{"id":6454,"date":"2019-08-06T11:14:08","date_gmt":"2019-08-06T16:14:08","guid":{"rendered":"https:\/\/www.figmarketing.com\/blog\/?p=6454"},"modified":"2021-10-13T08:50:32","modified_gmt":"2021-10-13T13:50:32","slug":"10-cybersecurity-tips-for-small-business-owners","status":"publish","type":"post","link":"https:\/\/www.figmarketing.com\/blog\/10-cybersecurity-tips-for-small-business-owners\/","title":{"rendered":"10 Cybersecurity Tips for Small Business Owners"},"content":{"rendered":"\n<p>Small financial business owners might think they&#8217;re less susceptible to cyberattacks than larger corporations. But the truth is, that isn&#8217;t the truth.<\/p>\n\n\n\n<p>For financial professionals, going online without the proper safeguards to protect your personal, business, and financial information is like going to the bank and giving your wallet to a stranger.<\/p>\n\n\n\n<p>It\u2019s just not a good idea.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>With more transactions handled online each day, it\u2019s important to stay vigilant and protect your account information. Cybercriminals everywhere seek to steal your sensitive information for their financial gain. <\/p>\n\n\n\n<p>With that in mind, here are ten actionable tips to keep your online business activities safe and secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Consider Two-Factor Authentication <\/h3>\n\n\n\n<p>By now, you probably know to have unique passwords for different sites, and to stay away from \u201ceasy guess\u201d passwords. These include your birthday, spouse\u2019s name, mailing address\u2014you get the idea.<\/p>\n\n\n\n<p>So, naturally, let\u2019s take it to the next step: <a rel=\"noreferrer noopener\" aria-label=\"two-factor authentication (2FA) (opens in a new tab)\" href=\"https:\/\/www.investopedia.com\/terms\/t\/twofactor-authentication-2fa.asp\" target=\"_blank\"><strong>two-factor authentication (2FA)<\/strong><\/a>.<br><br>2FA is usually generated by a text message or a special smartphone app such as <strong><a rel=\"noreferrer noopener\" aria-label=\"Google Authenticator (opens in a new tab)\" href=\"https:\/\/www.google.com\/landing\/2step\/\" target=\"_blank\">Google Authenticator<\/a><\/strong>, <strong><a rel=\"noreferrer noopener\" aria-label=\"Authy (opens in a new tab)\" href=\"https:\/\/authy.com\/\" target=\"_blank\">Authy<\/a><\/strong>, or <a rel=\"noreferrer noopener\" aria-label=\"LastPass Authenticator (opens in a new tab)\" href=\"https:\/\/lastpass.com\/auth\/\" target=\"_blank\"><strong>LastPass Authenticator<\/strong><\/a>. Once you download an authenticator app, simply link your accounts. The app constantly displays a rotating set of codes that you can use whenever needed. It\u2019s a reliable way of verifying that it\u2019s actually you logging into your account. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Check Your Links &amp; URLs<\/h3>\n\n\n\n<p>Always check the URL of the site you\u2019re browsing. If it starts with <strong>\u201chttp:\/\/\u201d<\/strong> and <em>not <\/em><strong>\u201chttps:\/\/\u201d<\/strong>  that means it\u2019s not a secure site. You could be opening yourself up to fraudulent activity.<\/p>\n\n\n\n<p>Be sure to hover over links\u2014especially in emails\u2014to make sure they aren\u2019t \u201ccloned\u201d or \u201cdummy\u201d websites. These links seem to stem from a legitimate website, but a character or two don\u2019t match the correct web address. Here are two examples of a real website and a fraudulent version. <\/p>\n\n\n\n<ul><li><strong>Real website: <\/strong><a href=\"https:\/\/www.google.com\"><strong>https:\/\/www.google.com<\/strong><\/a><\/li><li>Fake website: http:\/\/www.go0g1e.com <br> <\/li><li><strong>Real website: <\/strong><a href=\"https:\/\/www.bankofamerica.com\"><strong>https:\/\/www.bankofamerica.com<\/strong><\/a><\/li><li>Fake website: http:\/\/www1.bankamerica.com <\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"> 3. Run a Clean Machine<\/h3>\n\n\n\n<p>Always keep your devices up to date on the latest software. Many of us refuse to update software for days or even weeks. But with each click of the \u201cRemind Me Later\u201d button, hackers gain more time to access your device. These updates include, but aren\u2019t limited to: <\/p>\n\n\n\n<ul><li> Operating systems <\/li><li> Security and anti-virus software <\/li><li> Web browsers <\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Related: <a href=\"https:\/\/www.figmarketing.com\/blog\/cybersecurity-tips-protecting-client-data\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Cybersecurity: Tips for Protecting Client Data (opens in a new tab)\">Cybersecurity: Tips for Protecting Client Data<\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\">4. Use Secure Networks<\/h3>\n\n\n\n<p>Does the allure of free Wi-Fi tempt you? It sure seems like a nice perk. But these often-unsecured networks found at coffee shops, fast food joints, and airport terminals can be a cybercriminal\u2019s paradise. <\/p>\n\n\n\n<p>An experienced hacker can gain your sensitive information such as your banking credentials over these unsecured networks. Unless you can opt-in to a secure network, you\u2019re better off using your mobile data. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Check Accounts Regularly<\/h3>\n\n\n\n<p>Do you still check your credit card statements on a paper bill sent out? There\u2019s a good chance you don\u2019t. The mobile financial tools we\u2019ve grown accustomed to are great on the run, but they also make us lazy in checking our day-to-day account activity. <\/p>\n\n\n\n<p>Check your account activity on a weekly\u2014if not daily\u2014basis. Set auto-notifications in your financial apps to monitor your banking and credit card activity in real-time. These steps give you the ability to spot a fraudulent charge right away. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Use Reputable Mobile Apps<\/h3>\n\n\n\n<p>There are many financial apps that help with saving, budgeting, billing, and more. But before you install, be sure to check their security protocols. Any reputable banking or financial app should have their security information readily available to read. <\/p>\n\n\n\n<p>Be sure to read the reviews, too. If users are reporting security problems, you shouldn\u2019t download it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Reduce Your Spam<\/h3>\n\n\n\n<p>We get so many emails in our inbox. And some will be illegitimate regardless of how professional they look at first glance. These are called \u201cphishing\u201d attempts. <\/p>\n\n\n\n<p>To reduce your chances of receiving these fraudulent emails, simply don\u2019t respond to them. When you reply to a message, you show the sender that your email address is indeed active. This inevitably leads to more spam and phishing attempts.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Related: <a href=\"https:\/\/www.figmarketing.com\/blog\/the-future-that-is-now-the-impact-of-technology-aging-economic-disparity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"The Future That is Now: The Impact of Technology, Aging, &amp; Economic Disparity (opens in a new tab)\">The Future That is Now: The Impact of Technology, Aging, &amp; Economic Disparity<\/a><\/h4>\n\n\n\n<h3 class=\"wp-block-heading\">8. In Doubt? Don&#8217;t Click.<\/h3>\n\n\n\n<p>If you get messages in your email inbox or on social media sites that look suspicious or are from someone you don\u2019t know, permanently delete them. <br><br>A popular scam is for someone to message you saying they have an &#8220;important business document&#8221; for you to sign. Without second-guessing, you could click the link to be directed to the document. Unfortunately, at this point, your data may already be compromised. <\/p>\n\n\n\n<p>It&#8217;s imperative to only click on links in emails from people you personally know. Never provide personal or business information to anyone who requests it online unless it\u2019s a 100% verified source. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Password-Protect Your Mobile Device<\/h3>\n\n\n\n<p>Perhaps it\u2019s annoying to unlock your device with a password, code, or fingerprint every time you open it. That\u2019s nothing compared to misplacing it and your information winding up in the wrong hands. <\/p>\n\n\n\n<p>Play it safe by protecting your mobile device and all the sensitive information that it holds. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Link Accounts to Credit Cards<\/h3>\n\n\n\n<p>Don&#8217;t link your online accounts with your business&#8217;s bank account or debit card. Instead, try using your business credit card information. The added layers of protection make a credit card safer to use online. Plus, if a fraudulent charge occurs, your bank account isn\u2019t impacted. <br> <br>Credit cards also tend to have easier and more efficient dispute systems, so you can report bogus charges easier and get the charge quickly removed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Final Thoughts<\/h3>\n\n\n\n<p>For today&#8217;s financial professional, cybersecurity is no joke. It&#8217;s important to prepare yourself to thwart attacks that are detrimental to your business. And frankly, it&#8217;s irresponsible with all the client data you store. <\/p>\n\n\n\n<p>Along with the proper cybersecurity software, these tips can keep you and your clients&#8217; information secure.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Keep Reading: <a href=\"https:\/\/www.figmarketing.com\/blog\/electronic-application-options-save-time-and-money\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Electronic Application Options: Save Time and Money (opens in a new tab)\">Electronic Application Options: Save Time and Money<\/a><\/h4>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.figmarketing.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"150\" height=\"152\" src=\"https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2021\/02\/FIG-Logo-Red-Triangle.png\" alt=\"financial independence group logo\" class=\"wp-image-8736\"\/><\/a><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Small financial business owners might think they&#8217;re less susceptible to cyberattacks than larger corporations. But the truth is, that isn&#8217;t the truth. For financial professionals, going online without the proper safeguards to&hellip;<\/p>\n","protected":false},"author":57,"featured_media":6455,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[364],"tags":[250,345,374,350,117],"acf":[],"_links":{"self":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/6454"}],"collection":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/comments?post=6454"}],"version-history":[{"count":72,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/6454\/revisions"}],"predecessor-version":[{"id":9815,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/6454\/revisions\/9815"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/media\/6455"}],"wp:attachment":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/media?parent=6454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/categories?post=6454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/tags?post=6454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}