Data Loss Prevention
Data theft can devastate a business. Fines and loss of trust are two significant consequences of data breaches. According to the National Cyber Security Alliance, 60% of small businesses close within six months of experiencing a data breach. Not surprisingly, protection of data is a top business security concern.
Cybercriminals often attack small and mid-sized businesses to launch attacks against other larger targets. In addition to their own data, most have access to partners’ computer systems and access to their valuable data and intellectual property. You might think of yourself as a small company, but there is big risk. For businesses of up to 1,000 employees the risk of a data breach is 80.2%, which is 35% higher than the risk for large organizations.
For small and mid-sized businesses, Terminal's 24x7 security and compliance operations center can continuously monitor networks for data breaches.
The service is called Security Information and Event Management, and it is part of Terminal's managed service plan.
Security Information and Event Management (SIEM)
Signs of data breaches include unusual user account activity, outbound traffic, and requests for resources, files, and data. Terminal's SIEM solution includes advanced technology for threat detection:
- Real-time attack visualization
- Rules-based attack identification
- Statistical correlation with historical data
- Elimination of false positives
- Identification of hidden threats and suspicious trends
Real-time alerts are issues for detected problems. Terminal will work to remediate malicious activity.
Reports for PCI and HIPPA compliance standards are provided.
What else should small and midsized businesses do?
Terminal recommends paying close attention to who has access to your data. Our engineers implement security policies to ensure only authorized employees access network shares and data containing sensitive information.
Avoid Shared Logins
Written company policies and training, often part of compliance requirements, are another important step. Also, Terminal recommends that offices do not share username and passwords, and can set up a separate login account for each user on the system.
When servers are configured by Terminal’s experts, policies that enforce complex passwords are used. Since passwords that are frequently changed are more likely to be written down, using a policy that requires employees to change their passwords is not recommended.
Know the privacy laws that apply to your industry. Regulations exist to enforce best practices. Terminal specializes in the compliance with the following: