Skip to main contentClick to view our Accessibility Statement or contact us with accessibility-related questions.

hands typing on a laptop with digital world hovering over hands

5 Questions You Need to Ask to Assess Your Cybersecurity Readiness

There’s no question about it: cybercriminals are out there and applying their dubious work ethic every day to taking from business owners just like you. From customers’ personal identifying information to intellectual property to simply crippling essential systems until a ransom is paid, these hackers are endlessly inventive with one end goal in mind: making easy money.

The consequences of a data breach are so severe that 60 percent of victimized businesses fail within six months, according to Security Magazine.

43% of all cyberattacks target small businesses

Here’s the good news: falling prey to an unscrupulous hacker isn’t inevitable and your business doesn’t have to become a statistic. Get started on assessing – and then filling – any gaps in your cybersecurity today with these five key readiness questions.

Question One: Are my employees ready to resist?

The reality is that employees are often the easiest route into a company’s secure systems. In fact, a 2021 Barracuda Networks research report demonstrated that “an employee of a small business with less than 100 employees will experience 350% more social engineering attacks than an employee of a larger enterprise.” And what’s more: leaders are not immune, with “CEO and CFO accounts almost twice as likely to be taken over compared to average employees.”

When was your most recent cybersecurity training for employees? Did it cover the major categories they’re most likely to encounter? The Small Business Association notes that comprehensive training should include:

  • Spotting phishing emails

  • Using good internet browsing practices

  • Avoiding suspicious downloads

  • Enabling authentication tools (e.g., strong passwords, Multi-Factor Authentication, etc.)

  • Protecting sensitive vendor and customer information

How confident are you that your teams can shine in each area?

Question Two: Are your vendor solutions compliant with industry security standards?

Most companies today have outsourced software and other needs to cloud-based vendors – for efficiency, cost effectiveness, and the guarantee of always up/always on accessibility, which is increasingly non-negotiable in a world of hybrid and remote work.

Each technology that’s integrated in your IT environment must be compliant with security standards. Start by asking vendors what their baseline cybersecurity measures are – and especially probe on how they keep up with a fast-paced and dynamic threat environment. Triangulate their responses by reading reviews by reputable third-party cybersecurity outlets; these will provide clear-eyed perspective on what exactly the strengths and weaknesses are.

Question Three: Do you run regular vulnerability scans and penetration testing?

Across sectors and industries, businesses regularly run disaster simulations – whether it’s preparing employees to act in a workplace violence situation or what to do in a natural disaster. But what’s essential for every business to do is penetration testing, a form of evaluation that determines how easy it is for malicious actors to hack into a business’s systems.

When was the last time you ran a penetration test? Are you diligent about running regular updates on all software solutions and implementing security patches for new vulnerabilities?

Question Four: Do you know how valuable your data is – and is your protection commensurate with its worth?

All data is not created equal. It may all be valuable to a company but that doesn’t mean it’s valuable to a hacker. It often helps to assess exactly what kind of data your company relies on. Think about what’s:

  • Unique to your business: Your intellectual property and other essential data are highly valuable to you and therefore proportionately more valuable to a cybercriminal

  • A reputational risk: Losing a client’s basic personal identifiable information – like their home address and social security number – is bad enough but leaving other kinds of personal information, like confidential medical records, vulnerable can really damage a company’s reputation in the eyes of clients and the public.

  • Actionable: certain data can be subject to penalties (legal or contractual) depending on customer types and regulations

Have you spent the time to review and rank the data your business relies on – and to anticipate the ramifications if you were prevented from accessing it or it became public? It’s an exercise worth doing.

Question Five: Do you know what to do when something goes wrong?

There’s a reason the aphorism “Hope for the best, prepare for the worst” endures: it’s smart practice. Of course, none of us want anything bad to happen to our businesses. It’s human nature to assume that we’re too small to attract the wrong kind of notice. Unfortunately, the statistics don’t bear out that optimism: you are a target.

Instead, ask yourself and your team to think about how prepared you are if a cybercriminal is successful. What does your incident response plan look like? How robust is it? And how often do you reevaluate it against new and emerging threats? A managed service can take some of this rather substantial work off your hands but it’s still worth understanding where you are in terms of your preparedness for when the worst happens.

It’s never too late to get ready to face the cyberthreats that are just part of doing business – of any kind – in the world today. With these questions to guide you, you can begin to take charge of your readiness right now.

Get In Touch Today About Cybersecurity Readiness

Getting breached is not a question of if, but when. Xerox IT Services includes cybersecurity experts ready to tailor best practices and insights to your unique situation and needs.

Fingers typing on a laptop keyboard, behind a transparent row of security icons

Xerox® IT Services

End-to-end IT solutions with 24/7/365 support for small and medium businesses.

Customer Success Stories

Some hiking gear and a bag of Burts Potato Chips next to a stream

How Xerox’s IT Solution Recipe Improved Burts Chips

See how Burts Chips significantly reduced time spent on IT issues with the help of Xerox IT Services.

A woman at a large shared desk sorting papers

How Lexitas Uses Xerox RPA to Save Hundreds of Employee Work Hours Each Month.

See how a litigation support company put routine tasks on autopilot with Xerox Robotic Process Automation (RPA).

Teacher standing in classroom

One simple solution helped thousands of students.

Buena Park School District in California’s Orange County serves a diverse ethnic and socio-economic student population of approximately 4,600 students in five elementary schools, two middle school campuses, and one K-8 online academy. Find out how we helped teachers and staff save time, improve communication with parents in their preferred language, and ultimately enhance the learning experience for all.

Share