security | No Passive Income https://nopassiveincome.com Take Action, Build Your Business! Wed, 14 Aug 2024 11:38:53 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://nopassiveincome.com/wp-content/uploads/2019/09/favicon.ico security | No Passive Income https://nopassiveincome.com 32 32 6 Tips to Help You Secure Your Business Data Today https://nopassiveincome.com/secure-business-data/ https://nopassiveincome.com/secure-business-data/#comments Thu, 10 Nov 2016 06:56:36 +0000 http://nopassiveincome.com/?p=8314 This post brought to you by Carbonite. The content and opinions expressed below are that of No Passive Income.   Nowadays, the fight of data security against cybercrime is one of the biggest challenges for the small businesses. Analysts have noted a growing number of attacks on the server side, with increasingly sophisticated threats that […]

The post 6 Tips to Help You Secure Your Business Data Today first appeared on No Passive Income.]]>
This post brought to you by Carbonite. The content and opinions expressed below are that of No Passive Income.

 

Nowadays, the fight of data security against cybercrime is one of the biggest challenges for the small businesses.

Analysts have noted a growing number of attacks on the server side, with increasingly sophisticated threats that use encryption to mask malicious activity.

According to the latest Cisco 2016 Annual Security Report, the attackers commandeering legitimate infrastructure and reaping millions in profit, while businesses are struggling to detect and combat threats.

The defender confidence in their ability to detect, defend, and recover from cyber attacks is falling, while regulators and investors are seeking more visibility into organization’s cyber risks.

Truth is that businesses fail all the time, but data should never be one of their failures. These small business stories prove that it’s possible to turn fails into sales.

Almost half of businesses (47%) declare that fear of losing data is something that keeps them up at night, and there’s good reason, because it’s likely to happen!

In 2015, 22% of companies have experienced data loss, with nearly 50% recovering less than half of their data. This is really costly for businesses.

According to IDC (International Data Corporation: The Growth Opportunity for SMB Cloud and Hybrid Business Continuity Sponsored by: Carbonite, by Raymond Boggs, Christopher Chute & Laura DuBois; April 2015), 80% of small and midsize businesses have experienced downtime in the past, with related costs ranging from $82,000 to $250,000 per event.

The researchers observed that with some simple but important measures companies could greatly improve the safety of their data.

Here are some practices to be followed.

1. Establish a Data Security Plan

Start with a plan outlining the actions to be taken in relation to the different security breach scenarios to prevent data loss.

Include policies which establish whether and how employees can access various data. This should serve as a real manual of safety rules for all the staff and what planned should strictly be applied.

For example, if a rule states that the personal devices used by employees should be password protected, do not make exceptions for anyone, not even for the boss.

Finally, the plan should be a document that changes and evolves in relation of how the business grows and expands.

2. Educate and Train Employees

Educate employees about the security risks and provide regular training on topics like the use of passwords, how to deal with incoming unsolicited emails or data backup.

As you can see from the following image (taken from this research):

actual-risk-factors-for-data-loss

Most of the actual risk factors for data loss are man-made disasters.

Make sure that employees always know who to address if an unusual or unexpected problem comes during the course of their digital workday.

And don’t forget natural disasters. They may not seem a frequent situation, but they are actually a huge potential for data disruption.

Make sure to have a disaster recovery strategy!

3. Prepare a Disaster Recovery Plan

Disaster recovery is the ability to come back to standard operations in the event of a disaster.

Think of a disaster not just as a flood destroying your offices, but also as an employee who accidentally throws some coffee on his laptop.

It may sound scary, but a disaster recovery is really important for your business. Here are some steps you can follow to set up a strategy:

  • assemble a dedicated team;
  • decide which devices you want to back up;
  • set the data you want to back up;
  • decide where you will store the data;
  • set the amount of time to get your business back and running;
  • write down your plan and test the strategies.

4. Establish a Data Storage Policy

Create and follow a policy for storing business information outlining what data should be stored and which data can be erased.

Make sure to just store essential data, because one mole of stored but not necessary data only increases the risk of security.

5. Include the Protection of Mobile Devices

The devices connected to the Internet through the company network include server, desktop and notebook PCs but also (and now increasingly) tablets and smartphones. And as mobile connectivity becomes easier, data becomes even more vulnerable when they are moving.

Most companies allow employees to download non-controlled applications on their devices, thus creating a highway for hackers to steal corporate data. Do not allow mobile devices to access the network unless they comply with corporate security policies you define. Also, be sure that the threat management incumbent on mobile devices is an integral part of the overall company security solution to increase data protection.

Other than setting a strong password, here are some other practical suggestions to increase the protection of mobile devices in your business:

  • remote wipe: thanks to this feature, a device connected to the Internet can be located right away,  if it’s stolen or misplaced. You will be able to wipe the data remotely, then;
  • updates: be sure to stay updated on those alerts. It’s suggested to set to automatically download them;
  • antivirus: use a premium software, not a free one. Make your purchases from an authorized and official app store, rather than from third party sites. Anti-virus protection is a must, especially for Android devices;
  • no jailbreaking: pay attention to not install software that breaks a device’s closed ecosystem, as it may open a gate for malware to get in. Remember, malwares can be anywhere, including an app that employees download.

6. An Approach to Safety at All Levels

Dealing with data has never been more challenging for small businesses. It’s important to keep up with digital innovation and get a protection that stay constantly updated.

Choose a package of solutions that includes defense against both external threats (viruses, intrusions, malware attacks) but also to the company’s internal threats (improper use of IT tools by employees or fraudulent subtraction of data). And, above all, trust in a security technology vendor which must be simple to install, manage and maintain.

You must always be able to easily add new users and devices, together with making changes and updates in a few minutes, including the option to manage all your security tools from a single console.

Remember, a product based on the cloud like the one offered by Carbonite enables access anytime, anywhere. Claim your 30 day free trial and protect your data today.

What do you think?

Are you running an online business?

What are you doing to increase data protection and ensure your business security?

Please share your experience in the comments below, thanks!

Visit Sponsors Site

 

The post 6 Tips to Help You Secure Your Business Data Today first appeared on No Passive Income.]]>
https://nopassiveincome.com/secure-business-data/feed/ 9
Learn About DDoS Attacks and How to Protect Your Online Business https://nopassiveincome.com/about-ddos/ https://nopassiveincome.com/about-ddos/#comments Tue, 28 Jun 2016 13:35:50 +0000 http://nopassiveincome.com/?p=7523 DDoS attacks are among the worst threats of recent years. According to research conducted by Incapsula a single attack can cost a company an average of $40,000 per hour and recent studies indicate that almost 75 percent of organizations have suffered at least one DDoS attack over the past 12 months. The threats are the so-called DDoS […]

The post Learn About DDoS Attacks and How to Protect Your Online Business first appeared on No Passive Income.]]>
DDoS attacks are among the worst threats of recent years. According to research conducted by Incapsula a single attack can cost a company an average of $40,000 per hour and recent studies indicate that almost 75 percent of organizations have suffered at least one DDoS attack over the past 12 months.

The threats are the so-called DDoS attacks, which stands for Distributed Denial-of-Service.

ddos-impact-survey-infographic-hires

 

What is a DoS Attack

To understand what is a DDoS attack, it’s necessary, first of all, to analyze the DoS attacks. Acronym for Denial-of-Service, a DoS attack is a deliberate action that aims to saturate the resources of a computer system that provides a service to the client connected to it.

In network area, a DoS attack has targets such as servers, networks distribution or data center and acts so that their client – whether they are websites or visitors- have difficulties or are unable to reach them.

 

What is a DDoS Attack

A Distributed Denial-of-Service has the same purposes (disrupt communications between two or more nodes of the network) and the same targets (servers, data centers, distribution centers, etc.) but it takes on a much larger scale.

The lines of attack are varied (distributed in the network, in fact), and the strategy used is much more effective. By sending false requests for access to online resources targeted by more than one node, you have a greater chance that the attack will successful end in a shorter timeframe.

Since a DDoS attack needs a great synchronism, it is likely to be carried out by a small number of hackers who controls one or more botnets.

DDos attack

image source

The difference between DoS and DDoS attack, therefore, lies in the number of attacks launched and in the number of “lines” exploited for the purpose: while in the first case you must defend  from a single computer traffic source (for example a large number of emails coming at the same time), in the second case the attack is carried by more botnets coordinates on several levels (for example, a high number of web accesses coordinated with a large number of FTP connection attempts).

Therefore, a DDoS attack will need to average a shorter timeframe than a DoS attack to saturate the IT resources of the attacked system and also its deleterious effects usually will last longer.

 

Characteristics of a DDoS Attack

To saturate the resources of a computer system, hackers implement DDoS attacks simultaneously sending many requests for access to the same online resource. This allows, in short time, to make inaccessible a single website, server or an entire data center.

The various types of DDoS attack can be grouped into four main categories:

  • Attacks on the TCP connection: the hacker tries to use all the available connections of the infrastructure network- a server or data center – so that it no longer reachable.
  • Volumetric attacks: the objective of this type of attack is to completely saturate the transmission band available to a computer system so as to make impossible any form of communication.
  • Fragmentation attacks: the data packets with access requests are sent in partial or incomplete, so as to lead the attack object computer system to use all of its resources – not only network but also computing – in an attempt to reconstruct the information digital receipt.
  • Application attacks: instead of attacking the whole system, it attacks only one part – a program or application – critical to the IT ecosystem functioning. In this way, it triggers a process that makes unstable the entire infrastructure.

 

Learn More About DDoS Attacks

DDosBootcamp

Incapsula has recently launched the world’s first-ever free training portal for DDoS protection.

It’s a training portal which offers a wide selection of free courses and challenging quizzes that test and improve your DDoS protection skills.

The courses cover the following topics:

  • Introduction to DDoS
  • Volumetric Attacks
  • Protocol Attacks
  • Application Level (Layer 7) Attacks
  • Reflection Attacks
  • Understanding Risks
  • Mitigation Techniques
  • DDoS Trends

The training is divided into Basic and Advanced levels so you can select the courses that best match your needs.

Get started by visiting the DDoSBootcamp here.

 

How to Defend Your Online Business Against a DDoS Attack

In the event that your online business is the subject of a DDoS attack you have very little chance to intervene. Only system administrators, in fact, will be able to mitigate the effects of an attempt to destabilize the computing environment under their control.

Various countermeasures, more or less effective, can be put in place:

Sink holing

In case of attack, this technique provides to divert all traffic to a dead end, so as to preserve the stability and full functionality of computing resources. It has the weakest point of making inaccessible the resource, either by diverting the good and bad traffic, but at least it saves the IT infrastructure – both hardware and software – from irreparable damage.

Routers and Firewalls

Before an attack hits the target, it is possible to stem the incoming traffic from non-essential protocols and invalid IP addresses by applying filters to the router and firewall. In case of more sophisticated attacks (attacks that use multiple levels of the communication protocol and at the same time many of guidelines attack), however, this technique is not very effective if not altogether useless.

Intrusion Detection Systems

Some software installed on servers and data center control systems are able to detect when the “legitimate” protocols and essential for the operation of the service are used to bring on an attack. If integrated with a firewall, it can block traffic to its malicious identified protocol and thwart the attack or at least minimize the effects.

Server

Proper configuration of the server and hosting services is one of the best antidotes to mitigate the effects of a DDoS attack. A system administrator, for example, may indicate which and how many resources can use a service like this and can respond to requests that come from the outside. In this way, in the case of an application attack, the effects would not be passed on the entire computerized system, but will simply knock out the only object of the attack software.

Overestimate Their Needs

It is, probably, the defensive technique that is most effective against a DDoS attack. Performing an overestimation of resources that will be needed in a given computer system, you will be able to cope without major problems, attacks that aim to saturate the bandwidth or processing power of a server or a data center. By utilizing a wide distribution of networks that extend into several states, for example, you will be able to survive a direct attack on one of the servers or a section of the network, simply by diverting the excess traffic to other “twin” computer servers even at great distances and not subject to attack.

 

Your Thoughts

This article introduced what are DDoS attacks and how you can improve the security and increase the protection of your online business.

Now, I’d like to hear more from you.

 

Have you ever heard of DDoS attacks?

Have you ever experienced one of them with your online business?

Please share your opinions in the comments below, thanks!

The post Learn About DDoS Attacks and How to Protect Your Online Business first appeared on No Passive Income.]]>
https://nopassiveincome.com/about-ddos/feed/ 6