Skip to main contentClick to view our Accessibility Statement or contact us with accessibility-related questions.
woman checking her phone

Spot – and stop – today’s biggest security threats. 

The advent of our reliance upon technology requires a certain amount of diligence – for individuals, large businesses, and even small- and medium-sized businesses. Apart from the typical credit card hustles and phone and email scams, more insidious threats like ransomware and phishing attacks can cause irreparable damage.

Boost your knowledge and fortify your preventative measures now by learning about today’s biggest small business security threats and the solid solutions to shut them down:

Weak passwords – or worse, no passwords – spell trouble.

According to Verizon's 2017 Data Breach Investigations Report, more than 80 percent of breaches are caused by weak, compromised, or re-used passwords. Many individuals and businesses inadvertently leave the default user name and password on their routers, storage devices (attached to the network), and additional hardware. Others simply enter the easiest sequence (including “password” and “123456”) and often share passwords with co-workers or people outside the office.

Solution: Don’t just rely on luck; create strong, lengthy, and unique passwords and use both a password manager and multi-factor authentication. And don’t forget to ensure your printer has the latest security features like those offered by Xerox® ConnectKey® Technology.

hands typing on a laptop keyboard

Ransomware hits small business the hardest.

According to a March 2019 report, about 70% of ransomware attacks in 2018 targeted small businesses.1  Attackers access data and literally hold it hostage until a ransom is paid, and they target SMBs primarily because they spend less on IT, lack a security focus and present greater vulnerability.

Solution: Education and prevention are the best tools to combat the tide of ransomware threats. Ransomware travels generally through email (addressed below) but “malvertising,” or malware hidden in online ads, also spreads ransomware.

To minimize potential damage, it’s is essential to backup data, and use cloud storage (see Xerox® ConnectKey® state-of-the-art data and security) so data is completely protected at another source. Install antivirus, anti-malware, and anti-ransomware protection, use a traditional firewall to block unauthorized access and always always run frequent, scheduled security scans on all devices.

infographic: percent of security breaches

Something phishy going on.

Ubiquitous to modern communication is phishing, conducted using emails primarily sent through a business’s network. Attackers pose as a trustworthy source such as your bank in an attempt to gain protected information like usernames and passwords, account numbers, and credit cards. Ransomware often gets on your computer from a phishing email with an attachment such as a zip or exe file that is downloaded. Once your files are infected with ransomware, the virus encrypts them and prevents access.

Solution: Train yourself and employees in what to look for with phishing scams: while emails are the prevalent vehicle, websites, URLs, social media and phone/text hooks can all be used to lure in victims. Today’s hackers use very sophisticated methods such as stolen or altered business logos, attempting to use any scrap of information they can find to leverage trust. Refrain from opening zip files from unknown sources and question any email that asks for your personal information.

Employers should instruct workers not to use non-company websites (or to resist hitting ads or downloads) and create an anti-phishing tutorial. And again, remind workers to protect their inbox with strong email spam filters and regularly update and run software scans.

Woman in front of large windows working on laptop

BYOD brings another level of threats.

There’s no question that employees who utilize their own devices add greater value and productivity to their work roles, in addition to enjoying more personal freedom and flexibility. And yet, mobile phones and tablets present the weakest security link when users download mobile apps and connect to external Wi-Fi spots without proper security protocols in place. The mixing of personal and business data also poses enormous risks, especially when devices are lost or stolen.

Solution: Implement a personal device policy that defines boundaries and use a VPN, which grants access by verifying that the data being transferred from the mobile device to your IT network is encrypted and permitted. Enterprise Mobility Management software lets you monitor and detect risks before they have a calamitous effect.

People working and walking in an open office environment

Focus on Document Security.

Today’s printers do more than copy and print; they hold caches of sensitive information and are vulnerable to intrusion just like computers. With their own hard drives, operating systems and network connections, hackers can do a lot of damage to a business via an exposed printer.

Solution: Start by securing your printer in a controlled location, and then set up access restrictions such as passwords or smart cards. Xerox printers feature several secure print features to protect your organization’s most sensitive data, and our software and apps ensure digital data is safeguarded as you share it via the cloud and mobile devices.

Check out these security solutions videos and resources to see how we protect your valuable business information. And make printer security a top priority with a Xerox® ConnectKey® Technology-enabled printer.

Contact your reseller or Shop Xerox for a free consultation today.


2. Verizon 2019 Data Breach Investigations Report (DBIR)

Man looking between the shelves in a secure server room

Advanced Printer Security

Trust ConnectKey comprehensive security to protect your confidential data and documents. 

Busy office with a Xerox VersaLink C505 MFP

Xerox Small and Medium Business Solutions & Services

Find small business solutions for printing and printer management, insights into solving workflow and printing efficiency for small and medium businesses.

Related Articles

  • Hands typing on a laptop with digital symbols and specks of light floating above

    How to free up your time to make a more efficient workday

    We’ve pulled together some of the best tips we’ve learned from various small business owners through the years.

  • Woman holding blue toner cartridge

    Why cheap toner is a false economy

    Don’t be fooled by its price tag

  • Xerox Workflow Central Platform on a tablet screen

    Five signs that it’s time to replace your printer

    When do you need a new printer? Here are five signs that it’s time to replace your printer.

  • Two men looking at a computer screen

    Three tips to make printing more secure

    Keep data confidential when printing, scanning and sharing. Here are 3 tips for secure printing on your Xerox printer.

  • Man sitting at a desking looking at a laptop.

    Xerox Awarded BLI Smart Workplace Solutions Line of the Year

    Buyers Lab (BLI) awarded Xerox with Smart Workplace Solutions Line of the Year Award 6 years in a row. See how we can help you meet the challenges of hybrid work.

  • Man sitting at desk on laptop.

    Bell Law Case Study

    Discover how a leading employment law firm overcame document processing and sharing hurdles with the innovative solutions provided by Xerox® Workflow Central.