Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Cybersecurity for SMBs: A 3-Step Process to Defend Against Growing Risks
Cybersecurity

Cybersecurity for SMBs: A 3-Step Process to Defend Against Growing Risks

Kenny MullicanBy Kenny MullicanNovember 5, 2021Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
Cybersecurity Plan
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Large enterprises typically have a cybersecurity team and often a Chief Information Security Officer or CISO. In smaller companies, we face the task of doing more with less. And when it comes to cybersecurity, that’s a big challenge.

Cybersecurity & Digital Transformation

As the CIO of a mid-market manufacturing company, I am also acting as the CISO. I don’t have the budget for a dedicated cybersecurity staff, which can be frustrating. If we had a team of in-house security experts, I could focus all my energy and resources on taking advantage of new technologies that propel the company forward in the market. I could focus on creative problem-solving that helps us be even more productive and profitable. Unfortunately, there are bad actors out there. These bad actors have determined that the quickest way to make a fortune is by devising endless strategies to break into computer systems and hold the data for ransom.

So, it’s imperative that my digital transformation plans and strategy include cyber resilience as a foundational principle. I can’t afford to take a chance, hoping that criminals will overlook our company just because we aren’t a large enterprise. According to Forbes, in recent data presented to the U.S. Senate, most ransomware attacks are against companies with fewer than 1,000 employees.

It might be tempting to throw money at the problem. There are countless vendors of software, hardware, cloud-based subscriptions, and managed services who will assure you that their solution will keep you safe. But again, in small and mid-market organizations, we have a limited budget. So, we must make smart decisions about how to best invest our resources to defend the company.

In my experience, this consists of three primary steps: understand the risk, make a plan, and execute. And we must repeat these steps regularly.

1. Understand the Risk

Before hoping to protect your company, it’s vital that you have a strong understanding of what is at risk. This starts by asking a few questions about the business:

  1. What intellectual property do we not want to fall into the hands of criminals or competitors?
  2. What personal identifiable information (PII) is stored on our systems?
  3. Which systems are critical to keeping the business operations functioning?

In determining which data and systems are most vulnerable, we have to identify where to focus to ensure those assets are protected. In addition to understanding the business vulnerability, it’s important to understand the range of technical vulnerabilities. It can include getting an assessment from a cybersecurity specialist, which might cost several thousand dollars. Furthermore, it can also include running inexpensive scanning tools. These tools identify open ports, outdated software, and other technical vulnerabilities.

As you get started, it isn’t necessary for this to be complete or an exhaustive list. However, it is necessary to have a starting point from which you can gauge your progress. Repeating these steps on a recurring schedule, perhaps annually, you can go deeper with more detailed tests and assessments.

2. Make a Cybersecurity Plan

Once you have determined the most vulnerable information and systems, it’s time to develop a plan to mitigate the risks. In its most comprehensive form, this plan should conform to a framework such as NIST, CIS, or ISO 27002.

Take note: these frameworks are extensive and detailed, and it can take months or even years to fully implement them. Nevertheless, it’s worth looking at them to get ideas about the types of policies and controls to enforce. It can help in handling various kinds of risks.

For example, the controls might entail password policies or rules that dictate how company-owned devices can be used. They can also provide ideas for accounting controls. This can include distribution of authority to prevent one person, or single-user login, from having too much access. Finally, they include technical solutions such as endpoint protection, firewalls, SIEM (security information and event management) tools, anti-malware, and more.

3. Execute

Now you’re ready to determine which vendors can best provide the services, systems, or tools to protect the assets at risk.

By putting a framework in place – even if it is a subset of the extensive, published frameworks – you will have an organized way to determine which controls you are implementing. You can use this as a list of requirements for any services or software tools you implement. It also gives you a well-thought-out set of documents that you can provide to auditors, cybersecurity insurers, or potential investors.

Most importantly, these documents make it easy to demonstrate to the CFO the value of the vulnerable assets. Additionally, it can show the relatively small cost of cybersecurity in comparison to the potential costs if these assets were compromised. This results in significant monetary loss or damage to the company’s reputation.

CFO CIO Cyber Crime Cybersecurity Cybersecurity channel featured SMB CIO
Share. Facebook Twitter LinkedIn Email
Analystuser

Kenny Mullican

CIO
Paragon Films

Areas of Expertise
  • AI
  • Cloud
  • Data
  • IT Strategy
  • SMB CIO
  • Supply Chain
  • Website
  • LinkedIn

Kenny Mullican is a Cloud Wars Analyst focusing on cloud and AI strategy. As the current CIO of Paragon Films, Kenny analyzes the impact of technology on driving business, process, and customer value for mid-market companies. With expertise in automation, enterprise information architecture, and security, he offers valuable insights through his contributions, helping organizations leverage technology to enhance efficiency and effectiveness in their operations.

  Contact Kenny Mullican ...

Related Posts

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025

Microsoft’s Mission to Make Your Company AI First

May 14, 2025

Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live

May 14, 2025
Add A Comment

Comments are closed.

Recent Posts
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First
  • Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live
  • Snowflake Expands AI Data Cloud to Revolutionize Automotive Manufacturing and Data Integration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.