MenuMENU
SearchSEARCH

Don't Be the Next Victim: 5 Cybersecurity Tips to Protect Your Business

August 22, 2014
2 min to read


As high-profile security breaches continue to mount, it is becoming increasing clear that businesses can't just sit back and hope they don't become a victim, reported Fox Business.


In just the last week, grocery chain Supervalu and Community Health Systems, among others, reported data breaches that affected millions of customers and patients. Marc Malizia, chief technology officer for the managed cloud solutions provider RKON Technologies, said it is critical business bolster their efforts to thwart cybercriminals from targeting them.


Malizia said the key for small businesses is ensuring that their security is an ongoing process and not just a single event. He added that the best security consists of a layered approach.


To help small businesses take the proper steps to stay protected from hackers, Malizia offers these several tips.

  1. Perform ongoing penetration tests to secure the operating system of external-facing servers.

  2. Test for vulnerabilities that allow hackers to exploit application weaknesses. Malizia said these weaknesses give hackers the ability to escalate privileges, access security pages and compromise servers.

  3. Small businesses should install security software that monitors Web traffic and detects abnormal behavior as a way to get advanced warning of a potential attack. Malizia said this type of software identifies if keystrokes sent to a Web server are from an automated attack script and if pages are being accessed in an unusual order. Additionally, it can block access by country or location and halt attempted logins from out-of-the-ordinary locations or from unknown devices.

  4. Install adaptive authentication technologies, which is usually integrated into an application's login page, to add an additional layer of security to an application. Malizia said adaptive authentication technology monitors and authenticates online activities in real time by correlating behavioral analysis, device profiling and data feeds from fraud networks.

  5. To further block malicious traffic, small businesses should layer in application firewalls in front of external-facing Web servers.




Subscribe to Our Newsletter
No form configuration provided. Please set either Form ID or Form Script.

More Training

TrainingDecember 10, 2025

Accountable Is as Accountable Does

Auto dealerships work better when all staffers own their duties.

Read More →
TrainingNovember 26, 2025

The Power of Saying No

Agents should build this muscle to make themselves and their dealer clients strong.

Read More →
Trainingby Hannah MitchellNovember 6, 2025

Dealers Have Room to Run on Satisfaction

Survey finds it inched up this year, but consumers crave more communication

Read More →
Ad Loading...
F&Iby StaffOctober 15, 2025

The F&I Agent's Roadmap: Mastering the Cold In-Store Visit

Register for Allstate's FREE webinar on Oct. 21

Read More →
IndustrySeptember 18, 2025

Wish or Work To Success

Good, old-fashioned work ethic will get you where you want to go.

Read More →
TrainingSeptember 4, 2025

Elevated Concerns

Agents must have the ability to recognize and prepare to address high-risk compliance issues and offer solutions to dealer clients.

Read More →
Ad Loading...
F&IAugust 28, 2025

In F&I, Innovation Is Overrated

It’s what you do with your available tools that really matters.

Read More →
Product & Technologyby StaffMay 13, 2025

F&I Training Tool Updated

Reahard & Associates just released a new version of its recording and review service for F&I pros.

Read More →
TrainingMay 13, 2025

FUBAR and Risk Assessments

Three questions you can use to kick off your next (or first) risk assessment and avoid becoming a ‘FUBAR' dealership

Read More →
Ad Loading...
TrainingMay 12, 2025

Beyond Paperwork

The power of purpose-driven agency onboarding

Read More →