Logo - Business Development Bank of Canada - BDC

Your checklist for avoiding IT security breaches

3-minute read

The most pressing information technology security problem facing Canadian entrepreneurs is not computer hackers. The majority of security breaches actually come from a company’s own employees.

They’re usually not doing it on purpose, though: Most breaches are accidents, such as an employee mistakenly emailing confidential client information outside the company, a cashier leaving a customer’s credit card information on a publicly viewable computer, or a manager inadvertently deleting important files.

Downloaded breaches

One of the most common breaches: Accidentally downloading malware—those nasty little computer viruses and Trojan horses that can cause mayhem in your computer network.

Four in five Canadian small and medium-sized enterprises (SMEs) report experiencing a security problem related to information and communications technologies (ICT) caused by an employee in the previous year, according to industry research. But most SMEs don’t do much about it until it’s too late.

Many business owners pay lip service to tech security, but they don’t invest money in it.

As a result, actions usually gets postponed until the day an essential computer crashes or vital data gets wiped out in a malware attack.

And with the proliferation of mobile devices, wireless computing and remote workers, the security challenge is growing bigger for entrepreneurs.

Evaluate your technology security

But IT security doesn’t have to be sporadic and piecemeal.

Ideally, you should regularly evaluate your IT security as part of a larger review of all your systems. The idea is to make sure your tech gear and processes aren’t out of step with your business strategy.

Here is an ICT security checklist SMEs can follow as part of this review:

1. Strategy and human resources policies

  • Does your company have a clear ICT security policy that’s known to staff?
  • Do you have a policy on acceptable ICT use, password guidelines and security practices?
  • Do you have confidentiality agreements for contractors and vendors?
  • Does your company have a privacy policy?

2. Data backup

  • For critical data (this is anything needed in day-to-day operations, including customer information), do you centralize it on a server and back it up nightly to a remote location?
  • For important data (anything important to the business but that doesn’t get updated frequently), do you centralize it on a server and back it up semi-regularly off-site?

3. Desktop security

  • Do all computers have working anti-virus software?
  • Do you have a security policy for downloading and installing new software?
  • Do you have passwords with a minimum of eight alphanumeric characters that are changed every 90 days?
  • Are all computers updated with the latest system updates and security patches?

4. Internet and network security

  • Do you have a firewall and intrusion detection on all web connections?
  • Do you use a virtual private network for remote access?
  • Are all modem and wireless access connections known and secured?

5. Privacy and sensitive information

  • Is customer financial information encrypted and accessible only to those who need it?
  • Are paper files kept in locked filing cabinets with controlled access?

6. Audit

  • Do you do a periodic audit (every six months at least) of your ICT security checklist?

Next step

Contact us to get expert help. We can help you get a cybersecurity certification that will increase customer confidence.

Your privacy

BDC uses cookies to improve your experience on its website and for advertising purposes, to offer you products or services that are relevant to you. By clicking ῝I understand῎ or by continuing to browse this site, you consent to their use.

To find out more, consult our Policy on confidentiality.