7 Cybersecurity Layers Every Entrepreneur Needs to UnderstandIn light of the recent hacks of high profile companies and individuals, entrepreneurs would do well to understand and maximize their online protection.

ByPeter Gasca

表达的观点Entrepreneur contributors are their own.

REUTERS | Kacper Pempel

This week, ateenage high school student reportedly hackedinto the email account of CIA Director John Brennan andposted personal details to WikiLeaks. Granted, Brennan was using anAOL account, and the hack was likely a "social engineering" attack, in which personal information, most likely obtained by using information easily found online, was used to break in.

Regardless, if the email for the CIA director is not safe, what chance do we have?

If you think that having an email hacked is the worst that could happen, consider someone using your information to order countless pizzas, call in bomb threats or make racist comments on your behalf online. This is the terrifying case ofPaul and Amy Strater, a middle class couple from Oswego, Ill., whose lives became the unfortunate collateral damage of a cyber war raged against their teenage hacker son, who unwisely picked a fight with another (and better) hacker in an online chat room he frequented.

Mike Schroll, the VP of business development forPC Pitstop, a creator of security and performance software, is a former hacker and made his living professionally hacking into and identifying vulnerable areas in the cyber infrastructure of large organizations.

Related:Don't Wait for a Disaster to Interrupt Business. Prepare Now.

Schroll points out that several layers of cyber security exist, like an onion -- both of which, if hacked, will cause many tears -- and entrepreneurs and business managers need to be aware of all the layers to best protect a company's cyber infrastructure from threats.

1. Social engineering

The first layer is protecting your company from attacks from afar. Hackers have been known to find general information about an individual online -- we do, after all,share everything about ourselveson social media -- and use this information to manipulate employees of companies, such as banks, to disclose personal and sensitive information. While these disclosures are a failure on the part of the employee, more often it is a systematic failure of the organization to train and emphasize security protocols.

Schroll suggest that you make certain you have statedsecurity processesthat are reviewed with your employees and tested often. Have a process to verify callers and never disclose passwords or other sensitive customer information.

2. Physical security

While you may believe your building and technology -- and hence your sensitive information -- is safe and secure physically, good hackers know "tricks" that will allow them to penetrate even this layer of security. Additionally, many business owners pay little attention to other physical aspects of their companies' operations that pose a threat, such as leavingcomputers exposedor failing to destroy old hard drives.

As with other employees, these physical security breaches are not always an issue with the security personnel but rather the organization's general security protocols. Schroll recommends that you encrypt your drives, leverage cloud backups, enclose any hardware ports exposed to the public, have old hardware disposed by professionals and use theft recovery software, such asPrey Project, on business devices.

3. Wireless security

Your wireless Internet also poses a threat to your company. We often forget that Wi-Fi signals can extend much farther than the walls of our offices, and a hacker with a good antenna can connect to your signal from far away. Once in your network, file shares without protection or computer accounts that have simple passwords become an easy channel for getting to other sensitive information.

Schroll says companies should be using WPA2 protocols, not the antiquated WEP or WPA. Additionally, your router password needs to be as strong as all other passwords. Never use a default password and make certain it is nothing that can be easily guessed (your company address, for instance).

4. Passwords

According to Schroll, passwords are like underpants -- they need to be changed often, kept private and never shared with anyone. Thebest passwordsare long, use a combination of uppercase and lowercase letters, numbers and symbols, and are different across accounts.

Schroll suggests using phrases, which are easier to remember. For example, consider this famous phrase from the movie,Forrest Gump, "Life's a box of chocolates, Forrest. You never know what you're gonna get," which would translate to a very effective password "L'aboc,F.Ynkwy'gg."

While keeping track of all of these passwords may be overwhelming, consider a service, such as1PasswordorLastPassto maintain and keep your passwords secure.

Related:Apple's New 6-Digit Passcodes: What Do They Mean for Your BYOD Policy?

5. Two-factor authentication

Even with difficult passwords, good hackers still have ways to penetrate account security. For this reason, businesses should strongly consider using two-factor authentication (2FA). Most large companies, such as Google, Apple and Dropbox, offer 2FA with a mobile phone number or email account, and apps such asAuthyandGoogle Authenticatorcan help you implement it with other apps and services.

As more secure methods continue to be developed, such asfingerprintandfacial recognitionand evenultrasonic sounds, companies should not shy away from updating security measures as often as needed to stay ahead of hackers.

6. Email security

If you protect nothing else, Schroll emphasizes the need to at least protect email accounts. Consider that once hackers get into an email account, it is not difficult to get access to other accounts, considering your email account is typically how you reset forgotten passwords. While it is old news, Schroll says to never click links in emails or attachments, as many take you tophishing sitesthat look remarkably like real sites. Instead, open a website by creating a new tab on your browser and typing the website URL.

Schroll进一步推荐使用Gmail和Google Apps (with 2FA, of course), as Google has superior spam, virus and phishing protections.

7. Anti-virus

Most anti-virus software has services that assist in keeping email accounts and other sensitive information safe. Even the best software, however, has vulnerabilities. Malicious software viruses are being created at breakneck speed, and virus-protection companies have difficulty keeping track of all of them on their "blacklists."

For this reason, businesses should consider using a service that employs a "whitelist," such asPC Matic. With whitelist protection, the security only allows software and programs that are pre-approved to be downloaded, adding an additional layer of protection to your system.

Understand that your business stands a very, very good chance ofgetting hacked-- it is just a matter of when. Take the appropriate measures to secure your hardware, software and cloud accounts, and have a clear, detailed and statedinformation and technology security policy.

Remember: Stay out of online chat rooms and never, under any circumstance, mess with teenage hackers or anyone with a profile name that sounds like amob boss or fantasy wizard with too many misplaced uppercase letters.

Related:5 Growing Cyber-Security Epicenters Around the World

Peter Gasca

Management and Entrepreneur Consultant

彼得·斯卡是一个作家和顾问彼得·Paul Advisors. He also serves as Executive-in-Residence and Director of the Community and Business Engagement Institute at Coastal Carolina University. His book, One Million Frogs', details his early entrepreneurial journey.

Related Topics

Making a Change

The Art of the Pivot — 6 Steps to Reengineer Yourself for a Career Change

Before switching careers or starting a business, learn why reengineering is your secret weapon for turning dreams into strategies, leveraging your unique skill set, and charting a course to undeniable success. This is the game-changer you've been waiting for.

Franchise

He Got Bored With Retirement. Now He's Selling $18 Million Annually.

Don Lanier was ready for a change, and that pushed him to succeed. Here's how he did it.

Career

Get AI-Powered Help With Resumes, Cover Letters and More With This $29.97 Tool

Let AI create your resume with this handy tool -- now $29.97 for life.

Business Plans

Every Business Owner Needs an Exit Plan — It's Time You Develop Yours.

A winning exit strategy seamlessly aligns business success with personal fulfillment.

Science & Technology

Gift This Cybersecurity Bundle — $60 Through 10/23

You have just a week to get this cybersecurity bundle — $59.97 (reg. $754.)