Business News Daily provides resources, advice and product reviews to drive business growth. Our mission is to equip business owners with the knowledge and confidence to make informed decisions. As part of that, we recommend products and services for their success.
We collaborate with business-to-business vendors, connecting them with potential buyers. In some cases, we earn commissions when sales are made through our referrals. These financial relationships support our content but do not dictate our recommendations. Our editorial team independently evaluates products based on thousands of hours of research. We are committed to providing trustworthy advice for businesses. Learn more about our full process and see who our partners are here.
Data breaches can be catastrophic for small businesses. Here's how to protect your company against data breaches and mitigate the damage.
Data breaches can happen to any business, no matter their size, so it’s crucial to be prepared in case one affects your company. Businesses typically do what they can to protect operations, including ensuring that employees are properly trained, securing adequate and appropriate insurance coverage, and updating and securing all IT systems.
Still, even the best preparations can’t completely prevent all data breaches, and even vigilant businesses may fall victim to an attack. If that happens to your company, it’s important to act quickly. Remember not to panic, and follow this guide to mitigate the damage a data breach can cause.
A data breach is a security incident in which an unauthorized entity obtains access to private information without permission. A data breach can be caused by a deliberate hacker attack, a malware infection or computer virus, a stolen device, or an inadvertent leak by someone in your organization. Bad actors can target confidential data about your business, employees or customers.
Businesses that don’t use data security software and organizations without robust security practices are at particular risk for data breaches. However, they can happen to any business — and when they do, the company must understand its legal obligations, take steps to contain the breach, and get its systems secure and up and running as quickly as possible.
If you think a data breach has occurred, it’s important to act immediately. As with any business disaster plan, you should have basic procedures in place for handling a breach and be ready to implement it as soon as you see signs of trouble. Discuss the plan ahead of time with employees so they’re ready to do their part if the worst happens.
Take the following steps to contain and mitigate harm from a small business data breach:
While data breaches at massive corporations grab the media spotlight, they also happen at small businesses — and the costs of a cyberattack at this level can be financially devastating.
According to Jeff Kosc, a partner with the law firm Taft, businesses affected by data breaches face monumental hard and soft costs.
Businesses that experience a data breach face significant hard costs from several sources.
Data breaches are also costly in subtle ways, including the following:
Cyber insurance and data breach insurance are types of business insurance that can help cover some of the losses that businesses incur in a data breach. Cyber insurance and data breach insurance are similar and often referred to interchangeably. However, only cyber insurance pays for legal defense and settlement costs, and data breach insurance also covers information that wasn’t stolen from a computer or other device.
According to Lynn Kennedy, senior vice president for small commercial sales and distribution at The Hartford, this coverage has two primary components:
To begin repairing your business’s reputation and rebuilding trust after a data breach, it’s important to be transparent, proactive and willing to accept responsibility. “I am a big believer in, it’s not if bad things happen, but how you react when bad things happen,” Pelgrin noted. “That shows the quality of the company and … the individuals that work for that company.”
According to Pelgrin, the last thing your business wants is for news of the breach to get out six months after it occurred and have customers think you did nothing to help or protect them. At that point, “You’re in a position of trying to justify why you held on to that information,” Pelgrin said.
Alert customers as soon as you have concrete information on the breach. “You don’t want to put fear into people,” Pelgrin said. “You really need to know what happened so when you give the information, it is very clear [that] ‘This is what we know, this is what happened, and this is what we recommend to mitigate it.'”
Small businesses often make the mistake of thinking cybercriminals aren’t interested in them. “We tend to think that it won’t happen to us because we are too small and that they are really looking at the larger [companies], and that’s not the case,” Pelgrin cautioned. “Everyone is under constant attack at this point.”
While there are no guarantees you’ll avoid a data breach, you can take several proactive measures to reduce their likelihood and protect customers’ data.
Before you can protect your business, you must know exactly what systems and applications you have. Take inventory of your hardware and software, including their versions. You may discover a security vulnerability for a particular application or tool.
Ask yourself, “What are your assets? What does your infrastructure look like? What does your network look like?” Pelgrin said. “There may be a known vulnerability, and you might not even think it is within your infrastructure, and unbeknownst to you, it may be totally enabled throughout your infrastructure and therefore making you very vulnerable to an attack.”
Part of securing your devices from hackers is bringing your hardware, software and network to the highest possible security level. Small businesses often don’t realize the latest security measures aren’t installed when they buy new hardware and software. IT personnel must carefully evaluate each new piece of equipment and software and ensure that the latest security patches are downloaded. Additionally, Pelgrin recommended utilizing the highest security settings possible without hindering operations.
Businesses must control employees’ access to the company’s network and data. Pelgrin said employees shouldn’t have access to higher levels of administration than they need and shouldn’t be allowed to download applications or programs without authorization.
“Most of your employees should not have complete administrative access to their machines,” Pelgrin said. “That administrative access should be limited to very few trusted individuals.”
Businesses must ensure their vendors have stringent security standards. Pelgrin advised asking all vendors and outsourcing partners for documentation that outlines precisely what security measures they have in place. “It needs to meet the standards of what you would employ internally,” Pelgrin said.
Train employees to be aware of their systems and to note when they don’t act and perform correctly. “You don’t have to be a cyber expert to know something is wrong,” Pelgrin said. “Your gut is a great first sign that something may be wrong, and then you need to reach out to those that have the expertise to help diagnose whether, in fact, you have been a victim of a cyber incident.”
Pelgrin also recommended monthly cybersecurity training for employees to be aware of their actions and avoid inadvertently contributing to leaks. Teaching them about strong passwords and ways to recognize phishing attacks can help protect the company. “You want to make it real for employees, and the only way to do that is to talk about it and practice it,” Pelgrin said.
Kosc said hiring a dedicated staff member who is responsible for security, such as a skilled IT manager, is a vital step in keeping business data safe. “It needs to be something that is on someone’s mind every day because that’s their job,” Kosc said.
No company is immune to data breaches these days. While you can’t completely prevent network security threats and vulnerabilities, businesses should have a clear strategy for recognizing and dealing with cyber intrusions. “You want to have a plan in place before something like this happens, so when an event does happen, you know what to do and how to limit liability as much as possible,” Kosc said.
Part of that plan is knowing whom to call for help. You don’t want to waste time trying to determine where you can find assistance in a crisis. “You want to have those relationships upfront and in place,” Pelgrin said. Then, if you see signs of a breach, you can put your plan into action and begin mitigating the damage and getting back to normal.
Leah Zitter contributed to this article. Source interviews were conducted for a previous version of this article.