Is Your Business Ready for Cyber War?With analysts predicting a surge in international hacking threats, here's what small businesses need to do to stay out of the crosshairs.

ByJulie Cohn

Opinions expressed by Entrepreneur contributors are their own.

The Terminator

Think your small business is immune fromcyber attacksfrom abroad? Think again.

TheNew York TimesandWall Street Journalrecently acknowledged they had fallen victim to sophisticated cyber attacks by the Chinese government. The incidents supportedsecurity analyst predictionsandF.B.I. concernsthat state-sponsored espionage and cyber attacks will continue to grow in 2013.

Misguided notions of safety have led many small-business owners to skipsecurity measuresentirely, which is precisely what primes them as a target. Two things increase the likelihood that a small business will be the target of an international hacking threat: what your company does, and whom your company works with.

Certain industries are at higher risk for a state-sponsored attack, though everyone should remain vigilant, says Richard Bejtlich, chief security officer at New York City-basedMandiant, the computer security experts hired by theNew York Timesto find and expel the newspaper's hackers. The most vulnerable industries include those the Chinese compete with directly: telecommunications, aerospace, advanced manufacturing, finance, energy and any companies indirectly connected to those industries.

Related:New York Times Hacked: 3 Tips for Avoiding Email Scams

Also at higher risk are some law firms, non-governmental organizations, think tanks and news media that focus on hot-button Chinese foreign policy issues, such as human rights or the South China Sea.

Often, small businesses with weak security systems are targeted in attacks aimed at larger corporations. Take China's 2009 cyber-espionage coup, whenChinese hackers stole the blueprintsfor the U.S. joint strike fighter planes, the F-35 and F-22. Lockheed Martin's security system was nearly impenetrable, but by attacking several of the company's smaller-scale contractors instead, the Chinese were able to springboard into Lockheed's systems, nabbing research and intellectual property worth more than a trillion dollars.

"The small business might not be the target, but rather the portal," says Bejtlich, adding, "People usually think 'OK, am I the sort of company that someone else would want to attack?' But a new way to think about it is, 'Do I have relationships with a company that is likely to get attacked?'"

Despite the threat of nation-state sponsored attacks, small businesses are still far more likely to encounter an opportunistic cyber-criminal looking to siphon data or funds. When it comes to such attacks, "anyone who is connected to the internet is at risk," says Max Kelly, former chief security officer at Facebook and the current CEO of Leesburg, Va.-based Praxis Security, which provides computer security services.

Here are five suggestions for protecting your company from costly cyber-attacks:

1. Use encryption.
Encrypting data can help ensure that your company's sensitive information isn't exposed when an employee inevitably loses a company computer or cell phone. Encryption software scrambles the data so that it is unreadable to those who don't provide the correct password. For Windows,BitLocker是一个全盘加密功能,站得住呢ard with the operating system, whileFileVaultis the Mac equivalent.

2. Educate employees about phishing scams.
One of the most common ways hackers attempt to access your network is by fooling you through a "phishing" email, Bejtlich says. These are email messages that hackers tailor to you or your business to entice you to click on a link in order to put malicious code onto your computer. Educating your employees about the threats of opening emails or clicking on suspicious links can help prevent attacks, he says.

Employees should also beware of downloading apps on mobile devices they use for business. Criminals are increasingly hiding malware inside apps -- just as they hide them in phishing links -- to try to get people to download malware. Mobile security companies likeAppthoritycan help inform your company about which apps contain which kinds of threats, as well as manage your mobile security policies. Appthority charges $1.50 a month per user.

Related:3 Essential Things to Teach Employees About Tech Security

3. Know your network.
Business owners need to be able to know what's happening inside their network -- what's going in and what's coming out, Kelly says. If you notice strange activity, you might be able to take preventive action before the attacker manages to compromise your data. The only truly effective way to monitor your networks is to hire a full-time security expert who is trained for that purpose, Kelly says.

If that kind of hire isn't in your startup budget,Security Onionis open-source software that can be installed on an extra server to monitor what goes in and out of a company's network. You may not know what the log means, but if you suspect an attack because your normal operations aren't functioning properly, or you notice that funds are disappearing, you can help facilitate an expert's job by providing them with the data. Mandiant also has created a free, open-source tool for threat detection calledOpenIOC. Though, like Security Onion, it's only effective in preventing intrusions if someone monitors the data.

4. Keep bank accounts secure.
Use multifactor authentication to log into your bank's website -- if your bank supports it. This means your account would require a virtual token or even a phone confirmation in addition to a password, making it one step harder for a criminal to impersonate you.

The FDIC also recommendsusing a separate computerfor online banking. That can limit the chances that you download malware from email phishing links or other day-to-day web activity onto the computer that records your bank password's keystrokes.

5. Protect your devices while traveling.
在高危国家如中国、俄罗斯和伊朗,it isn't uncommon for computers to be physically searched while you are away from your hotel room. Keep your computing devices on you at all times. If you can afford it, Kelly says, designate a separate computer just for traveling. Don't store sensitive information on that computer and wipe it clean when you return home before connecting it to your networks.

Also, avoid bringing your smartphone to risky countries. Telecommunications providers in several high-threat countries often push malicious surveillance software on your phone so they can monitor your calls without your knowing. Instead, consider buying an inexpensive, in-country phone and discarding it when you leave.

Related:5 Steps for Keeping Digital Data Safe When Traveling to China

Wavy Line

Julie Cohn is a freelance journalist who has covered technology, startups, finance and foreign affairs for such publications as theCouncil on Foreign Relations,The New York TimesandThe Daily. Cohn splits her time between Palo Alto, Calif., and New York City.

Editor's Pick

Related Topics

Business News

What Is a 'Lazy Girl Job'? New TikTok Trend Empowers Women to Work However They Want

The trend began as a way for women to find more free time during their days.

Business News

Kristen Bell and Dax Shepard's Family 'Stranded' at Boston Airport During 9-Hour Delay: 'We Made Quite a Home Here'

The actors spent $600 on pillows and blankets while waiting for their flight.

Science & Technology

5 Tech Tools To Make You the Envy of Coworkers and Neighbors All Summer

From a self-correcting selfie camera to an cooler that doesn't need ice.

Business News

Kevin O'Leary Slams Anheuser-Busch CEO's Listening Tour, Says It Won't Stop Bud Light Backlash for One Huge Reason

Anheuser-Busch U.S. CEO Brendan Whitworth announced plans to hear consumers out this summer.

Devices

This Versatile MacBook Is Only $299.97 During the Back-to-School Sale

Fid out how to get a MacBook Air that's sleek, portable, and reliable for a great price.