• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
PointCloud

5 Best Practices for Keeping Your Business Safe From Hackers

By
Entrepreneur
Entrepreneur
and
Felix Tarcomnicu
Felix Tarcomnicu
Down Arrow Button Icon
By
Entrepreneur
Entrepreneur
and
Felix Tarcomnicu
Felix Tarcomnicu
Down Arrow Button Icon
January 26, 2017, 8:00 PM ET
Log In On A Secure Website
BERLIN, GERMANY - AUGUST 04: Symbol of a website login with the password '123456', on a computer screen on August 04, 2016, in Berlin, Germany. (Photo by Thomas Trutschel/Photothek via Getty Images)***Local Caption***Photograph by Thomas Trutschel—Photothek via Getty Images

This article originally appeared on Entrepreneur.

Designing and implementing a strategy for enterprise security is highly important and should be prioritized as the world becomes more dependent on technology.

According to a report by IBM (IBM), more than one billion personal records were leaked or stolen in 2014 alone. This was the highest recorded number of data breaches by IBM over the last 18 years.

Another study by the Enterprise Security Group (ESG) showed that from 2013 to 2015, 49 percent of companies experienced data breaches, and 75 percent were breached more than once.

In these incidents, it was noted that attacks originated from the following sources: point of sale systems (PoS), third party vendors and unencrypted data.

A troublesome finding was that the largest and most damaging attacks came from a single point of entry or source.

Companies should never remain complacent on its present best practices and strategies for enterprise security. Criminals are always trying to stay a step ahead by bypassing security systems that are in place. Unless your security systems continually evolve, and go through a process of upgrades, it would be difficult to keep your valuable data protected from theft or unlawful distribution.

How do we fortify our security systems? It all starts with developing a foundation for enterprise security, which begins with these five basic tools.

1. Your first line of defense are firewalls.

This is your first line of defense. A firewall dictates what data flows through and where it should go. Firewalls keep unwanted files from breaching your network and compromising your assets.

The standard process for instituting firewalls is just at the external perimeter of your network. But an increasingly popular strategy is to include internal firewalls.

This is one of the latest best practices adopted by several companies. It provides a second line of defense and keeps suspicious external network traffic away.

Firewalls are fast evolving. Many are able to control the flow of data by identifying the type of application used.

2. Use a secure router to police the flow of traffic.

Routers are used by networks mainly to police the flow of traffic. But routers are actually complete with security features.

There are some routers that have better security features than a firewall. These include the following:

  • Intrusion Defense System (IDS) functionality
  • Intrusion Prevention System (IPS) functionality
  • Service and traffic functionality tools
  • Strong Virtual Private Network (VPN) data encryption

An IDS is different from an IPS. An IPS functions more like a firewall with more complex guidelines for qualifying data flow. An IDS functions like a traffic monitoring system, identifying potential breaches at different points of the network. Having both greatly improves your best practices.

3. Have a Wi-Fi Protected Access 2 (WPA2).

A WPA2 is popularly used on wi-fi networks. It is much better than its predecessor and uses stronger wireless encryption methods.

This system is more difficult for hackers and cyber-criminals to break. WPA2 comes with different types of encryption.

The first is Temporal Key Integrity Protocol (TKIP). It was introduced as a support encryption system to the original WPA. TKIP is no longer considered a valuable encryption system and is largely disregarded by best practices and strategies.

Then there’s an Advanced Encryption Standard (AES). This is a high-level encryption system that is used even by the U.S. government. AES is a standard feature for WPA2 although the TKIP feature remains available to be compatible with legacy devices.

If you have a router, make sure to turn on the WPA2 feature to protect your network. Without it, the safety of your own network can easily be compromised.

A person, who can breach your network, can slow it down or gain access and retrieve valuable information such as passwords and bank account numbers.

4. Keep your email secure.

Your email is a highly sought after target by black hat hackers. It is not uncommon to receive email from suspicious sources.

According to Verizon’s 2016 Data Breach Investigations Report, phishing, or the act of receiving an email from a fraudulent source, has become increasingly effective with 30 percent of these emails actually opened.

These spurious emails often find their way into the spam folder and contain malware, viruses and worms, intended to disrupt your system or retrieve valuable data.

Keep in mind that 86 percent of the world’s emails are spam; they are unwanted and unsolicited. Even though the latest email filters are able to remove most of your spam emails, you should continue to update your current protocols.

If more spam email is getting through your current filtering system it only means you are at greater risk of getting malware.

5. Use web security.

In the same Verizon (VZ) Data Breach Investigations Report, it stated that attacks against web applications have increased at an alarming rate, with 51 percent of the victims being financial institutions.

Attacks are becoming more complex and frequent, which makes simple URL filtering no longer sufficient. Among the features that should be considered for a robust web security system are:

  • AV Scanning
  • Malware Scanning
  • IP reputation awareness
  • Dynamic URL categorization techniques
  • Data leakage prevention function

A web security system must be dynamic and have the ability to accurately scan web traffic. Web security should be highly prioritized in a best practices and strategies for enterprise security set of protocols.

If you are serious about protecting your data, you should invest in a comprehensive web security system such as BlueCoat or an advanced managed security services provider, such as Masergy.

In addition to building a foundation of enterprise security based on these standard tools, you should also view best practices and strategies from the procedural perspective.

  • Audit your systems regularly. Patch up vulnerabilities whenever identified.
  • Limit the extent of administrative access.
  • Review outbound access. If there are networks or programs that are no longer needed or infrequently used, shut it down.
  • Use and update firewalls in areas or segments where critical data is stored.
  • Automate auditing systems, such as for firewall or antivirus updates to keep everything current.
  • Document your security policies in knowledge database, and consistently update whenever there are changes and revisions. Make sure key people in your company are informed and updated on all changes to the security system.
  • Always make sure that security is a priority of all departments. If you have a department on IT Security, they must regularly orient and update other departments of important protocols and developments to ensure it is treated as a priority.
  • Apply analytics and use quantifiable measures to assess the level of integrity of your enterprise security measures. You should always have bases to see the strengths and weaknesses of your system. Remember that hackers are always trying to stay one step ahead of current best practices and strategies.
  • A digital certificate functions like an electronic passport and allows a person, organization or computer to exchange information securely over the Internet by using a Public Key Infrastructure (PKI). Make sure these digital certificates are saved on hardware, such as routers and load balancers and not on web servers.
  • Implement a strict policy on removable media, such as USB drives, external hard drives, thumbdrives and external disk writers. These examples of removable media are potential facilitators or sources of a data breach.

More from Entrepreneur:
• 4 Foolish Cybersecurity Mistakes Robert Herjavec Is Shocked People Still Make
• Cybersecurity Planning is Finally Demystified (Infographic)
• 6 Things You Should Know About ‘Anti-Google’ Search Engine DuckDuckGo

Data integrity is highly important and should be viewed as a dynamic, ever-evolving process. Complacency and blind faith in your current best practices and strategies could result in the eventual downfall of your enterprise security system. You should prioritize improving data security, and stay ahead of the criminals—instead of the other way around.

About the Authors
By Entrepreneur
See full bioRight Arrow Button Icon
By Felix Tarcomnicu
See full bioRight Arrow Button Icon

Latest in

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in

Chinese court rules firms can’t lay off workers on AI grounds
AIChina
Chinese court rules firms can’t lay off workers on AI grounds
By Victor Swezey and BloombergMay 3, 2026
2 hours ago
Iran has collected a ‘pittance’ of less than $1.3 million in Hormuz tolls, Bessent says, as currency dives to fresh record low
PoliticsIran
Iran has collected a ‘pittance’ of less than $1.3 million in Hormuz tolls, Bessent says, as currency dives to fresh record low
By Adam Schreck, Melanie Lidman and The Associated PressMay 3, 2026
2 hours ago
2 U.S. service members missing after multinational war games in Morocco
PoliticsU.S. military
2 U.S. service members missing after multinational war games in Morocco
By The Associated PressMay 3, 2026
2 hours ago
Landlords who were barred from evicting tenants during COVID are in settlement talks with DOJ to recoup as much as $1.5 billion
Real EstateHousing
Landlords who were barred from evicting tenants during COVID are in settlement talks with DOJ to recoup as much as $1.5 billion
By Michael Casey and The Associated PressMay 3, 2026
3 hours ago
Trumps says some ‘very interesting’ UFO files will be revealed, and the Pentagon promises ‘never-before-seen’ information
PoliticsDonald Trump
Trumps says some ‘very interesting’ UFO files will be revealed, and the Pentagon promises ‘never-before-seen’ information
By Collin Binkley and The Associated PressMay 3, 2026
3 hours ago
The dollar has fallen 10% under Trump. It helps big multinational companies but is a ‘hidden tax’ raising costs from vacations to groceries
North AmericaCurrency
The dollar has fallen 10% under Trump. It helps big multinational companies but is a ‘hidden tax’ raising costs from vacations to groceries
By Matt Sedensky and The Associated PressMay 3, 2026
3 hours ago

Most Popular

Scott Bessent on financial literacy: 'it drives me crazy' to see young men in blue-collar construction jobs playing the lottery
Personal Finance
Scott Bessent on financial literacy: 'it drives me crazy' to see young men in blue-collar construction jobs playing the lottery
By Fatima Hussein and The Associated PressMay 1, 2026
2 days ago
Gen Z is rebelling against the economy with ‘disillusionomics,’ tackling near 6-figure debt by turning life into a giant list of income streams
Economy
Gen Z is rebelling against the economy with ‘disillusionomics,’ tackling near 6-figure debt by turning life into a giant list of income streams
By Jacqueline MunisMay 2, 2026
1 day ago
America got rich and got sad. A top economist says 2020 broke something that hasn't healed
Economy
America got rich and got sad. A top economist says 2020 broke something that hasn't healed
By Nick LichtenbergMay 3, 2026
7 hours ago
The American household just took an 81% margin cut. Wall Street hasn’t priced it in
Commentary
The American household just took an 81% margin cut. Wall Street hasn’t priced it in
By Katica RoyMay 2, 2026
1 day ago
Stop donating to Harvard and the Ivy League. There's a better option that MacKenzie Scott already figured out
Commentary
Stop donating to Harvard and the Ivy League. There's a better option that MacKenzie Scott already figured out
By Ed Smith-LewisMay 2, 2026
1 day ago
China dominates the world's lithium supply. The U.S. just found 328 years' worth in its own backyard
North America
China dominates the world's lithium supply. The U.S. just found 328 years' worth in its own backyard
By Jake AngeloApril 30, 2026
3 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.