Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

Become a Basic Member for free. Click Here

5 Tips for Small Business Cybersecurity - Finnegan Pierson - Blog

5 Tips for Small Business Cybersecurity

Most small business owners are not experts on cybersecurity. So, many have to learn how to protect their most important information and communication as they go. The good news for small organizations is that their needs are less complex. The not so good news is that they likely don’t have the resources of major enterprises. Nonetheless, following these five tips can help significantly.

1) Use Strong Password Rules

Gaining a user’s login credentials is one of the most common ways that people get unauthorized access to a system. One method of decrypting a password is to try numerous possible passwords based on information known about the user. For example, children’s names, birthdays and hometowns may all help inform a hacker of what a possible password may be.

....NOTE - content continues below this message


We invite you and your colleagues to join us online as we take the highest rated industry conference online - join us and the elite in the industry at the NEXT GENERATION Contact Center & Customer Engagement Best Practices Conferences!



Longer passwords are stronger. Additionally, passwords should not be shared between different systems. Implementing strong password rules can help to keep your business safe from unwanted access. Increasingly, experts suggest making memorable but strong passwords by combining four or more random words.

2) Manage Access

Often, the key to accessing a system is to find the weak link. For many small businesses, that maybe the person who has his or her password written in his or her hint, for example. While that is a problem that would need to be addressed separately, a related problem can also arise: unnecessary access. If that person has weak credentials and access to every system the company operates, there’s going to be trouble.

You can mitigate problems by managing who has access to what. Setting good access rules and policies will ensure that your information is well protected. It can contain any unauthorized access to as few of your systems and as little information as possible

3) Use Cloud Resources

Small businesses often cannot afford the IT resources of larger organizations. However, that doesn’t need to be a problem. With modern cloud solutions, even individuals can operate relatively advanced digital systems. However, these are often public cloud platforms. So, your security is managed both by you and by your provider.

Turn to public cloud security solutions to help you ensure that your cloud-based infrastructure is secure. With the right setup, you can easily compete with even the largest organizations in terms of tech just on a smaller scale. The cloud can be the ultimate tool for small businesses like yours.

4) Test Security

Penetration testing is a common practice for larger firms’ IT infrastructure. It is something that every business should practice. In short, this term refers to trying to gain access to your own systems in the same way a hacker would. It is a way to test your own security to ensure that you are not vulnerable and to fix any issues you may discover.

You can hire an outside consultant to help with this process. There are also a number of security testing techniques that anyone can apply. It can be helpful to have outside, expert help. However, keeping these testing techniques in mind can help you plan better security practices.

5) Train People

The most common vulnerability is any system is the people who use it. In many cases, it is far easier to trick a person than it is to break into a computer system. Furthermore, many small, day-to-day errors can allow someone to gain access to your IT systems. The previously mentioned example of using a password hint that includes the actual password is one way that people can make mistakes.

Train your team to know how to handle your business’ data. Not every error is as obvious and keeping your password written down publicly. Data should be saved in appropriate places. For example, customer payment information shouldn’t be kept in a Word document on someone’s desktop. Training to avoid these types of errors is essential.

Applying these basic cybersecurity tips can help to keep your business safe. Don’t wait to use them.

Publish Date: December 6, 2019 10:38 PM

Industry Champion Award Leaderboard

Submit Event

Upcoming Events

Join professionals in the CX and contact center world at our online Expo, part of the 15th annual NEXT GENERATION Contact Center & Customer Engagement Best Practices event.

Attending the EXPO is FREE to any member of our association and you can me... Read More...

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =