Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":3725,"date":"2024-08-03T00:52:07","date_gmt":"2024-08-03T00:52:07","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/"},"modified":"2024-08-03T00:52:07","modified_gmt":"2024-08-03T00:52:07","slug":"remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/","title":{"rendered":"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm"},"content":{"rendered":"

While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an [\u2026]<\/p>\n

\u200b[[{“value”:”<\/p>\n

While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses<\/a>, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an average of $955,000 per attack<\/a> to restore their normal operations.<\/p>\n

If you\u2019re running a hybrid or fully remote SMB, there are some important things you should factor in if you plan to close your office or have employees traveling during the summer season.<\/p>\n

The Benefits of a Hybrid Work Environment <\/strong><\/h2>\n

We\u2019ve written a lot about the benefits of a hybrid work environment<\/a>. The ability to work remotely has been a boon for both employees and SMB owners. Remote work environments can significantly reduce the cost of living for employees and reduce energy costs for businesses.<\/p>\n

But another huge benefit is the ability for employees to better manage their work-life balance, allowing them to take work on the road with them (if they choose to do so) and have more control over their workdays, which, studies have shown, leads to increased productivity<\/a>.<\/p>\n

However, for all their benefits, hybrid work environments do introduce additional hurdles to overcome \u2014 especially when it comes to cybersecurity.<\/p>\n

How to Protect Your Data When Remote\u00a0 <\/strong><\/h2>\n

Hackers are fully aware that SMBs may not have the same resources as larger enterprises, which can make them an easy target. This includes safety protocols employees should practice in-office, best practices to follow when remote, and equipping both offices and remote workers with the best technology that gives them full access to the network safely.<\/p>\n

Safety Starts in the Home\u2026 Office <\/strong><\/h3>\n

When employees are scheduled to be out of the office, they should follow some best practices to keep their equipment and company data safe while away.<\/p>\n

Shutdown policies<\/strong> should be in place so that any employee who may be leaving their equipment (e.g., work computers, digital work devices, company phones, etc.) make sure they are locked and shut down properly. If anyone were to gain access to their work equipment, it\u2019s likely that no one would find out until they return from vacation, leaving your systems and data exposed for days on end.
\nScanning all endpoints and servers <\/strong>for any potential threats can protect you if you expect several employees will be taking time off, say during the summer months. Both your servers and the devices they are connected to (endpoints) have access to your company\u2019s data. It\u2019s an important best practice to scan both to make sure that the most recent security updates are active. Scanning will also ensure there are no malware or other vulnerabilities that may provide unauthorized access to your data when everyone is away. Again, the more employees there are out of office, the longer it will take for someone to notice your system has been compromised. By then, hackers can cause more damage without ever being found.<\/p>\n

CYA: Cover Your Assets<\/strong><\/h3>\n

Just because you might be away on vacation doesn\u2019t mean your system has to go unprotected.<\/p>\n

Managed service providers (MSPs)<\/strong> offer remote IT protection, helping you manage and secure your system while you are away. There has been a tremendous shift toward MSPs<\/a> in the last few years, and for good reason. Between 2021 and 2023, data breaches rose by 72%<\/a>, increasing the need for more dedicated remote IT protection\u2014whether offices are open for business or not.
\nMulti-factor authentication (MFA)<\/strong> is another vital requirement when employees are on vacation. MFA provides an extra layer of protection, and a practice that should be implemented at all times but is especially important while out of office. It\u2019s important to ensure that all your employees have it enabled on their network-connected devices, especially if they plan on logging in while on vacation. If they happen to leave their phone or work computer in a hotel, you want to make it as difficult as possible for a hacker to access your system. Products like
Cisco Duo provide zero-trust MFA protection<\/a> for all your devices, so you can feel safe knowing they have the best remote SMB security<\/p>\n

Ensure Productivity from Home and Beyond<\/strong><\/h2>\n

For those employees that wish to work while on vacation, it\u2019s imperative that they can get safe access to your network when they need it and are able to collaborate with people in-office, as well.<\/p>\n

Having a stable video service to hold meetings and remote brainstorms is a fantastic way to maintain productivity remotely, but these services also need the utmost security. Collaboration tools like Cisco\u2019s Webex<\/a> provide end-to-end protection with zero-trust encryption to ensure meetings stay confidential. Webex makes sure only your employees have access to messages and recordings on your system.<\/p>\n

Everyone needs a vacation from time to time, but unfortunately, your network security can\u2019t [take a break like your employees can]. Cisco provides a huge array of digital tools and devices that keep your SMB network stable and secure. Contact a Cisco expert today<\/a>, and our team will help you find the right combination of tools and services that will keep your SMB safe no matter where life takes you.<\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an [\u2026]<\/p>\n

\u200b[[{“value”:”<\/p>\n

While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses<\/a>, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an average of $955,000 per attack<\/a> to restore their normal operations.<\/p>\n

If you\u2019re running a hybrid or fully remote SMB, there are some important things you should factor in if you plan to close your office or have employees traveling during the summer season.<\/p>\n

The Benefits of a Hybrid Work Environment <\/strong><\/h2>\n

We\u2019ve written a lot about the benefits of a hybrid work environment<\/a>. The ability to work remotely has been a boon for both employees and SMB owners. Remote work environments can significantly reduce the cost of living for employees and reduce energy costs for businesses.<\/p>\n

But another huge benefit is the ability for employees to better manage their work-life balance, allowing them to take work on the road with them (if they choose to do so) and have more control over their workdays, which, studies have shown, leads to increased productivity<\/a>.<\/p>\n

However, for all their benefits, hybrid work environments do introduce additional hurdles to overcome \u2014 especially when it comes to cybersecurity.<\/p>\n

How to Protect Your Data When Remote\u00a0 <\/strong><\/h2>\n

Hackers are fully aware that SMBs may not have the same resources as larger enterprises, which can make them an easy target. This includes safety protocols employees should practice in-office, best practices to follow when remote, and equipping both offices and remote workers with the best technology that gives them full access to the network safely.<\/p>\n

Safety Starts in the Home\u2026 Office <\/strong><\/h3>\n

When employees are scheduled to be out of the office, they should follow some best practices to keep their equipment and company data safe while away.<\/p>\n

Shutdown policies<\/strong> should be in place so that any employee who may be leaving their equipment (e.g., work computers, digital work devices, company phones, etc.) make sure they are locked and shut down properly. If anyone were to gain access to their work equipment, it\u2019s likely that no one would find out until they return from vacation, leaving your systems and data exposed for days on end.
\nScanning all endpoints and servers <\/strong>for any potential threats can protect you if you expect several employees will be taking time off, say during the summer months. Both your servers and the devices they are connected to (endpoints) have access to your company\u2019s data. It\u2019s an important best practice to scan both to make sure that the most recent security updates are active. Scanning will also ensure there are no malware or other vulnerabilities that may provide unauthorized access to your data when everyone is away. Again, the more employees there are out of office, the longer it will take for someone to notice your system has been compromised. By then, hackers can cause more damage without ever being found.<\/p>\n

CYA: Cover Your Assets<\/strong><\/h3>\n

Just because you might be away on vacation doesn\u2019t mean your system has to go unprotected.<\/p>\n

Managed service providers (MSPs)<\/strong> offer remote IT protection, helping you manage and secure your system while you are away. There has been a tremendous shift toward MSPs<\/a> in the last few years, and for good reason. Between 2021 and 2023, data breaches rose by 72%<\/a>, increasing the need for more dedicated remote IT protection\u2014whether offices are open for business or not.
\nMulti-factor authentication (MFA)<\/strong> is another vital requirement when employees are on vacation. MFA provides an extra layer of protection, and a practice that should be implemented at all times but is especially important while out of office. It\u2019s important to ensure that all your employees have it enabled on their network-connected devices, especially if they plan on logging in while on vacation. If they happen to leave their phone or work computer in a hotel, you want to make it as difficult as possible for a hacker to access your system. Products like
Cisco Duo provide zero-trust MFA protection<\/a> for all your devices, so you can feel safe knowing they have the best remote SMB security<\/p>\n

Ensure Productivity from Home and Beyond<\/strong><\/h2>\n

For those employees that wish to work while on vacation, it\u2019s imperative that they can get safe access to your network when they need it and are able to collaborate with people in-office, as well.<\/p>\n

Having a stable video service to hold meetings and remote brainstorms is a fantastic way to maintain productivity remotely, but these services also need the utmost security. Collaboration tools like Cisco\u2019s Webex<\/a> provide end-to-end protection with zero-trust encryption to ensure meetings stay confidential. Webex makes sure only your employees have access to messages and recordings on your system.<\/p>\n

Everyone needs a vacation from time to time, but unfortunately, your network security can\u2019t [take a break like your employees can]. Cisco provides a huge array of digital tools and devices that keep your SMB network stable and secure. Contact a Cisco expert today<\/a>, and our team will help you find the right combination of tools and services that will keep your SMB safe no matter where life takes you.<\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":3726,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3725","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nRemote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm\" \/>\n<meta property=\"og:description\" content=\"While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an [\u2026] \u200b[[{"value":" While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an average of $955,000 per attack to restore their normal operations. If you\u2019re running a hybrid or fully remote SMB, there are some important things you should factor in if you plan to close your office or have employees traveling during the summer season. The Benefits of a Hybrid Work Environment We\u2019ve written a lot about the benefits of a hybrid work environment. The ability to work remotely has been a boon for both employees and SMB owners. Remote work environments can significantly reduce the cost of living for employees and reduce energy costs for businesses. But another huge benefit is the ability for employees to better manage their work-life balance, allowing them to take work on the road with them (if they choose to do so) and have more control over their workdays, which, studies have shown, leads to increased productivity. However, for all their benefits, hybrid work environments do introduce additional hurdles to overcome \u2014 especially when it comes to cybersecurity. How to Protect Your Data When Remote\u00a0 Hackers are fully aware that SMBs may not have the same resources as larger enterprises, which can make them an easy target. This includes safety protocols employees should practice in-office, best practices to follow when remote, and equipping both offices and remote workers with the best technology that gives them full access to the network safely. Safety Starts in the Home\u2026 Office When employees are scheduled to be out of the office, they should follow some best practices to keep their equipment and company data safe while away. Shutdown policies should be in place so that any employee who may be leaving their equipment (e.g., work computers, digital work devices, company phones, etc.) make sure they are locked and shut down properly. If anyone were to gain access to their work equipment, it\u2019s likely that no one would find out until they return from vacation, leaving your systems and data exposed for days on end. Scanning all endpoints and servers for any potential threats can protect you if you expect several employees will be taking time off, say during the summer months. Both your servers and the devices they are connected to (endpoints) have access to your company\u2019s data. It\u2019s an important best practice to scan both to make sure that the most recent security updates are active. Scanning will also ensure there are no malware or other vulnerabilities that may provide unauthorized access to your data when everyone is away. Again, the more employees there are out of office, the longer it will take for someone to notice your system has been compromised. By then, hackers can cause more damage without ever being found. CYA: Cover Your Assets Just because you might be away on vacation doesn\u2019t mean your system has to go unprotected. Managed service providers (MSPs) offer remote IT protection, helping you manage and secure your system while you are away. There has been a tremendous shift toward MSPs in the last few years, and for good reason. Between 2021 and 2023, data breaches rose by 72%, increasing the need for more dedicated remote IT protection\u2014whether offices are open for business or not. Multi-factor authentication (MFA) is another vital requirement when employees are on vacation. MFA provides an extra layer of protection, and a practice that should be implemented at all times but is especially important while out of office. It\u2019s important to ensure that all your employees have it enabled on their network-connected devices, especially if they plan on logging in while on vacation. If they happen to leave their phone or work computer in a hotel, you want to make it as difficult as possible for a hacker to access your system. Products like Cisco Duo provide zero-trust MFA protection for all your devices, so you can feel safe knowing they have the best remote SMB security Ensure Productivity from Home and Beyond For those employees that wish to work while on vacation, it\u2019s imperative that they can get safe access to your network when they need it and are able to collaborate with people in-office, as well. Having a stable video service to hold meetings and remote brainstorms is a fantastic way to maintain productivity remotely, but these services also need the utmost security. Collaboration tools like Cisco\u2019s Webex provide end-to-end protection with zero-trust encryption to ensure meetings stay confidential. Webex makes sure only your employees have access to messages and recordings on your system. Everyone needs a vacation from time to time, but unfortunately, your network security can\u2019t [take a break like your employees can]. Cisco provides a huge array of digital tools and devices that keep your SMB network stable and secure. Contact a Cisco expert today, and our team will help you find the right combination of tools and services that will keep your SMB safe no matter where life takes you. Share Share: "}]]\u00a0\u00a0While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-03T00:52:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm\",\"datePublished\":\"2024-08-03T00:52:07+00:00\",\"dateModified\":\"2024-08-03T00:52:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\"},\"wordCount\":1000,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\",\"name\":\"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif\",\"datePublished\":\"2024-08-03T00:52:07+00:00\",\"dateModified\":\"2024-08-03T00:52:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/","og_locale":"en_US","og_type":"article","og_title":"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm","og_description":"While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an [\u2026] \u200b[[{\"value\":\" While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an average of $955,000 per attack to restore their normal operations. If you\u2019re running a hybrid or fully remote SMB, there are some important things you should factor in if you plan to close your office or have employees traveling during the summer season. The Benefits of a Hybrid Work Environment We\u2019ve written a lot about the benefits of a hybrid work environment. The ability to work remotely has been a boon for both employees and SMB owners. Remote work environments can significantly reduce the cost of living for employees and reduce energy costs for businesses. But another huge benefit is the ability for employees to better manage their work-life balance, allowing them to take work on the road with them (if they choose to do so) and have more control over their workdays, which, studies have shown, leads to increased productivity. However, for all their benefits, hybrid work environments do introduce additional hurdles to overcome \u2014 especially when it comes to cybersecurity. How to Protect Your Data When Remote\u00a0 Hackers are fully aware that SMBs may not have the same resources as larger enterprises, which can make them an easy target. This includes safety protocols employees should practice in-office, best practices to follow when remote, and equipping both offices and remote workers with the best technology that gives them full access to the network safely. Safety Starts in the Home\u2026 Office When employees are scheduled to be out of the office, they should follow some best practices to keep their equipment and company data safe while away. Shutdown policies should be in place so that any employee who may be leaving their equipment (e.g., work computers, digital work devices, company phones, etc.) make sure they are locked and shut down properly. If anyone were to gain access to their work equipment, it\u2019s likely that no one would find out until they return from vacation, leaving your systems and data exposed for days on end. Scanning all endpoints and servers for any potential threats can protect you if you expect several employees will be taking time off, say during the summer months. Both your servers and the devices they are connected to (endpoints) have access to your company\u2019s data. It\u2019s an important best practice to scan both to make sure that the most recent security updates are active. Scanning will also ensure there are no malware or other vulnerabilities that may provide unauthorized access to your data when everyone is away. Again, the more employees there are out of office, the longer it will take for someone to notice your system has been compromised. By then, hackers can cause more damage without ever being found. CYA: Cover Your Assets Just because you might be away on vacation doesn\u2019t mean your system has to go unprotected. Managed service providers (MSPs) offer remote IT protection, helping you manage and secure your system while you are away. There has been a tremendous shift toward MSPs in the last few years, and for good reason. Between 2021 and 2023, data breaches rose by 72%, increasing the need for more dedicated remote IT protection\u2014whether offices are open for business or not. Multi-factor authentication (MFA) is another vital requirement when employees are on vacation. MFA provides an extra layer of protection, and a practice that should be implemented at all times but is especially important while out of office. It\u2019s important to ensure that all your employees have it enabled on their network-connected devices, especially if they plan on logging in while on vacation. If they happen to leave their phone or work computer in a hotel, you want to make it as difficult as possible for a hacker to access your system. Products like Cisco Duo provide zero-trust MFA protection for all your devices, so you can feel safe knowing they have the best remote SMB security Ensure Productivity from Home and Beyond For those employees that wish to work while on vacation, it\u2019s imperative that they can get safe access to your network when they need it and are able to collaborate with people in-office, as well. Having a stable video service to hold meetings and remote brainstorms is a fantastic way to maintain productivity remotely, but these services also need the utmost security. Collaboration tools like Cisco\u2019s Webex provide end-to-end protection with zero-trust encryption to ensure meetings stay confidential. Webex makes sure only your employees have access to messages and recordings on your system. Everyone needs a vacation from time to time, but unfortunately, your network security can\u2019t [take a break like your employees can]. Cisco provides a huge array of digital tools and devices that keep your SMB network stable and secure. Contact a Cisco expert today, and our team will help you find the right combination of tools and services that will keep your SMB safe no matter where life takes you. Share Share: \"}]]\u00a0\u00a0While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses, underscoring the constant threat, regardless of the season. And recovering from a cyberattack isn\u2019t cheap \u2013 small businesses spend an\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/","og_site_name":"JHC","article_published_time":"2024-08-03T00:52:07+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/"},"author":{"name":"","@id":""},"headline":"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm","datePublished":"2024-08-03T00:52:07+00:00","dateModified":"2024-08-03T00:52:07+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/"},"wordCount":1000,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/","url":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/","name":"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif","datePublished":"2024-08-03T00:52:07+00:00","dateModified":"2024-08-03T00:52:07+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/08\/16760404-SA1PRD.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/remote-smb-security-protect-your-business-while-traveling-ian-thompson-on-august-2-2024-at-344-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Remote SMB Security\u2014Protect Your Business While Traveling Ian Thompson on August 2, 2024 at 3:44 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=3725"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/3725\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/3726"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=3725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=3725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=3725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}