The Essential Guide to Cybersecurity for SMBs

The second edition has been updated with new insights and updated references.

Small- and medium-sized companies are now considered by cybercriminals to be attractive targets of opportunity because of the perception that they have minimal security. Many small companies are doing business online using new technologies they may not fully understand. Small businesses supply many larger organizations, resulting in possible connections to corporate networks that bring unforeseen risks.

With these risks in mind, we present The Essential Guide to Cybersecurity for SMBs for security professionals tasked with protecting small businesses. Small businesses can reduce their risk and protect themselves by implementing some basic security practices and accepting cybersecurity as a strategic business initiative. The essays included in this book provide both security professionals and executives of small businesses with a blueprint of best practices that will help them protect themselves and their customers.

Excerpts

Creating a Small Business Cybersecurity Program

Creating a Small Business Cybersecurity Program

This book in the CISO Desk Reference Guides® small business series is targeted toward businesses with 25 to 500 employees and limited or no technology or security staff. It provides non-technical, practical, step-by-step instructions for small business owners who need to create a cybersecurity program. The methodology is appropriate for any industry sector and customizable for the size of the business. Topics include:

♦  Incorporating a cybersecurity strategy with a business plan
♦  Incorporating cyber risk into a business risk management plan
♦  Selecting a cyber risk management methodology
♦  Introducing the cybersecurity program lifecycle
♦  Integrating privacy requirements into a cybersecurity program
♦  Ten simple steps to develop a cybersecurity program
♦  Next steps for getting started with implementing security measures

This book includes digital templates and checklists to assist the small business owner in conducting internal assessments and creating the necessary documents. Links to these online documents are given in an Appendix and provided below for your convenience.

After the first edition was published in July 2020 (incorporating the CIS Controls® version 7.1), the CIS Controls® underwent a major update to version 8, issued in May 2021. The new version emphasizes the three Implementation Groups, including an expanded Implementation Group 1 (IG1), which applies primarily to small-to-medium businesses (SMBs). Another change in v.8 is now having only 18 primary Controls, rather than 20. In addition, the book only focused on 37 Safeguards; however, IG1 started with 43 Safeguards in v.7.1. In v.8, 11 new Safeguards were added to IG1, while others were revised or merged into other Safeguards.

Chapter Summaries

Creating a Small Business Cybersecurity Program

Introduction

One of the goals of this book is to enable non-technical business owners and their employees to define and implement a workable cybersecurity program that fits within the current culture of your small business. Information technology should be a business enabler and cybersecurity should support the technology infrastructure and protect information assets, as an enabler of business risk management.

Chapter 1: The Objective is Cyber Resilience

We will be looking at this topic from three perspectives. The first is security against cyber-attacks. The second is a legal requirement for businesses to protect their data and their customers’ data, as mandated by regulations for different industry sectors. The third perspective is looking at cybersecurity for emergency management planning.

Chapter 2: Applying a Cybersecurity Risk Perspective to Your Business

Your business goals and objectives may be to produce a minimum number of widgets per year, or to have the highest customer satisfaction rating in your industry sector among regional competitors, or to achieve a minimum level of monthly revenue. In evaluating the risk levels and impacts on the business, if you are not able to achieve a certain goal or objective, a cyber risk may have the same impact as a natural disaster (flood, earthquake, fire, or tornado), because the resulting impact to the business is the same.

Chapter 3: Cybersecurity Risk Assessment Methodology

Using a standard methodology over time provides consistency in the manner assessments are conducted and provides direct comparisons with prior assessments. A standardized methodology will provide a series of steps to follow. It usually starts with planning and preparation, then conducting the assessment, and performing necessary analyses. It concludes with summarizing the results and identifying actions to be taken to lower overall risk.

Chapter 4: The Elements of a Small Business Cybersecurity Program

The intent of this chapter is to make it easy for non-technical owners or managers to incorporate these documents into an existing business plan. This chapter focuses on the documents encompassing governance and related policies and procedures. Several technical processes that can be automated during implementation will be covered in Section 5. The specific components from each category will vary from business to business, just as there are differences between a small restaurant, a dry cleaner, or an automotive repair shop.

Chapter 5: Cybersecurity Lifecycles – Processes not Destinations

The security functions lifecycle can be applied to individual assets or control measures, groups of assets or control measures, and overall assets and security measures. It’s often easier to keep the groupings small – maybe ten related assets – to make the process more manageable.

Chapter 6: Incorporating Privacy Requirements into Cybersecurity

In the same way that cybersecurity measures should enable secure business operations; they should also enable consumer privacy through secure data management. Do you, as a small business, need to be concerned about consumer privacy rights, even if there might be an exception in one of the laws? Yes, you should be concerned about the personal information you collect from customers since that data will make you a target for cybercriminals.

Chapter 7: The Small Business Cybersecurity Strategy

Depending on your particular small business and the skill sets of your employees and their involvement with designing processes and procedures, it might be beneficial to create employee teams to work on creating draft versions of certain sections of the strategy and program documents. For example, one team might develop the cybersecurity awareness and training program, while another team works on the BC/DR plans, and a third team creates the incident response procedures. It will be an important factor in the successful implementation of the cybersecurity program to have employee acceptance and support.

Chapter 8: Defining the Strategy, Policy, and Standards

The cybersecurity program includes people (roles and responsibilities), processes (policies, procedures, standards, and guidelines), and technologies (security controls), aligned with and supporting business operations and functions.

Chapter 9: Building Your Plan and Selecting Your Controls

Using an “All Hazards” perspective for emergency management planning, you should include known cyber risks along with other natural or man-made disasters. The risks and respective actions to be taken should be part of the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP).

Chapter 10: The Key CIS Sub-Controls for Small Businesses

Now comes the hard work – putting into practice the security policies and procedures you created. This section of the chapter will help you implement simple control measures that are primarily procedural and take little if any technical knowledge or expertise.

Chapter 11: Implementing Administrative and Configuration Controls

Now that you have created a basic foundation for cybersecurity through your governance program and implementing some of the key Sub-Controls in Chapter 12, we can continue with more detailed instructions. You will find duplication of some Sub-Controls in this section because we will be automating several tasks that were implemented manually in the previous chapter.

Chapter 12: Implementing User Controls and Training

Social engineering is one of the most common tactics used in cyber-attacks. Tricking a person into revealing login credentials or releasing other sensitive information is easier than trying to forcefully hack into a computer system. Social engineering consists of criminals using various combinations of tactics, techniques, and methods.

Chapter 13: Implementing Incident and Breach Controls

You should have one primary point of contact who will be in charge of managing incident response. Also, designate an alternate person, in case the primary person is not available or able to perform the necessary duties. These should ideally be management-level employees who provide guidance to other staff who are performing the necessary response tasks.

Appendix C: Incorporating Cybersecurity Risks into a Business Risk Management Plan

From a broad perspective, there are two main categories of risk – internal and external. Internal risk factors are those over which a company has more control. These include financial risk, workforce risk, operational risk, and most cybersecurity risk. External risk factors are generally outside of the control of a business, requiring more of a reactionary stance. For example, these might include regulatory compliance, environmental conditions, national and global economics, availability of raw materials, and certain internet cybersecurity risks.

 

Supplemental Materials

The following supplemental materials are available to download, including the version 8 addendum (August 2022) and basic templates for most of the governance documents described in the book. The templates are provided “AS-IS” without any warranty. These templates were last updated during July 2022.

Protect Your Business and Protect Your Practice

Though it takes years of training to becomes a cybersecurity professional, anyone can take the prudent steps that make themselves and their company more secure. The eight chapters in these books teach you the basics. These books use plain language to tell you how to become more secure. It’s not rocket science, but it does take discipline. That makes sense, right? If it was easy to be cybersecure by buying a product or a service, we’d all be secure by now. Every chapter comes with prudent steps you can take right away to be more secure. It tells you want you must do, and each chapter provides “Pro Steps” so you can take it to the next level.

Protect Your Business is written for small business owners and covers the unique security issues affecting small businesses.

Protect your Practice offers additional advice addressing special circumstances pertaining to clients and patients, including extra data privacy concerns and compliance.

Table of Contents

Section 1: Securing Your Business

Chapter 1 – Lock It Up

The first step is to control access to the business. Gangs and organized crime have moved into cybercrime, but they still look for opportunities for the easy score. Learning about physical security helps protect you and your business or practice and gets you started on the path to digital security.

Chapter 2 – Cyber Awareness

Next we move on to some basic cyber awareness. We describe phishing, proper cyber-hygiene at the high-level and discuss industries (those that take credit cards, those that provide healthcare services) that have specific rules.

Chapter 3 – Protecting Your Network

We keep it simple and talk about Anti-virus/Anti-Malware software, network, routers and firewalls, WiFi basics, VPNs, and performing regular updates. Taking regular backups is a critical step. We address onsite and offsite backups and how you protect your business from mistakes, losing files due to server or disk failure, and from ransomware.

Chapter 4 – Passwords

The we have the password conversation. It’s not about fancy mnemonic techniques to create uncrackable passwords. We’ll teach you how to create and manage good strong passwords.

Chapter 5 – Access Management

Next we tackle three more technical issues. We start with access, and talk about specific access by function, giving access to employees that is not all powerful and knowing when and how to use virtual private networks (VPNs) and multi-factor authentication (MFA).

Section 2: Securing Your Brand

Chapter 6 – Web and Social Media Security

The small business/practice owner’s web presence has changed a lot over the years. We’ll discuss the basic procedures that are needed. Social media is more than just Facebook and Twitter. We talk about the key services you need to worry about and the importance of managing your online reputation.

Chapter 7 – Data Privacy

In this chapter we discuss the requirements that small businesses and practices have for handling credit card data, financial information, and medical records. We explain your basic requirements in both books, and in Protect Your Practice, we do a deeper dive that includes how to comply and keep your clients’ and patients’ data safe.

Chapter 8 – Cyber Insurance

This is a great time to talk about the insurance policy, what you should look for, what it covers and what it doesn’t and how to work with carriers to be an acceptable customer. Verifying riders and terms and conditions.