5 Steps to Cyber Security for Your Business


It’s understandable that business owners want to simplify and streamline their business whenever possible — but cyber security is one area where it’s dangerous to take shortcuts. Taking time to set up a comprehensive cyber security plan and policies will not only give you peace of mind, but ensure the future of your business. Here are some actions you can take immediately to improve the cyber security of your business:

1. Require Secure Passwords Prompt your employees to change passwords every 90 days, using a combination of capital letters, numbers, and symbols. No personal information in passwords! Encourage employees to use company passwords that are different than their personal accounts.

2. Regularly update OS and browser software There is a reason your computer keeps prompting you to download updates — it’s to keep you safe. Don’t ignore them, just download it and close security loopholes.

3. Use Two-Step Authentication Like Google’s two-step authentication, many companies use a security solution that requires employees to have a code sent to their mobile device if they try to log on to a company account from an unrecognized device.

4. Use a password or pin for your mobile phone. Companies that permit their employees to check email or access a cloud drive from their mobile device should require that those phones be password protected.

5. Secure your website and network.  Make sure your network and website are secure and protected from bugs like Heartbleed by ensuring proper SSL encryption. Your in-company network needs to be secure as well. Offer a free guest WiFi only if you’re careful.

High angle view of an anonymous African-American woman analyzing business graph on a laptop computer while sitting at restaurant desk and writing notes.

Is Your Financial Infrastructure Built for Resilience and Growth?

Excited Latin American woman at home working on her laptop and winning something online - success concepts

Easy, Easier, and Easier Still: 7 Big Updates to PEX Software

Modern technology and networking concept, woman using laptop, tablet and smartphone with virtual screen API icon Software development tool. API Application Programming Interface.

Integrate With PEX and Automate Financial Processes: How to Make Operations Simpler & More Secure

Stay up to date on the latest PEX news!

Opinions, advice, services, or other information or content expressed or contributed here by customers, users, or others, are those of the respective author(s) or contributor(s) and do not necessarily state or reflect those of The Bancorp Bank, N.A. (“Bank”). Bank is not responsible for the accuracy of any content provided by author(s) or contributor(s).