Taking the right security steps for small and medium-sized businesses (SMBs). Credit: Intel “I don’t have to worry about hackers, I am a small company. Why would they care about me”? I can’t count the number of times I have heard a version of that statement. I have found that many small and medium-sized businesses (SMBs) don’t see themselves as targets.I gather that in the digital hurricane that is today’s internet, they imagine themselves as debris that are so small, no one will notice. However, as we have seen in survey after survey, cybercrime is on the rise across all industries and company sizes. Couple this with the expansion of new malware types and the growth of automated hacking tools, it has become cheaper and more accessible for cybercriminals to search for targets of opportunity.One of the reasons SMBs have more significant exposure to cybercrime is they often lack an understanding of the risks their company faces. Many are constrained by funding and feel security would significantly impact their ability to be profitable. Also, SMBs sometimes lack skilled security staff which can lead to confusion on how to implement cybersecurity controls to meet compliance with their industry regulations. Keeping all of this in mind, SMBs can reduce risk exposure to their critical data and business operations without having to incur significant costs by following these security steps.1. Understand the drivers behind cybersecurity investmentsTo begin, SMBs need to understand why they require cybersecurity and the value these services can bring to their business. Before diving into the risk frameworks, security controls, and best practices that security teams use, SMBs should first understand the drivers behind their cybersecurity requirements. Hopefully, their main driver is the frequent need to protect their growing business and its critical data, and the need is not due to a recent cyberattack or in reaction to attacks observed on other companies. Whether it is in response to past concerns or a new requirement initiated by customers or business partners, SMBs need to understand these drivers. These identified security drivers will dictate how much risk the business is willing to accept and how many cybersecurity services the company is willing to implement.2. Review your IT portfolioAfter the organization understands its needs for cybersecurity, there are initial steps that they can then begin to implement to manage their risk exposure. The first step is to review the current information technology (IT) portfolio. It is an inventory of the existing IT environment including hardware, software, network infrastructure, staff skill sets, third-party connections, remote workers or contractors, etc. The reason for this first step is to provide insight into the current technical environment so management understands the technologies in use, the business data that is critical, and the connections to partners and organizations outside the company. By the end of this step, the SMB should understand its IT environment’s current state and have gained some insight into its inherent risks. 3. Conduct a risk assessmentThe next step is for the SMB to envision their future state and to do this correctly, I suggest conducting a risk assessment. This assessment will provide them a baseline of what current security controls are working properly, controls that are immature and need remediation, and controls that don’t apply to existing business operations. The results of this assessment will provide a more in-depth view of the risks facing the business. This new risk picture will initiate discussions into business practices that need to be updated, new security technologies to be implemented and/or security services they can contract with a trusted partner.Getting a distinct picture of risk will establish the SMB’s “risk appetite.” It creates a methodology of how they will view future business efforts about technology and address any new risk requirements. Having this process in place allows an SMB to grow and be innovative with new technologies because they have a procedure to manage risk without it impacting their ability to be profitable.4. Develop a strategic cybersecurity improvement planAs mentioned previously, in establishing a risk baseline, the SMB identified business processes that need updating and security controls that were immature. These issues are a ready-made list for the business to develop a strategic plan for implementing cybersecurity. The SMB should rank these problems in priority based on the impact to business operations, their value to business stakeholders, any compliance or regulatory requirements and finally based on current funding. The development of a cybersecurity strategic improvement plan can be accomplished in parallel with the organization establishing it’s first security program and hiring their first security staff. Having this strategic plan will enable the new business’s security team to understand what security initiatives to complete first, the value the projects bring to the company, the risks that are being addressed and ongoing security controls that must be managed.There’s no denying that the number of breaches and attacks on the SMB community is growing. I believe in addressing their escalating risks, SMBs must be proactive and manage their risk exposure through doing basic cybersecurity hygiene correctly and continuously, and the steps I have provided should help them begin this process. Furthermore, some recommended resources that can assist SMBs in developing a security strategy are:Implementing Cybersecurity Guidance for Small and Medium-sized Enterprises” by ISACA“CyberSecure my Business” by National Cyber Security AllianceRemember, cybersecurity is a lifecycle that doesn’t provide value in a vacuum. For the SMB to be effective, it must approach cybersecurity as a critical business function and not be afraid to ask for assistance from the vibrant security community. Related content opinion Do you know your gap? Understanding risk exposure and security control inconsistencies is one of the most important aspects of a business’s security program. While this process may seem complicated at first glance, by following these steps, CISOs can more efficientl By Gary Hayslip Aug 23, 2018 9 mins Compliance Risk Management IT Leadership opinion Hack like a CISO Developing the security officers' processes, strategies and techniques for managing their time, resources and teams. By Gary Hayslip Jul 19, 2018 8 mins IT Skills IT Leadership Security opinion 5 simple steps for SMBs to ensure cyber resiliency While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared. By Gary Hayslip Jun 21, 2018 7 mins Small and Medium Business Disaster Recovery Data and Information Security opinion What should a cyber-resilient business look like? Cyber resiliency and the value it brings to a company and its customers will depend on how well the business incorporates its security program as a strategic partner. By Gary Hayslip May 15, 2018 5 mins Data and Information Security Network Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe