Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties


Here are some suggested Connections for you! - Log in to start networking.

Protecting Your Startup From Tech Disasters - Mikkie Mills - Blog

Protecting Your Startup From Tech Disasters

You hear about it all the time: A promising company is caught completely off-guard by a cybersecurity breach or computer crash and brought to the brink of ruin as millions of dollars go out the digital window. This is an especially grave threat for new businesses just finding their footing in an uncertain market, especially since most entrepreneurs have their minds focused on everything but tech security. Here are four simple protocols you need to keep your business safe from threats to your digital infrastructure.

  1. Have Good Threat Awareness

Whether you want to blame moral turpitude or miseducation, there's no denying that we live in an age of zero trust when it comes to cybersecurity. Unfortunately, the paranoia is justified. Business owners need to have at least a basic understanding of how their online technological infrastructure works in order to know how to protect it, yet we know this isn't happening because research continues to indicate that small businesses are seen as a soft target by hackers.

The good news is that the effort to educate business owners is ramping up, with even venerable institutions like Stanford University now offering cybersecurity courses. Take advantage of any new source of information regarding emerging online threats.

  1. Invest in Antivirus and Firewall Systems

The most basic technological security investment is also arguably the most important. A good antivirus program doesn't just block viruses but also worms and malware. Speaking of malware, firewalls are especially useful against email-based phishing attacks.

Unfortunately, people aren't installing these versatile programs on as many devices as they should, with a recent Kaspersky study from the U.K. showing that almost a third of users never even considered having antivirus software installed on their phones. Given that businesses are often managed directly from a smartphone these days, this can be a very costly oversight. Remember to update your defenses regularly, because malicious hackers are developing new tactics and tools all the time. When a new software security patch comes out, install it without delay.

  1. Back Up Your Data Often

According to the Ponemon Institute's 2018 Cost of a Data Breach study, the cost of data loss is around $148 per record breached. This can obviously be a knockout blow to a startup running on limited resources. Some of this can be mitigated by rapid data recovery and by keeping the most sensitive files off of systems connected directly to the internet.

At the very least, all important data should be backed up in multiple secure locations. This means not simply saving a backup in the cloud, but also using flash drives that can be stored away behind a physical lock and key. Don't forget the value of hardcopies, especially as the same study found that system glitches account for around 25% of data loss incidents.

  1. Train, Train, Train

The role of human error in security breaches and system failures cannot be overstated. In fact, studies show that human error is in some way responsible for over a quarter of all data loss.

Reason number one is that employees tend to lack basic security knowledge (unless they're professionals in that field). Writing down passwords, improperly disposing of documents, opening emails from unrecognized points of origin and using unsecured personal devices for business are all behaviors that let hackers in the front door.

A second reason for human error is simple failure to maintain or properly use technology in the first place. Glitches are often the result of lax maintenance and low mindfulness by users. Even something as simple as forgetting to install a surge protector can have devastating consequences. The training process needs to start at onboarding and be followed up with regular refresher courses to keep skills honed and attention focused.

There's a saying in the computer world: GIGO. That stands for garbage in, garbage out. What it means is that our technology is only as good as how we use it. Its effectiveness in making business more efficient depends entirely on our awareness level. Keeping these strategies in mind helps make sure your operation moves into the future safely.

Publish Date: March 5, 2021 6:58 PM

New 2021 Membership

About us - in 60 seconds!

Submit Event

Upcoming Events

This Expert Panel virtual event invites you to talk with Calabrio‚Äôs cloud-smart experts about how your contact center can accelerate your cloud transformation and power tangible results for your business. Insights discussed are based on Calabrio's re... Read More...

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =