{"id":21629,"date":"2020-07-27T08:17:15","date_gmt":"2020-07-27T12:17:15","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/top5-checkpoints-for-smb\/21629\/"},"modified":"2020-07-27T18:20:19","modified_gmt":"2020-07-27T12:50:19","slug":"top5-checkpoints-for-smb","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/top5-checkpoints-for-smb\/21629\/","title":{"rendered":"Five regular checks for SMBs"},"content":{"rendered":"<p>It is not always economically viable for small and medium-size businesses to maintain a dedicated IT security team, so it often happens that one person is in charge of monitoring the entire infrastructure. Sometimes he or she is not even a permanent, full-time employee.<\/p>\n<p>Sure, a good administrator can do a lot, but even a pro might miss something, particularly if issues are mounting and time is short. So, it\u2019s worth establishing a few habits. Here are our Top 5 regular checks.<\/p>\n<h2>Renew the corporate site security certificate<\/h2>\n<p>Any website that requests or processes user data must have an SSL certificate. It protects information entered by visitors from being intercepted, and almost all modern browsers <a href=\"https:\/\/www.blog.google\/products\/chrome\/milestone-chrome-security-marking-http-not-secure\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">warn<\/a> users that sites without an SSL certificate are insecure. That can scare off potential customers.<\/p>\n<p>Your website most likely has an SSL certificate, but its validity period is limited. Depending on the certification authority, it will need to be reissued every three, six, or twelve months. Therefore, we recommend setting a reminder in your calendar about certificate renewal.<\/p>\n<h2>Update router firmware<\/h2>\n<p>The older the software, the more likely it is to contain vulnerabilities, so it\u2019s critical to keep all software up to date. Workstation operating systems and applications themselves usually notify users when updates become available to install. But if you\u2019re still worried about missing an important patch, use <a href=\"https:\/\/www.kaspersky.co.in\/small-to-medium-business-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">our corporate products<\/a>, which contain an entire subsystem for tracking fresh vulnerabilities and fixes for them.<\/p>\n<p>That said, it is not only employees\u2019 computers that need updates. Routers also have built-in software\u00a0\u2014 firmware \u2014 which over time likewise becomes outdated and vulnerable. Cybercriminals can then <a href=\"https:\/\/www.kaspersky.com\/blog\/web-sas-2018-apt-announcement-2\/21514\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">exploit<\/a> the old firmware to infiltrate the corporate network. Unlike software on workstations, SOHO routers generally do not send notifications when the firmware is out of date, so updates have to be done manually.<\/p>\n<p>Therefore, it\u2019s important to inventory all corporate network equipment, and at least every couple of months check the administration console to see if a new version of the router firmware has appeared. If the console has no function to check for updates, you need to do it yourself on the manufacturer\u2019s website. And if some devices are outdated and no longer supported, you should think about replacing them; vulnerabilities in such models will remain unpatched forever.<\/p>\n<h2>Revoke unnecessary rights<\/h2>\n<p>A dismissed employee can cause all kinds of trouble if their accounts and access to the corporate network are not closed in time. <a href=\"https:\/\/www.kaspersky.com\/blog\/ex-employees-cyberrevenge\/25393\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Cyberrevenge against former employers<\/a> is real. To avoid a similar situation, make it a rule to revoke all access rights immediately after dismissal.<\/p>\n<p>In addition, regularly audit all accounts and their permissions. It can happen that a person remains in the company but moves, say, to another department, where they no longer need some access rights but no one remembered to revoke them. Any unnecessary privileges can prove costly in the event of a cyberattack.<\/p>\n<h2>Back up<\/h2>\n<p>Backing up your data helps <a href=\"https:\/\/www.kaspersky.com\/blog\/smb-backups-reasons\/36322\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">protect<\/a> it from <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/wiper\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">wipers<\/a>, ransomware, careless employees, and other hazards. You can back up manually, but it\u2019s better to schedule an automatic backup so as not to clutter your calendar with reminders.<\/p>\n<p>That said, even if your company\u2019s backups are automated, you should periodically check your data storage. Are the backup programs running smoothly? Is the storage address correct, or did someone sneakily change it? Do you have enough space for all of the data? Are the storage devices acting up? Modern data storage devices use S.M.A.R.T. technology to diagnose their own problems and predict how long they will survive. The technology analyzes the status of disks and reports issues.<\/p>\n<p>If you store backups in the cloud, check the settings periodically and buy additional space before you need it.<\/p>\n<h2>Update antivirus licenses on servers<\/h2>\n<p>Security software on workstations and mobile devices won\u2019t let you forget about subscription renewal. But don\u2019t forget about servers. An unprotected server can cause a range of problems \u2014 from data leakage to hosting malicious resources in your infrastructure to <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptojacking-rsa2019\/25938\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">turning your office into a cryptofarm<\/a>.\u00a0 Set a repeating reminder in your calendar to update server protection.<\/p>\n<h2>Your company\u2019s security is in your hands<\/h2>\n<p>When it comes to security, the more regular and thorough the checks are, the better. To avoid serious issues:<\/p>\n<ul>\n<li>Update software regularly, including router and other network device firmware;<\/li>\n<li>Keep an eye on the expiration date of security certificates and security software licenses;<\/li>\n<li>Make backup copies of data, and if your company automates the process, periodically check that it is being done correctly;<\/li>\n<li>Revoke access permissions from employees as soon as they are no longer required;<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.co.in\/small-to-medium-business-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solutions<\/a> to help monitor the health and status of your corporate infrastructure.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Five things that, if neglected, can cost SMBs dearly.<\/p>\n","protected":false},"author":2484,"featured_media":21630,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2610],"tags":[2688,2052,2068,2901,1898],"class_list":{"0":"post-21629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-access-rights","10":"tag-business","11":"tag-human-factor","12":"tag-smb","13":"tag-tips"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top5-checkpoints-for-smb\/21629\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top5-checkpoints-for-smb\/17092\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/top5-checkpoints-for-smb\/8481\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top5-checkpoints-for-smb\/22901\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top5-checkpoints-for-smb\/21087\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top5-checkpoints-for-smb\/19779\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top5-checkpoints-for-smb\/23566\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top5-checkpoints-for-smb\/22413\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top5-checkpoints-for-smb\/28805\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top5-checkpoints-for-smb\/8637\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top5-checkpoints-for-smb\/36501\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top5-checkpoints-for-smb\/15377\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top5-checkpoints-for-smb\/15787\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/top5-checkpoints-for-smb\/13735\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top5-checkpoints-for-smb\/24807\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top5-checkpoints-for-smb\/28906\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/top5-checkpoints-for-smb\/25739\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top5-checkpoints-for-smb\/22656\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top5-checkpoints-for-smb\/27919\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top5-checkpoints-for-smb\/27749\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/21629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=21629"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/21629\/revisions"}],"predecessor-version":[{"id":21632,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/21629\/revisions\/21632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/21630"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=21629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=21629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=21629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}