The Hanover Insurance Group

Computer security tips for small business

Is your business's computer system safe? Could an intruder sneak in and steal critical information or plant a virus? A common problem caused by computer viruses has been extensive damage to files, software and operating systems that leave the user with a blank screen and costly repair bills. Or, as importantly, the business may lose irreplaceable data, such as customer and financial records. The following are seven essential steps a small business should take to secure its computer system:

Use strong passwords

Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts. Use a combination of upper and lower case letters and numbers for passwords.

Backup critical data

Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup at least weekly and incremental backup every day. At least once a month, the backup media should be verified.

Use virus protection software

Install virus protection software on your computer, and update it daily for new virus signature updates. Scan all the files on your computer periodically.

Install firewalls

Use a firewall as a gatekeeper between your computer and the internet. Firewalls are usually software products. They are essential for those who keep their computers online through cable modem connections, and they are just as valuable for those who still dial in. Compartmentalize information within the company, too. Limit access to key areas, such as financial data, proprietary information, and customer portals.

Avoid unnecessary connections

Do not keep computers online when not in use. Either shut them off or physically disconnect them from an internet connection. Hackers can compromise a system if certain ports are left vulnerable. Vulnerabilities that provide remote hackers full file-system read and write capabilities, remote execution of commands as a root or administrator user could occur.

Monitor email

Do not open email attachments from strangers, regardless of how enticing the "subject line" or attachment may be. Be suspicious of any unexpected email attachment from someone you do know as it may have been sent from an infected machine without that person's knowledge.

Keep software and operating system current

Many commonly used operating systems, as well as other programs, such as web browsers and email readers, have security holes or flaws. The software companies regularly issue fixes, called "patches." Keep your operating system up to date by regularly downloading these security patches from the software vendor's website.

Screen employees

Do background checks, and get at least two references for all new employees. Ask for at least two references from previous employers and call them to verify previous employment information. You may also want to check if a prospective employee has a criminal record or a problem with his credit history.

To learn more about Hanover Risk Solutions, visit hanoverrisksolutions.com

Copyright © 2017, ISO Services, Inc.


The recommendation(s), advice and contents of this material are provided for informational purposes only and do not purport to address every possible legal obligation, hazard, code violation, loss potential or exception to good practice. The Hanover Insurance Company and its affiliates and subsidiaries ("The Hanover") specifically disclaim any warranty or representation that acceptance of any recommendations or advice contained herein will make any premises, property or operation safe or in compliance with any law or regulation. Under no circumstances should this material or your acceptance of any recommendations or advice contained herein be construed as establishing the existence or availability of any insurance coverage with The Hanover. By providing this information to you, The Hanover does not assume (and specifically disclaims) any duty, undertaking or responsibility to you. The decision to accept or implement any recommendation(s) or advice contained in this material must be made by you.

LC OCT 2018 10-181H
171-1008 (11/18)


This site uses cookies. View our privacy policy and online privacy statement.

California residents: View the information we collect and how we use it.

×