5 key Cybersecurity Steps for SMEs Thriving in the Cloud Era
South Africa’s small and medium enterprises (SMEs) have embraced cloud services to take advantage of scalable subscription services that enable hybrid working models, allow them to turn IT from a capital cost into operational expenditure, and achieve higher levels of flexibility. However, despite the many benefits of cloud computing, it also brings new complexities to cybersecurity.
The public cloud services and applications SMEs source from providers like Microsoft, AWS, and Google are hosted in secure data centers. But end-user devices used to access these services—such as PCs and smartphones remain vulnerable to a range of threats—including malware, insider data theft, ransomware, and elaborate social engineering threats.
Global research from Sage found that half of the SMBs have experienced a cyber security incident in the past year and a quarter have experienced more than one. A Sophos study meanwhile found that South Africa had the biggest increase in ransomware attack rates, with 78% of organizations hit in the 2023 survey compared to 51% in 2022.
The risks of cyberattacks and data breaches are significant. Sophos found there was a direct revenue loss to 82% of private sector organizations in South Africa that experienced ransomware attacks. There are also possible regulatory repercussions, with regulations under the Protection of Personal Information Act providing for stringent fines and penalties for non-compliant companies. This is without mentioning the impact on customer relationships, possible legal liabilities, and the business costs of losing business-critical data.
With SMEs on cybercriminals’ radar, it has become more important than ever to fortify their data and systems.
Here are a few ways that your SME can strengthen its cybersecurity defenses:
Consider moving towards a zero-trust model
SMEs can benefit from embracing a Zero Trust security model, a framework that operates on the principle of “never trust, always verify”. In practice, this means that your business will not automatically trust any person, device, or system inside or outside your network. Everyone and every device will need to authenticate before gaining access to data or systems. Many cloud services such as Microsoft 365 Business support Zero Trust principles—provided they are configured correctly.
Remember your devices are your weak point
The physical theft or loss of a smartphone or notebook with privileged access to cloud services and apps is one of your biggest risks. In the Sage research, the most mentioned cybersecurity incident was stolen laptops (28%). Make sure your end-users protect their devices from unauthorized access with biometric authentication (facial recognition or fingerprints) or strong passwords. Use the ‘Find My PC/Phone/Tablet’ feature to improve the chances of recovering a lost or stolen device.
Introduce regular security training
Data breaches or malware attacks can be the result of human error. Sophisticated cybercriminals gain access to your systems or data through social engineering techniques that exploit employees’ fear, ignorance, or negligence. It’s thus imperative to regularly train employees in cloud security risks and best practices. Educating users about phishing scams, data privacy, and secure cloud usage goes a long way in mitigating the risk of human error leading to security incidents.
Implement multifactor authentication
Most data breaches occur because of a cybercriminal getting their hands on user credentials to access systems via the cloud. The majority of these attacks can be stopped with multi-factor authentication (MFA). With MFA, users use a one-time password or PIN emailed or texted to them when they want to access a system. Or they could use an app like Google Authenticator or a hardware token to generate a code.
Plan for the worst!
Prepare yourself to bounce back quickly if the worst happens. Ensure that you regularly back up any data you store in the cloud or on local devices. Best practice is to create three copies—two onsite, one offsite—to ensure the business can recover from an attack. Also develop and regularly test an incident response plan specific to cloud security incidents. This plan should outline steps for identifying, containing, and mitigating the impact of security breaches in the cloud environment.