October is Cybersecurity month and iMpact Utah has offered these suggestions for helping Utah manufacturers — and other small businesses — know which plans, practices and services are worth the investment to bolster your defenses.

Below are four steps businesses of all shapes and sizes can take to better protect themselves against cyberattacks:{mprestriction ids="1,3"}

Identify “Crown Jewels” of Your Business

Understanding what information cybercriminals are after most is essential to combating cyberattacks. Therefore, creating an inventory list of the valuable data and assets within your organization, including manufacturer, model, hardware and software information, is of the utmost importance. In addition, take note of who has access to important data and information while also accounting for all storage locations. This practice will ensure that business leaders have a record of accessibility so that they know where to look in case of a vulnerability or breach.

Protect Assets by Updating and Authenticating

Make sure your security software is current. Investing in the most up-to-date software, web browsers and operating systems is one of the best defenses against a host of viruses, malware and other online threats. Furthermore, make sure automatic updates are turned on so employees aren’t tasked with manually updating devices. Additionally, make sure all data is backed up either in the cloud or via separate hard drive storage.

Another important way to keep your assets safe is by ensuring staff are using strong authentication to protect access to accounts and ensure only those with permission can access them. This includes strong, secure and differentiated passwords.

According to a 2021 PC Magazine study, 70 percent of people admit they use the same password for more than one account. Using weak and similar passwords makes a hacker’s life a lot easier and can give them access to more materials than they could dream of. Finally, make sure employees are using multi-factor authentication. While this may result in a few extra sign-ins, MFA is essential to safeguarding data and can be the difference between a successful and unsuccessful breach.

Monitor and Detect Suspicious Activity

Companies must always be on the lookout for possible breaches, vulnerabilities and attacks, especially in a world where many often go undetected. This can be done by investing in cybersecurity products or services that help monitor your networks such as antivirus and antimalware software. Moreover, make sure your employees and personnel are following all established cybersecurity protocols before, during and after a breach. Individuals who ignore or disregard important cybersecurity practices can compromise not only themselves, but the entire organization. Paying close attention to whether your company is fully embracing all of your cybersecurity procedures and technology is incumbent upon business leaders.

Have a Response Plan Ready

No matter how many safeguards you have in place, the unfortunate reality is that cyber incidents still occur. However, responding in a comprehensive manner will reduce risks to your business and send a positive signal to your customers and employees. Therefore, businesses should have a cyber incident response plan ready to go prior to a breach. In it, companies should embrace savvy practices such as disconnecting any affected computers from the network, notifying their IT staff or the proper third-party vendors, and utilizing any spares and backup devices while continuing to capture operational data. 

IMpact Utah is a full-service training and consultation organization offering lean manufacturing workshops, leadership training and team-building events.{/mprestriction}