Passer au contenu principalCliquez pour consulter notre Déclaration sur l’accessibilité ou contactez-nous si vous avez des questions concernant l’accessibilité.

woman checking her phone

Spot – and stop – today’s biggest security threats. 

The advent of our reliance upon technology requires a certain amount of diligence – for individuals, large businesses, and even small- and medium-sized businesses. Apart from the typical credit card hustles and phone and email scams, more insidious threats like ransomware and phishing attacks can cause irreparable damage.

Boost your knowledge and fortify your preventative measures now by learning about today’s biggest small business security threats and the solid solutions to shut them down:

Weak passwords – or worse, no passwords – spell trouble.

According to Verizon's 2017 Data Breach Investigations Report, more than 80 percent of breaches are caused by weak, compromised, or re-used passwords. Many individuals and businesses inadvertently leave the default user name and password on their routers, storage devices (attached to the network), and additional hardware. Others simply enter the easiest sequence (including “password” and “123456”) and often share passwords with co-workers or people outside the office.

Solution: Don’t just rely on luck; create strong, lengthy, and unique passwords and use both a password manager and multi-factor authentication. And don’t forget to ensure your printer has the latest security features like those offered by Xerox® ConnectKey® Technology.

hands typing on a laptop keyboard

Ransomware hits small business the hardest.

According to a March 2019 report, about 70% of ransomware attacks in 2018 targeted small businesses.1  Attackers access data and literally hold it hostage until a ransom is paid, and they target SMBs primarily because they spend less on IT, lack a security focus and present greater vulnerability.

Solution: Education and prevention are the best tools to combat the tide of ransomware threats. Ransomware travels generally through email (addressed below) but “malvertising,” or malware hidden in online ads, also spreads ransomware.

To minimize potential damage, it’s is essential to backup data, and use cloud storage (see Xerox® ConnectKey® state-of-the-art data and security) so data is completely protected at another source. Install antivirus, anti-malware, and anti-ransomware protection, use a traditional firewall to block unauthorized access and always always run frequent, scheduled security scans on all devices.

infographic: percent of security breaches

Something phishy going on.

Ubiquitous to modern communication is phishing, conducted using emails primarily sent through a business’s network. Attackers pose as a trustworthy source such as your bank in an attempt to gain protected information like usernames and passwords, account numbers, and credit cards. Ransomware often gets on your computer from a phishing email with an attachment such as a zip or exe file that is downloaded. Once your files are infected with ransomware, the virus encrypts them and prevents access.

Solution: Train yourself and employees in what to look for with phishing scams: while emails are the prevalent vehicle, websites, URLs, social media and phone/text hooks can all be used to lure in victims. Today’s hackers use very sophisticated methods such as stolen or altered business logos, attempting to use any scrap of information they can find to leverage trust. Refrain from opening zip files from unknown sources and question any email that asks for your personal information.

Employers should instruct workers not to use non-company websites (or to resist hitting ads or downloads) and create an anti-phishing tutorial. And again, remind workers to protect their inbox with strong email spam filters and regularly update and run software scans.

Woman in front of large windows working on laptop

BYOD brings another level of threats.

There’s no question that employees who utilize their own devices add greater value and productivity to their work roles, in addition to enjoying more personal freedom and flexibility. And yet, mobile phones and tablets present the weakest security link when users download mobile apps and connect to external Wi-Fi spots without proper security protocols in place. The mixing of personal and business data also poses enormous risks, especially when devices are lost or stolen.

Solution: Implement a personal device policy that defines boundaries and use a VPN, which grants access by verifying that the data being transferred from the mobile device to your IT network is encrypted and permitted. Enterprise Mobility Management software lets you monitor and detect risks before they have a calamitous effect.

People working and walking in an open office environment

Focus on Document Security.

Today’s printers do more than copy and print; they hold caches of sensitive information and are vulnerable to intrusion just like computers. With their own hard drives, operating systems and network connections, hackers can do a lot of damage to a business via an exposed printer.

Solution: Start by securing your printer in a controlled location, and then set up access restrictions such as passwords or smart cards. Xerox printers feature several secure print features to protect your organization’s most sensitive data, and our software and apps ensure digital data is safeguarded as you share it via the cloud and mobile devices.

Check out these security solutions videos and resources to see how we protect your valuable business information. And make printer security a top priority with a Xerox® ConnectKey® Technology-enabled printer.

Contact your reseller or Shop Xerox for a free consultation today.

1. https://markets.businessinsider.com/news/stocks/fifty-percent-of-u-s-workforce-will-be-remote-by-2020-ultatel-s-cloud-based-technology-paves-the-way-1015773617

2. Verizon 2019 Data Breach Investigations Report (DBIR)

Man looking between the shelves in a secure server room

Sécurité avancée de l’imprimante

Faites confiance à la sécurité totale de ConnectKey pour protéger vos documents et vos données confidentiels.

Busy office with a Xerox VersaLink C505 MFP

Solutions et services Xerox pour petites et moyennes entreprises

Découvrez les imprimantes multifonctions rentables pour les PME. Tous les solutions GED de Xerox conçues pour faire croître les petites et moyennes entreprises.

Articles connexes

  • Man sitting at desk on laptop.

    Étude de cas Bell Law

    Découvrez comment un important cabinet d’avocats a surmonté les obstacles du traitement et du partage des documents grâce aux solutions novatrices de Xerox® Workflow Central.

  • Students working at a table

    Un prestataire de formation révolutionne la façon dont l'apprentissage est dispensé, rendant ainsi le contenu plus accessible.

    Le personnel formateur de CRC Formation utilise Xerox® Workflow Central pour proposer aux étudiants de nouvelles façons d’apprendre.

  • Hands typing on a laptop with digital symbols and specks of light floating above

    Comment libérer du temps pour une journée de travail plus productive

    Nous avons rassemblé les meilleures astuces que nous avons apprises des propriétaires de petites entreprises ces dernières années.

  • Man sitting at a desking looking at a laptop.

    Xerox reçoit le Prix BLI Gamme de l’année : Solutions

    Buyers Lab (BLI) décerne à Xerox le Prix BLI Gamme de l’année : Solutions pour le milieu de travail intelligent pour la sixième année consécutive. Découvrez comment Xerox sait résoudre les défis du travail hybride.

  • Doctor examining a child

    French Non-Profit Association Case Study

    See how Xerox helped boost productivity and accessibility for one of France's most significant non-profit organizations with the help of our Managed Print Services and Workflow Central Platform.

  • Doctor inputting information into a tablet.

    Healthcare Solutions for Xerox Workplace Cloud

    Xerox® Workplace Solutions ensures secure MFP access and pull printing for healthcare, protecting patient data and ensuring compliance. Print securely from any device with single sign-on and event logging.

Partager