#website","url":"https:\/\/www.become.co\/blog\/","name":"Become - Powering Small Business Funding","description":"Become - Powering Small Business Growth &amp; Funding","publisher":{"@id":"https:\/\/www.become.co\/blog\/#organization"},"alternateName":"Become","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.become.co\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.become.co\/blog\/#organization","name":"Become","url":"https:\/\/www.become.co\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.become.co\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2024\/05\/become-logo.png","contentUrl":"https:\/\/www.become.co\/blog\/wp-content\/uploads\/2024\/05\/become-logo.png","width":521,"height":97,"caption":"Become"},"image":{"@id":"https:\/\/www.become.co\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.become.co\/blog\/#\/schema\/person\/813104bb9784ace7d518254945f76ccf","name":"Become","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fe7f651e825010ea56157701c4621218ea2afee5a0650ba96e61ae728e20e667?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fe7f651e825010ea56157701c4621218ea2afee5a0650ba96e61ae728e20e667?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe7f651e825010ea56157701c4621218ea2afee5a0650ba96e61ae728e20e667?s=96&d=mm&r=g","caption":"Become"},"url":"https:\/\/www.become.co\/blog\/author\/algoseller\/"}]}},"_links":{"self":[{"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/posts\/11438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/comments?post=11438"}],"version-history":[{"count":0,"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/posts\/11438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/media\/11441"}],"wp:attachment":[{"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/media?parent=11438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/categories?post=11438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.become.co\/blog\/wp-json\/wp\/v2\/tags?post=11438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}