5 Cybersecurity Steps all Omaha Business Owners Should Take

written by: cpainomaha

May 3, 2021

No annoying tax professional lingo. Just straight, authoritative and friendly expert advice.

From making sure that nobody is doing Zoom calls in their bathrobe to ensuring that work actually gets done on time, you’ve got a few extra things to worry about as a Omaha business owner these days.

Chief among those new concerns, however, should be cybersecurity.

Cybersecurity steps are one of those painful, annoying topics that nobody wants to think about in a small business environment (kind of like *ahem* taxes and accounting) … but one that rears its head as a terrible, business-killing beast when left unattended.

There’s an entire slew of “information security” concerns that may not have been top of mind back when all the files and sensitive data were locked up nice and tight back at the office, but should be at the forefront now for all Douglas County business owners.

Before we dive into that, though, a quick reminder on an important business tax deduction…

As your favorite Omaha restaurants re-open, don’t forget that recent stimulus legislation bumps the business meal deduction all the way up to 100% for both takeout meals and meals consumed at the restaurant.

If you’re traveling for business or take a customer or prospect out to eat, that totally counts. What doesn’t count are prepackaged foods, such as prepared sandwiches and wraps, that are purchased from places like Douglas County convenience stores.

During that customer meeting at your favorite local eatery, let’s delve into some important tips that you should pay attention to before connecting to the restaurant wi-fi (among other things) …

5 Cybersecurity Steps all Omaha Business Owners Should Take
“You may have to fight a battle more than once to win it.” – Margaret Thatcher

Whether your Omaha business is in full-on work-from-home mode, or your business is such that this is a totally foreign concept, the reality is that cybersecurity steps are something you absolutely need to address.

Your office computers, employee laptops and tablets, cloud services (which can be accessed remotely), and even company cell phones all have an insane amount of information on them that hackers would love to get their digital hands on. Along with customer credit card numbers and employee SSN’s and DOB’s, your digital records contain a wealth of valuable information. Even something as seemingly innocuous as customer estimates and invoices can look like hidden treasure to the world’s digital pirates.

Taking basic cybersecurity steps is cheap protection against potentially embarrassing and expensive data breaches.

If you do have employees working remotely, it’s your responsibility to protect customer and employee data. Just like the IRS sets minimum requirements for us to protect YOUR private information, you should also set minimum standards for cybersecurity in your own business.

A recent study by Shred-it (business document destruction company) stated that a whopping 96% of American consumers consider a business’s employees to be the largest risk factor for a data breach. So, how do you put your Douglas County customers at ease, do the right thing, and help prevent data breaches and ensuing expensive lawsuits?

Step 1: Have a Written Policy
The first of the five cybersecurity steps you need to do in order to protect against data breaches is to have a written policy at your Omaha company about data security. You need to put rules in place that both protect data and prevent your employees from taking shortcuts that put valuable information at risk.

For example, you’ll want a policy that covers minimum password complexity as well as a process in place for ferreting out all those “abc123” and “password” passwords.

Your written cybersecurity policy should outline the basic things your staff should do to keep things secure. Be sure that your policy includes the use of proactive defenses like anti-virus/anti-malware scanners, drive encryption, and software firewalls.

You’ll also want to specify what software programs and apps are okay for your employees to use when accessing company information.

Step 2: Use Secure Connections
Using secure connections is the next one of the cybersecurity steps to take. One of the most common ways that criminals access company data is when employees are using unsecured, public Wi-fi networks, and that includes those in Omaha.

Even if they’re at home, most people don’t properly secure their home routers. It is essential to provide some level of technical support, at company expense (deductible, of course!), to help at-home employees secure their Wi-fi connections.

You should also consider subscribing to a secure VPN service. These services are affordable and provide a secure “tunnel” between an employee’s home internet and your business network. Make sure to choose a service that uses top level encryption across the entire span of that “tunnel.”

Step 3: Use Password Managers
Of the many cybersecurity steps you should take, this might be the most important one across the board.Weak passwords (remember “abc123”?) are everywhere. This tends to be one of the weakest links in cybersecurity, especially for small Omaha businesses. With all the services and software that your business runs on these days, your employees likely have a metric boat load of passwords that they can’t possibly remember.

Which means they are probably “recycling” their passwords. (Yeah, that’s not a good thing.)

While choosing more secure passwords is a good starting point, it may be worth investing in a password manager for every member of your team. Tools like LastPass and 1Password are very affordable and go a long way with helping your employees create secure, unique passwords for all the services they need to access.

Step 4: Use 2-Factor Authentication
Two-factor authentication (or 2FA as the cool kids call it), adds a layer of security on top of passwords. Even if a password gets hacked, 2FA is one of the very difficult cybersecurity steps to hack.

2FA requires that you enter a code to access an online service. This code can be sent as a text message to an approved cell phone or can use a special security fob that shows a number which changes frequently. Some new systems may also use fingerprints or retinal scans to ensure the right person has access to company data.

Step 5: Install the Updates
Have you ever skipped a software update that your computer is demanding that you install? Yeah, so has everybody else.

But you really shouldn’tskip this one of the cybersecurity steps, and neither should your employees.

Keeping software up to date is important for preventing data breaches. These updates frequently eliminate known vulnerabilities in software. The only way you’re protected from certain types of cyberattacks is to close that door by installing the update.

Maintain Security Awareness
While a lot of these techie things may sound overly complicated at first, they become second nature once you and your employees start using them. With proper education, the right policies, and with you setting the example as the owner of the business, your team can easily embrace the basic steps that will prevent the vast majority of data breaches.

From a purely financial perspective, it’s also just cheaper to put these protections in place than it is to defend yourself against a lawsuit in the event of a data breach. So, if nothing else, take these cybersecurity steps because of the money. 🙂

Warmly,

Les Nosal

 

Articles & Advice

D
E
Tax Planning Opportunities for Midwestern Pass-Through Entities

Tax Planning Opportunities for Midwestern Pass-Through Entities

The State and Local Tax (SALT) deduction cap, introduced under the 2017 Tax Cuts and Jobs Act, limits the amount of state taxes you can deduct on your federal return. For many pass-through business owners in the Midwest, this can result in a higher federal tax bill.

Understanding FinCEN’s BOI Reporting Requirements for Businesses

Understanding FinCEN’s BOI Reporting Requirements for Businesses

The Financial Crimes Enforcement Network (FinCEN) is tightening regulations to improve transparency in business ownership, primarily through the implementation of Beneficial Ownership Information (BOI) reporting requirements. These requirements are aimed at helping combat illicit financial activities by ensuring that accurate and current ownership information is available to law enforcement and other authorities. If you own 25% or more of a company or have significant control over it, it’s essential to understand how the new BOI reporting requirements apply to you, particularly if your business was established before January 1, 2024, or is a new venture launched in 2024.

The Importance of Year-End Tax Planning for Small Businesses

The Importance of Year-End Tax Planning for Small Businesses

As summer draws to a close, small business owners balance numerous responsibilities—wrapping up seasonal sales, reflecting on the past few months, and preparing for the busy fall ahead. Amid all this, one crucial task that shouldn’t be overlooked is tax planning. The end of summer is an ideal time for small businesses to review their tax strategies. By taking proactive measures now, you can set the stage for significant savings and ensure a seamless transition into the year-end tax season.

Tax-wise ways to save for college

Tax-wise ways to save for college

If you’re a parent or grandparent with college-bound children, you may want to save to fund future education costs. Here are several approaches to...

Ready to let us help with your business finances and tax strategy so you can maximize savings and grow profit?