Digital Safety Eff ective cybersecurity requires a team eff ort. COMPUTER HACKERS do not target only large, Fortune 500 companies. In fact, criminals have begun to target small businesses, specifically because they rarely have the resources to fully protect themselves. Good cybersecurity provides defense through depth: layer upon layer of pro-tection that can stop threats even when a single layer fails. However, even if you don’t have the resources to configure and maintain many layers of cybersecurity, there are a few basic steps you can take to protect your operation. Managers and office personnel are obvious targets for a cybersecurity breach, but in many component plants, you cannot find a single employee who does not use a com-puter at some point in the day! While network firewalls and anti-virus software are impor-tant, end-user training is the most critical tool available to fight computer threats. Understanding attack types like ransomware (a virus that encrypts your network’s data) and phishing (a method of spoofing an email in order to steal sensitive information) can help you identify threats. When a user has the knowledge to spot something phishy, the chance of preventing a breach is much higher. Teaching and reminding your team members to watch for suspicious emails is an important part of protecting your network. 1. DO SOMETHING. ANYTHING. The most important step in creating a more secure environ-ment is to start doing something. Pick anything, from docu-menting a company-wide password policy to reviewing your software and hardware settings. Just beginning the process will give you numerous ideas for security improvements. Taking this first simple step will help you better understand your current level of security and where you need to go next. 3. DON’T STOP. 2. GET EVERYONE ON BOARD. Just like workplace safety, digital safety is a goal that all employees need to be thinking about as they do their jobs. BCMC After gathering the low-hanging fruit like anti-virus soft-ware and network file access rights, there is still more work to be done. Tying systems together with a unified threat management tool, for example, can provide great security while also offering an easy way to manage the backend of your network. As more devices are introduced into your network, more possibilities for a hole in your security walls are introduced as well. Making sure that all devices are running the latest operating system and software patches, FIND EDUCATION FOR EVERYONE ON YOUR TEAM. 10 sbcmag.info • AUGUST 2017 Learn more about the business/IT partnership in the component manufacturing industry at BCMC 2017. Find details on all the educational sessions and activities in the IT Track at bcmcshow.com/tracks .