Please note that SaRB for SMB's blog pages contain between 2000-4500 words, non-subscribers can only view the first 750-800 words, unless the post is older than 6 months. To get all the latest information on protecting your Business please subscribe to this blog.

0

SMB's face many of the same threats and risks that large enterprises do, because of the way that hackers operate. However, because there is often less separation between different insecure environments they work and live in, they may be more prone to particular types of threats.

0

All your operating systems, apps, software and services you use must be configured correctly to protect you from hackers.

0

Your Internet Gateways (routers) are usually packaged in with modems as single devices and are the devices that enable access to the Internet. Firewalls help control the flow of data coming into and out of a business. Together these devices play a big role in the security of your network.

0

Small businesses and individual users often find it difficult to know what they should be doing, and when they find out and start doing it, they may find that it is not what they should be doing. We explore some of the reasons behind this, as well as our own frustrations with what happens in practice.

0

This is the first of our seven part series on How to Certify in Cyber Essentials.