{"id":80802,"date":"2023-09-29T11:10:43","date_gmt":"2023-09-29T18:10:43","guid":{"rendered":"https:\/\/honeybook.site.strattic.io\/?p=80802"},"modified":"2023-09-29T11:10:46","modified_gmt":"2023-09-29T18:10:46","slug":"cybersecurity-for-small-businesses","status":"publish","type":"post","link":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses","title":{"rendered":"Cybersecurity for small businesses: what you need to know"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><em>Take a few small steps to prevent major losses in your independent business.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2000\" height=\"1548\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg\" alt=\"Use a VPN on your phone to protect your internet traffic.\" class=\"wp-image-80804\" srcset=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg 2000w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-300x232.jpg 300w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-1024x793.jpg 1024w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-768x594.jpg 768w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-1536x1189.jpg 1536w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/><\/figure>\n\n\n\n<p>Independent businesses (you!) are the backbone of the American economy. They support local communities, provide jobs, and drive innovation. But they\u2019re also a major target for cybercriminals.&nbsp;<\/p>\n\n\n\n<p>In fact, according to a 2023 study by <a href=\"https:\/\/www.verizon.com\/business\/resources\/T749\/reports\/2023-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon<\/a>, small businesses had 30% more data breaches than large businesses. Of these, 98% of attacks had <a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/secure-online-payments\" target=\"_blank\" rel=\"noreferrer noopener\">financial motives<\/a> and most (54%) were committed using compromised credentials\u2014like passwords and usernames. That\u2019s why it\u2019s more important than ever for independents to learn about cybersecurity best practices for independent businesses to make sure they\u2019re not putting themselves at risk.\u00a0<\/p>\n\n\n\n<p><strong>Jump to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#cybersecurity-important\">Why is cybersecurity important for independent businesses?<\/a><\/li>\n\n\n\n<li><a href=\"#cyber-evolution\">How have cybersecurity best practices evolved over the years?<\/a><\/li>\n\n\n\n<li><a href=\"#common-threats\">What are the most common cybersecurity threats for small businesses?<\/a><\/li>\n\n\n\n<li><a href=\"#best-practices\">What are the most important cybersecurity tools you should use to protect yourself?<\/a><\/li>\n\n\n\n<li><a href=\"#takeaway\">The takeaway: what independents need to know<\/a><\/li>\n<\/ul>\n\n\n\n<span id=\"cybersecurity-important\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">Why are cybersecurity best practices important for small businesses?<\/h2>\n\n\n\n<p>When it comes to cybersecurity, independent businesses are particularly vulnerable. This is because they often lack the resources of larger brands and may need help to afford the latest and best cybersecurity tools and services. In fact, according to a 2021 study by <a href=\"https:\/\/upcity.com\/experts\/small-business-cybersecurity-survey\/#:~:text=Throughout%20the%20COVID-19%20pandemic,with%20little%20up-front%20preparation.\" target=\"_blank\" rel=\"noreferrer noopener\">UpCity<\/a>, only 50% of all small businesses in the U.S. actually have a cybersecurity plan in place for next year. This means that the other 50% are putting themselves at risk from cyber attackers. But why is cybersecurity so important for these kinds of organizations?<\/p>\n\n\n\n<p>The lack of adequate cyber protection can lead to data breaches which can have a significant financial impact on your business and damage its reputation in the eyes of clients and partners\u2014in most cases, the biggest hit of all.\u00a0 For example, one study found that up to 80% of consumers are likely to <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2017\/12\/08\/mind-the-trust-gap-how-companies-can-retain-customers-after-a-security-breach\/?sh=35507de56c95\" target=\"_blank\" rel=\"noreferrer noopener\">defect from a business<\/a> if their data is compromised in a breach. Data breaches can also lead to compliance issues if your business isn\u2019t meeting the required standards and regulations. Attackers may also be able to access business owners, employees, and client data which could result in <a href=\"https:\/\/www.aura.com\/learn\/what-to-do-if-your-identity-is-stolen\">identity theft<\/a> or credit card fraud\u2014all of which can be difficult to recover from financially.<\/p>\n\n\n\n<p>Lastly, another reason why independent businesses need to take cybersecurity seriously is that recent studies show that cybercriminals are increasingly <a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/97694-why-small-businesses-are-vulnerable-to-cyberattacks#:~:text=Small%20businesses%20are%20attractive%20targets,lost%20productivity%20to%20company%20reputation.\" target=\"_blank\" rel=\"noreferrer noopener\">targeting independent businesses<\/a> rather than larger corporations.\u00a0 This is because big brands are starting to take cybersecurity measures very seriously. This makes smaller firms a much easier target for cyberattacks and one that is less likely to catch the interest of federal law agencies.<\/p>\n\n\n\n<span id=\"cyber-evolution\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">How has cybersecurity evolved over the years?<\/h2>\n\n\n\n<p>These days, the threat landscape has become more complex as hackers have shifted from standard methods such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware<\/li>\n\n\n\n<li><a href=\"https:\/\/www.securitymetrics.com\/blog\/7-ways-recognize-phishing-email\">Phishing<\/a><\/li>\n\n\n\n<li>Insider attacks<\/li>\n<\/ul>\n\n\n\n<p>To more sophisticated forms of attacks, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Zero-day exploits<\/li>\n\n\n\n<li>Ransomware<\/li>\n\n\n\n<li>Distributed denial-of-service (DDoS) attacks<\/li>\n<\/ul>\n\n\n\n<p>To protect against these new threats, businesses are starting to use a much more thorough approach to cybersecurity. This includes using platforms that can <a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/business-management-system\" target=\"_blank\" rel=\"noreferrer noopener\">protect personal and client data<\/a>, like HoneyBook.<\/p>\n\n\n\n<p>organizations are focusing on preventive measures such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User and employee\/contractor education<\/li>\n\n\n\n<li>Stronger <a href=\"https:\/\/www.okta.com\/identity-101\/what-is-strong-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">authentication protocols<\/a><\/li>\n\n\n\n<li>Using antivirus software<\/li>\n\n\n\n<li>Limiting employee access to sensitive data<\/li>\n\n\n\n<li>Keeping up with the latest cybersecurity best practices for independent businesses.<\/li>\n<\/ul>\n\n\n\n<span id=\"common-threats\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">What are the most common cybersecurity threats for small businesses?<\/h2>\n\n\n\n<p>The best way to protect against cyber threats is to understand what kind of attacks you\u2019re up against. Some of the most common cybersecurity threats for independent businesses include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware. <\/strong>An umbrella term for \u201cMalicious Software.\u201d This cybersecurity threat is designed to damage or gain unauthorized access to a business\u2019s database system. Common examples include viruses, worms, trojans, and ransomware. Remember, knowing the type of malware is important as it helps you decide which cybersecurity tool you need to stay safe.<\/li>\n\n\n\n<li><strong>Phishing.<\/strong> Cybercriminals use phishing to trick victims into revealing their personal information, such as passwords or credit card numbers, usually by impersonating a legitimate organization or individual. These attacks typically take the form of emails or links sent from malicious sources. And it\u2019s increasing at an alarming rate too! According to a report by the <a href=\"https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">APWG<\/a>, phishing attacks have nearly tripled since 2020. The vast majority of phishing attacks come in the form of <a href=\"https:\/\/www.proofpoint.com\/us\/threat-reference\/clone-phishing#:~:text=Clone%20phishing%20is%20a%20newer,to%20be%20the%20original%20sender.\" target=\"_blank\" rel=\"noreferrer noopener\">clone phishing<\/a>, <a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/phishing\/spear-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">spear phishing<\/a>, and email phishing.\u00a0<\/li>\n\n\n\n<li><strong>Ransomware. <\/strong>Ransomware is a type of malware that encrypts or locks a business\u2019s files until they pay a ransom. It can be really damaging as it keeps them from accessing data and applications, leading to costly downtime and lost revenue.<\/li>\n\n\n\n<li><strong>DDoS attacks. <\/strong>A distributed denial of service (<a href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">DDoS<\/a>) attack is an attempt to make a website or online service unavailable by flooding the target with external requests. This type of attack can overwhelm even the most robust systems and cause major disruptions in business operations.<\/li>\n\n\n\n<li><strong>Insider threat. <\/strong>Insider threats can take the form of either employees with ill intent or careless users who expose the business to hackers. While these types of attacks can be difficult to prevent, businesses still need to ensure they have proper authentication protocols and employee security education in place. Security education is the best prevention for insider threats due to carelessness.<\/li>\n\n\n\n<li><strong>Zero-day attacks.<\/strong> The term \u201c<a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/zero-day-exploit\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day<\/a>\u201d refers to the fact that a threat is so newly uncovered that vendors and\/or developers may not have a solution for fixing it\u2014thus, they have zero days to solve the problem.<\/li>\n<\/ul>\n\n\n\n<span id=\"best-practices\"><\/span>\n\n\n\n<div class=\"wp-block-ugb-container ugb-container cta-pro-tip ugb-0041221 ugb-container--v2 ugb-container--design-basic ugb-main-block\"><style>.ugb-0041221-wrapper.ugb-container__wrapper{padding-top:0 !important;padding-bottom:0 !important}.ugb-0041221-wrapper > .ugb-container__side{padding-top:35px !important;padding-bottom:35px !important}@media screen and (min-width:768px){.ugb-0041221.ugb-container{padding-top:0px !important}}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-0041221-wrapper\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-0041221-content-wrapper\">\n<div class=\"wp-block-ugb-columns ugb-columns ugb-c9eef97 ugb-columns--design-plain ugb-columns--columns-2 ugb-main-block\"><style>.ugb-c9eef97 > .ugb-inner-block > .ugb-block-content > .ugb-columns__item{grid-template-columns:0.20fr 1.80fr !important}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-columns__item ugb-c9eef97-content-wrapper\">\n<div class=\"wp-block-ugb-column ugb-column ugb-381f79f ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-381f79f-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/03\/asset-4.svg\" alt=\"\" class=\"wp-image-83436\"\/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-ugb-column ugb-column ugb-97eb796 ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-97eb796-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<h4 class=\"wp-block-heading\"><strong>Pro tip<\/strong> <\/h4>\n\n\n\n<p>Cybersecurity isn&#8217;t just important because you&#8217;re protecting your assets and information. You&#8217;re protecting your customer&#8217;s information, too!<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity best practices for small businesses<\/h2>\n\n\n\n<p>Now that you have a better idea of what kind of digital threats you may face. Here are some key cybersecurity best practices for independent businesses you should keep in mind to protect your business.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Implementing multi-factor authentication<\/h4>\n\n\n\n<p>Multi-factor authentication or MFA is an excellent way to strengthen your security posture. It does this by requiring users to provide many pieces of evidence before accessing sensitive information. This commonly includes things like verifying their identity through SMS or using fingerprints.<\/p>\n\n\n\n<p>In this way, MFA adds an extra layer of security and helps prevent your business accounts from being hijacked by outsiders.&nbsp;<\/p>\n\n\n\n<p>However, it\u2019s important to note that even with MFA, you can still be a victim of cybercrime. Especially if you think your <a href=\"https:\/\/www.aura.com\/learn\/how-to-know-if-your-phone-is-hacked\">verification phone or email has been hacked<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Don\u2019t reuse or share passwords\u2014and use a password keeper\/generator app<\/h3>\n\n\n\n<p>Remembering a lot of passwords is hard, so people tend to reuse their passwords or create weak passwords. Weak passwords are easy for hackers to crack. To combat that, we recommend that you use a password management app.&nbsp;<\/p>\n\n\n\n<p>A password management app is a tool that generates strong passwords, stores them, and fetches them for you. Apps like <a href=\"https:\/\/www.1password.com\">1Password<\/a> and <a href=\"https:\/\/www.lastpass.com\">LastPass<\/a> help you generate unique, difficult-to-crack passwords for each app and then store them for you so you only need to add one password at a time.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What is a strong password?<\/h4>\n\n\n\n<p>Strong passwords contain a mix of letters, numbers, and symbols. They have no information that can relate the password back to the account holder, like full words, birthdays, addresses, etc.<\/p>\n\n\n\n<p>An example of a strong password is something like this: 289&amp;2Hdnsl&amp;!jfhsnl0. It\u2019s totally random and would take a long time and many, many permutations to guess. That\u2019s why password managers are so important\u2014they keep all of your complex passwords safe so you don\u2019t have to memorize a string of numbers and characters.<\/p>\n\n\n\n<div class=\"wp-block-ugb-container ugb-container cta-pro-tip ugb-2a359df ugb-container--v2 ugb-container--design-basic ugb-main-block\"><style>.ugb-2a359df-wrapper.ugb-container__wrapper{padding-top:0 !important;padding-bottom:0 !important}.ugb-2a359df-wrapper > .ugb-container__side{padding-top:35px !important;padding-bottom:35px !important}@media screen and (min-width:768px){.ugb-2a359df.ugb-container{padding-top:0px !important}}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-2a359df-wrapper\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-2a359df-content-wrapper\">\n<div class=\"wp-block-ugb-columns ugb-columns ugb-e25f4ab ugb-columns--design-plain ugb-columns--columns-2 ugb-main-block\"><style>.ugb-e25f4ab > .ugb-inner-block > .ugb-block-content > .ugb-columns__item{grid-template-columns:0.20fr 1.80fr !important}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-columns__item ugb-e25f4ab-content-wrapper\">\n<div class=\"wp-block-ugb-column ugb-column ugb-4815075 ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-4815075-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/03\/asset-4.svg\" alt=\"\" class=\"wp-image-83436\"\/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-ugb-column ugb-column ugb-e8e5b2f ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-e8e5b2f-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<h4 class=\"wp-block-heading\"><strong>Pro tip<\/strong> <\/h4>\n\n\n\n<p>Don\u2019t let your social media accounts fall by the wayside. Be sure you have strong passwords to <a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/social-hacking-defense\">prevent social media hacking<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Install software updates promptly<\/h3>\n\n\n\n<p>Keeping your hardware and software up to date by installing the latest updates as soon as they become available is one of the easiest ways to boost cybersecurity for independent businesses.&nbsp;<\/p>\n\n\n\n<p>This will help ensure that you have the most secure version of your business systems and applications.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Create backups regularly<\/h3>\n\n\n\n<p>You should encourage your workforce to back up important business data regularly. So if a cyberattack does occur, you will still have access to your files and documents.<\/p>\n\n\n\n<p>Remember to back up your files in different locations and keep multiple hard copies (on external hard drives or USB storage devices). If you lose your computer, you lose everything on it, so it\u2019s smart to have a hard drive backup. Cloud backups are important, too, but they can\u2019t replace hard drive backups.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Install antivirus software and use the built-in firewall<\/h3>\n\n\n\n<p>It\u2019s no secret that installing reliable antivirus software on all of your machines is one of the best ways to protect against cyber threats. These programs can detect, scan, and block most malicious software and protect you from common cyber threats.<\/p>\n\n\n\n<p>Unfortunately, most free antivirus software often offers inadequate protection. So it\u2019s usually best to invest in a premium commercial antivirus solution. Although these may be more expensive, they will likely provide you with better protection and peace of mind.<\/p>\n\n\n\n<p>You can also deploy firewalls to protect your business network for added security. These act like virtual barriers that prevent malicious software from entering your network.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Avoid clicking on unsolicited emails or text messages<\/h3>\n\n\n\n<p>Spoof emails and texts are used to collect information from victims to steal identities, funds, and more. Avoid compromising your bank account information by not clicking on texts or emails you weren\u2019t expecting.&nbsp;<\/p>\n\n\n\n<p>Check the email address and the phone number the texts and emails are coming from, then look them up and see if they\u2019re affiliated with a known spammer.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Avoid using public Wi-Fi without VPNs<\/h3>\n\n\n\n<p>Public Wi-Fi networks are known for being <a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/working-remotely-pacsafe\">insecure and prone to cyberattacks<\/a>, so it\u2019s essential to protect yourself when using them.&nbsp;<\/p>\n\n\n\n<p>If you must use public Wi-Fi, make sure to connect to it through a virtual private network (VPN), which will encrypt your data and protect it from hackers. This will help keep your data secure by encrypting all information sent and received over the network. You can also use your phone as a HotSpot to provide network connectivity to your laptop.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Create incident response plans for cyber attack scenarios<\/h3>\n\n\n\n<p>On top of that, try to create incident response plans to help your business minimize the damage caused by a cyberattack and quickly recover from it. This should include steps on identifying, containing, and mitigating the incident and who to contact for help.<\/p>\n\n\n\n<p>Having such a plan will also give management an awareness of their roles in an emergency and ensure that everyone is on the same page.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Conduct regular cybersecurity training with employees on company devices (if relevant)<\/h3>\n\n\n\n<p>According to a 2023 report by Verizon on <a href=\"https:\/\/www.verizon.com\/business\/resources\/T749\/reports\/2023-data-breach-investigations-report-dbir.pdf\">data breaches<\/a>, 74% of all breaches involve human error via stolen credentials, social engineering, or simple mistakes. This is why many experts believe that the best defense against cyber threats is an informed and trained workforce.&nbsp;<\/p>\n\n\n\n<p>Ensure that your employees and contractors know the latest cybersecurity threats and how to recognize them.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Limit employee access and establish cybersecurity guidelines<\/h3>\n\n\n\n<p>Finally, limiting employee access to sensitive data and establishing proper guidelines is also important.<\/p>\n\n\n\n<p>Make sure that your employees only have access to the information they need.&nbsp;<\/p>\n\n\n\n<p>Additionally, create cyber policies to help your team understand what is expected of them and the results of ignoring rules.<\/p>\n\n\n\n<p>This will help:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Make sure that everyone is on the same page when it comes to cybersecurity best practices<\/li>\n\n\n\n<li>Reduce the risk of potential insider threats<\/li>\n\n\n\n<li>Give you greater control over who has access to confidential information<\/li>\n<\/ul>\n\n\n\n<span id=\"takeaway\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">The takeaway: what independents need to know about cybersecurity best practices<\/h2>\n\n\n\n<p>Independent businesses are increasingly becoming targets for cybercriminals, as they represent an easy and profitable target.&nbsp;<\/p>\n\n\n\n<p>However, there are many things independent business owners can do to protect themselves and their data.&nbsp;<\/p>\n\n\n\n<p>By following the above tips, you\u2019ll be well on your way to keeping your independent business safe from digital threats.<\/p>\n\n\n\n<p>But, it\u2019s important to remember that cybersecurity is an ongoing battle. So make sure to stay up to date with the latest trends and best practices and never stop looking for ways to improve your cybersecurity posture.<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"88451\" class=\"elementor elementor-88451\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-2237b60 e-con-full cta_click e-flex e-con e-parent\" data-id=\"2237b60\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-a763669 e-con-full e-flex e-con e-child\" data-id=\"a763669\" data-element_type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-acab07b elementor-widget elementor-widget-image\" data-id=\"acab07b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"434\" height=\"434\" src=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/07\/cta-newsletter-banner.png\" class=\"attachment-medium_large size-medium_large wp-image-88454\" alt=\"\" srcset=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/07\/cta-newsletter-banner.png 434w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/07\/cta-newsletter-banner-300x300.png 300w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/07\/cta-newsletter-banner-150x150.png 150w\" sizes=\"(max-width: 434px) 100vw, 434px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-711ec11 e-con-full e-flex e-con e-child\" data-id=\"711ec11\" data-element_type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1504169 elementor-widget elementor-widget-heading\" data-id=\"1504169\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Stay updated on insights and trends \n<\/span>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c46dfc elementor-widget elementor-widget-text-editor\" data-id=\"7c46dfc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Subscribe to the HoneyBook newsletter for the latest and greatest business practices.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6939b6e click-newsletter elementor-widget elementor-widget-button\" data-id=\"6939b6e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Subscribe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>Take a few small steps to prevent major losses in your independent business. Independent businesses (you!) are the backbone of the American economy. They support local communities, provide jobs, and drive innovation. But they\u2019re also a major target for cybercriminals.&nbsp; In fact, according to a 2023 study by Verizon, small businesses had 30% more data [&hellip;]<\/p>\n","protected":false},"author":842,"featured_media":80804,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20],"tags":[475,107,387,336],"class_list":["post-80802","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-best-practices","tag-business-processes","tag-business-tips","tag-team-management","tag-workflow"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg",2000,1548,false],"thumbnail":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-150x150.jpg",150,150,true],"medium":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-300x232.jpg",300,232,true],"medium_large":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-768x594.jpg",768,594,true],"large":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-1024x793.jpg",1024,793,true],"1536x1536":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11-1536x1189.jpg",1536,1189,true],"2048x2048":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg",2000,1548,false]},"post_excerpt_stackable_v2":"<p>Take a few small steps to prevent major losses in your independent business. Independent businesses (you!) are the backbone of the American economy. They support local communities, provide jobs, and drive innovation. But they\u2019re also a major target for cybercriminals.&nbsp; In fact, according to a 2023 study by Verizon, small businesses had 30% more data breaches than large businesses. Of these, 98% of attacks had financial motives and most (54%) were committed using compromised credentials\u2014like passwords and usernames. That\u2019s why it\u2019s more important than ever for independents to learn about cybersecurity best practices for independent businesses to make sure they\u2019re&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/category\/business-best-practices\" rel=\"category tag\">Business best practices<\/a>","author_info_v2":{"name":"Irina Maltseva","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/irina-maltseva"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity For Small Businesses: 10 Tips You Need | HoneyBook<\/title>\n<meta name=\"description\" content=\"Learn about cybersecurity for small businesses, common security risks, and how to implement effective cybersecurity practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity For Small Businesses: 10 Tips You Need | HoneyBook\" \/>\n<meta property=\"og:description\" content=\"Learn about cybersecurity for small businesses, common security risks, and how to implement effective cybersecurity practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses\" \/>\n<meta property=\"og:site_name\" content=\"HoneyBook\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/honeybook.co\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-29T18:10:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-29T18:10:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Irina Maltseva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@honeybook\" \/>\n<meta name=\"twitter:site\" content=\"@honeybook\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irina Maltseva\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses\",\"name\":\"Cybersecurity For Small Businesses: 10 Tips You Need | HoneyBook\",\"isPartOf\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg\",\"datePublished\":\"2023-09-29T18:10:43+00:00\",\"dateModified\":\"2023-09-29T18:10:46+00:00\",\"author\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/ba8988d16993316e88a983904bc551b8\"},\"description\":\"Learn about cybersecurity for small businesses, common security risks, and how to implement effective cybersecurity practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#primaryimage\",\"url\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg\",\"contentUrl\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg\",\"width\":2000,\"height\":1548,\"caption\":\"Use a VPN on your phone to protect your internet traffic.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hbb.reliablepenguin.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business best practices\",\"item\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity for small businesses: what you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/\",\"name\":\"HoneyBook\",\"description\":\"Resources to empower independent business owners\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/ba8988d16993316e88a983904bc551b8\",\"name\":\"Irina Maltseva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d9758fa65af460e480898ee62f9806188a679cc06e30344d5f0c94ca24fd33b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d9758fa65af460e480898ee62f9806188a679cc06e30344d5f0c94ca24fd33b?s=96&d=mm&r=g\",\"caption\":\"Irina Maltseva\"},\"description\":\"Irina Maltseva is a Growth Lead at Aura and a Founder at ONSAAS. For the last seven years, she has been helping SaaS companies to grow their revenue with inbound marketing. At her previous company, Hunter, Irina helped 3M marketers to build business connections that matter. Now, at Aura, Irina is working on her mission to create a safer internet for everyone. To get in touch, follow her on LinkedIn.\",\"url\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/irina-maltseva\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity For Small Businesses: 10 Tips You Need | HoneyBook","description":"Learn about cybersecurity for small businesses, common security risks, and how to implement effective cybersecurity practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity For Small Businesses: 10 Tips You Need | HoneyBook","og_description":"Learn about cybersecurity for small businesses, common security risks, and how to implement effective cybersecurity practices.","og_url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses","og_site_name":"HoneyBook","article_publisher":"https:\/\/www.facebook.com\/honeybook.co","article_published_time":"2023-09-29T18:10:43+00:00","article_modified_time":"2023-09-29T18:10:46+00:00","og_image":[{"width":2000,"height":1548,"url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg","type":"image\/jpeg"}],"author":"Irina Maltseva","twitter_card":"summary_large_image","twitter_creator":"@honeybook","twitter_site":"@honeybook","twitter_misc":{"Written by":"Irina Maltseva","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses","name":"Cybersecurity For Small Businesses: 10 Tips You Need | HoneyBook","isPartOf":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#primaryimage"},"image":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#primaryimage"},"thumbnailUrl":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg","datePublished":"2023-09-29T18:10:43+00:00","dateModified":"2023-09-29T18:10:46+00:00","author":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/ba8988d16993316e88a983904bc551b8"},"description":"Learn about cybersecurity for small businesses, common security risks, and how to implement effective cybersecurity practices.","breadcrumb":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#primaryimage","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg","contentUrl":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2022\/12\/Feature-Images-11.jpg","width":2000,"height":1548,"caption":"Use a VPN on your phone to protect your internet traffic."},{"@type":"BreadcrumbList","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hbb.reliablepenguin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business best practices","item":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices"},{"@type":"ListItem","position":3,"name":"Cybersecurity for small businesses: what you need to know"}]},{"@type":"WebSite","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/","name":"HoneyBook","description":"Resources to empower independent business owners","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/ba8988d16993316e88a983904bc551b8","name":"Irina Maltseva","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d9758fa65af460e480898ee62f9806188a679cc06e30344d5f0c94ca24fd33b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d9758fa65af460e480898ee62f9806188a679cc06e30344d5f0c94ca24fd33b?s=96&d=mm&r=g","caption":"Irina Maltseva"},"description":"Irina Maltseva is a Growth Lead at Aura and a Founder at ONSAAS. For the last seven years, she has been helping SaaS companies to grow their revenue with inbound marketing. At her previous company, Hunter, Irina helped 3M marketers to build business connections that matter. Now, at Aura, Irina is working on her mission to create a safer internet for everyone. To get in touch, follow her on LinkedIn.","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/irina-maltseva"}]}},"_links":{"self":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/80802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/users\/842"}],"replies":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/comments?post=80802"}],"version-history":[{"count":0,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/80802\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media\/80804"}],"wp:attachment":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media?parent=80802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/categories?post=80802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/tags?post=80802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}