SlideShare a Scribd company logo
1 of 2
Download to read offline
10 STEP SECURITY CHECKLIST.
Your step-by-step guide to a safer business.
>40%
of data breach victims were
small-to-medium businesses
with 1,000 or fewer employees.4
$214Average cost of a data
breach per compromised
customer record.2
60%
of small businesses will close
within half a year of being
victimized by cybercrime.3
GROWING YOUR BUSINESS IS YOUR
PRIORITY. PROTECTING IT IS OURS.
Visit us on the web, at: www.mcafee.com/smallbusiness
1
“Five Steps to Building a Stronger SMB.” McAfee, 2013.
https://endpointprotection.mcafee.com/security-manageme
nt/five-steps-to-building-a-stronger-smb/
2
“The New Reality of Stealth Crimeware.” McAfee, 2011.
http://www.mcafee.com/us/resources/white-papers/wp-reali
ty-of-stealth-crimeware.pdf
3
“Most Small Businesses Don't Recover From Cybercrime.”
Wall Street Journal, March 2013.
http://online.wsj.com/article/SB1000142412788732455780
4578376291878413744.html
4
“2013 Data Breach Investigations Report.” Verizon, 2013.
http://www.verizonenterprise.com/DBIR/2013/
5
“The Effect of BYOD on Information Security.” InfoSecurity,
June 2013.
http://www.infosecurity-magazine.com/view/32779/the-effe
ct-of-byod-on-information-security/
6
“2012 National Small Business Study.” National Cyber
Security Alliance with Symantec.
http://www.staysafeonline.org/download/datasets/4393/20
12_ncsa_symantec_small_business_study_fact_sheet.pdf
7
“Survey: Secure and Compliant Collaboration Ends at the
Firewall for 68 Percent of Organizations Globally.” Intralinks
Holdings, Inc., March 2012.
http://www.intralinks.com/news-events/press-releases/2012/
03/19/intralinks-survey-secure-compliant-collaboration
8
“Global Survey on Social Media Risks.” Ponemon Institute,
September, 2011.
http://www.websense.com/assets/reports/websense-social-
media-ponemon-report.pdf
Think cybercriminals only
target big companies?
More than 75% of data breaches target small and medium sized
businesses1
(SMB), and that can have serious costs—both financial
and to your reputation. But there are some simple steps you can
take to better protect your customers, employees, and assets so
you can focus on what you do best: building your business.
TRAIN YOUR EMPLOYEES
Your cybersecurity is only as strong as your weakest link.
Train your employees to use strong passwords and avoid
dangerous links and email attachments.
1
KNOW YOUR DATA
Do you know where all your confidential information is?
Locate and limit access to private data.
2
76%of network intrusions exploited
weak credentials.4
KNOW YOUR DEVICES
Identify and secure all devices your employees use,
including thumb drives, smartphones, and tablets.
3
PROTECT YOUR NETWORK
Today’s users connect anywhere at any time.
Protect network access with VPNs and firewalls.
4
KEEP YOUR FACILITIES SAFE
Don’t let strangers wander the halls. Limit physical
access with locked doors and managed entry systems.
6
SECURE PHYSICAL DEVICES
Keep your servers and unused devices safe behind
locked doors with limited access.
5
PROTECT YOUR WEBSITE AND
ENSURE SAFE BROWSING
Reassure your customers with trustmarks on your website,
and protect employees with strong anti-malware software.
7
SCREEN EMPLOYEES THOROUGHLY
Job seekers can bend the truth. Conduct thorough
background checks before hiring new employees.
10
PROPERLY DISPOSE OF END-OF-
LIFE DEVICES AND DOCUMENTS
Foil dumpster divers by physically shredding old paper
documents and digitally shredding data on retired devices.
9
ONLY 17%of SMBs take any steps to secure
company data on personal devices.5
68%of organizations still use email as their
main method to send and exchange
large files and sensitive data.7
52%of organizations experienced an
increase in malware attacks as a result
of employees’ use of social media.8
CREATE CLEAR CYBERSECURITY
POLICIES
Set clear written policies on use and disposal
of confidential documents and devices.
8
77%of SMBs think having a strong
cybersecurity and online safety posture
is good for their company's brand.6
44%of SMBs agree that their customers
are concerned about the IT security
of their business.6
73%of SMBs say a safe and trusted Internet
is critical to their business’s success.6
10 STEP SECURITY CHECKLIST.
TRAIN YOUR EMPLOYEES
Visit us on the web, at: www.mcafee.com/smallbusiness
KNOW YOUR DATA
KNOW YOUR DEVICES
PROTECT YOUR NETWORK
SECURE PHYSICAL DEVICES
KEEP YOUR FACILITIES SAFE
PROTECT YOUR WEBSITE AND
ENSURE SAFE BROWSING
CREATE CLEAR CYBER
SECURITY POLICIES
PROPERLY DISPOSE OF END-OF-
LIFE DEVICES AND DOCUMENTS
SCREEN EMPLOYEES THOROUGHLY
1
2
3
4
5
6
7
8
9
10

More Related Content

What's hot

How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsNowSecure
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?SwiftTech Solutions, Inc.
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakesmxotech
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 PresentationCyren, Inc
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security firesKristin Helgeson
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaMuhammadRadwan10
 

What's hot (20)

How to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’tsHow to make Android apps secure: dos and don’ts
How to make Android apps secure: dos and don’ts
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Aiman
AimanAiman
Aiman
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Checklist for Preventing Ransomware
Checklist for Preventing RansomwareChecklist for Preventing Ransomware
Checklist for Preventing Ransomware
 
Azlan Security Offering
Azlan Security OfferingAzlan Security Offering
Azlan Security Offering
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
6 Tips to Protect Your Kids from Cyberbullying
6 Tips to Protect Your Kids from Cyberbullying6 Tips to Protect Your Kids from Cyberbullying
6 Tips to Protect Your Kids from Cyberbullying
 
spyware
spywarespyware
spyware
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 

Viewers also liked

Beach Premonade (dragged) 2
Beach Premonade (dragged) 2Beach Premonade (dragged) 2
Beach Premonade (dragged) 2Ibrahim Barake
 
כל סרוויס - הפורטל לעסקים קטנים ובינוניים
כל סרוויס - הפורטל לעסקים קטנים ובינונייםכל סרוויס - הפורטל לעסקים קטנים ובינוניים
כל סרוויס - הפורטל לעסקים קטנים ובינונייםyaeldulman
 
What does your cat eat?
What does your cat eat?What does your cat eat?
What does your cat eat?yaeldulman
 
香港六合彩
香港六合彩香港六合彩
香港六合彩sinazou
 
Tanzanite Buying Guide
Tanzanite Buying GuideTanzanite Buying Guide
Tanzanite Buying GuideTop Tanzanite
 
Reken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter Voogten
Reken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter VoogtenReken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter Voogten
Reken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter VoogtenDigital Sports Day
 
Succes met Digitale Marketing - Peter Sprenger
Succes met Digitale Marketing - Peter SprengerSucces met Digitale Marketing - Peter Sprenger
Succes met Digitale Marketing - Peter SprengerDigital Sports Day
 

Viewers also liked (12)

HonorRoll_P
HonorRoll_PHonorRoll_P
HonorRoll_P
 
Beach Premonade (dragged) 2
Beach Premonade (dragged) 2Beach Premonade (dragged) 2
Beach Premonade (dragged) 2
 
כל סרוויס - הפורטל לעסקים קטנים ובינוניים
כל סרוויס - הפורטל לעסקים קטנים ובינונייםכל סרוויס - הפורטל לעסקים קטנים ובינוניים
כל סרוויס - הפורטל לעסקים קטנים ובינוניים
 
What does your cat eat?
What does your cat eat?What does your cat eat?
What does your cat eat?
 
Health and Safety
Health and SafetyHealth and Safety
Health and Safety
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Esther MDFP Certificate
Esther MDFP CertificateEsther MDFP Certificate
Esther MDFP Certificate
 
hacer
hacerhacer
hacer
 
Tanzanite Buying Guide
Tanzanite Buying GuideTanzanite Buying Guide
Tanzanite Buying Guide
 
Reken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter Voogten
Reken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter VoogtenReken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter Voogten
Reken verdedigers niet af op het aantal gescoorde doelpunten! – Pieter Voogten
 
Succes met Digitale Marketing - Peter Sprenger
Succes met Digitale Marketing - Peter SprengerSucces met Digitale Marketing - Peter Sprenger
Succes met Digitale Marketing - Peter Sprenger
 
MATH TRICKS
MATH TRICKSMATH TRICKS
MATH TRICKS
 

Similar to mcafee-10-steps-infographic-d2

Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxDCEISO580thACWW
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfNirGoldstein5
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Ainsha Noordin (Umie)
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessYork Risk
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 

Similar to mcafee-10-steps-infographic-d2 (20)

Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 

mcafee-10-steps-infographic-d2

  • 1. 10 STEP SECURITY CHECKLIST. Your step-by-step guide to a safer business. >40% of data breach victims were small-to-medium businesses with 1,000 or fewer employees.4 $214Average cost of a data breach per compromised customer record.2 60% of small businesses will close within half a year of being victimized by cybercrime.3 GROWING YOUR BUSINESS IS YOUR PRIORITY. PROTECTING IT IS OURS. Visit us on the web, at: www.mcafee.com/smallbusiness 1 “Five Steps to Building a Stronger SMB.” McAfee, 2013. https://endpointprotection.mcafee.com/security-manageme nt/five-steps-to-building-a-stronger-smb/ 2 “The New Reality of Stealth Crimeware.” McAfee, 2011. http://www.mcafee.com/us/resources/white-papers/wp-reali ty-of-stealth-crimeware.pdf 3 “Most Small Businesses Don't Recover From Cybercrime.” Wall Street Journal, March 2013. http://online.wsj.com/article/SB1000142412788732455780 4578376291878413744.html 4 “2013 Data Breach Investigations Report.” Verizon, 2013. http://www.verizonenterprise.com/DBIR/2013/ 5 “The Effect of BYOD on Information Security.” InfoSecurity, June 2013. http://www.infosecurity-magazine.com/view/32779/the-effe ct-of-byod-on-information-security/ 6 “2012 National Small Business Study.” National Cyber Security Alliance with Symantec. http://www.staysafeonline.org/download/datasets/4393/20 12_ncsa_symantec_small_business_study_fact_sheet.pdf 7 “Survey: Secure and Compliant Collaboration Ends at the Firewall for 68 Percent of Organizations Globally.” Intralinks Holdings, Inc., March 2012. http://www.intralinks.com/news-events/press-releases/2012/ 03/19/intralinks-survey-secure-compliant-collaboration 8 “Global Survey on Social Media Risks.” Ponemon Institute, September, 2011. http://www.websense.com/assets/reports/websense-social- media-ponemon-report.pdf Think cybercriminals only target big companies? More than 75% of data breaches target small and medium sized businesses1 (SMB), and that can have serious costs—both financial and to your reputation. But there are some simple steps you can take to better protect your customers, employees, and assets so you can focus on what you do best: building your business. TRAIN YOUR EMPLOYEES Your cybersecurity is only as strong as your weakest link. Train your employees to use strong passwords and avoid dangerous links and email attachments. 1 KNOW YOUR DATA Do you know where all your confidential information is? Locate and limit access to private data. 2 76%of network intrusions exploited weak credentials.4 KNOW YOUR DEVICES Identify and secure all devices your employees use, including thumb drives, smartphones, and tablets. 3 PROTECT YOUR NETWORK Today’s users connect anywhere at any time. Protect network access with VPNs and firewalls. 4 KEEP YOUR FACILITIES SAFE Don’t let strangers wander the halls. Limit physical access with locked doors and managed entry systems. 6 SECURE PHYSICAL DEVICES Keep your servers and unused devices safe behind locked doors with limited access. 5 PROTECT YOUR WEBSITE AND ENSURE SAFE BROWSING Reassure your customers with trustmarks on your website, and protect employees with strong anti-malware software. 7 SCREEN EMPLOYEES THOROUGHLY Job seekers can bend the truth. Conduct thorough background checks before hiring new employees. 10 PROPERLY DISPOSE OF END-OF- LIFE DEVICES AND DOCUMENTS Foil dumpster divers by physically shredding old paper documents and digitally shredding data on retired devices. 9 ONLY 17%of SMBs take any steps to secure company data on personal devices.5 68%of organizations still use email as their main method to send and exchange large files and sensitive data.7 52%of organizations experienced an increase in malware attacks as a result of employees’ use of social media.8 CREATE CLEAR CYBERSECURITY POLICIES Set clear written policies on use and disposal of confidential documents and devices. 8 77%of SMBs think having a strong cybersecurity and online safety posture is good for their company's brand.6 44%of SMBs agree that their customers are concerned about the IT security of their business.6 73%of SMBs say a safe and trusted Internet is critical to their business’s success.6
  • 2. 10 STEP SECURITY CHECKLIST. TRAIN YOUR EMPLOYEES Visit us on the web, at: www.mcafee.com/smallbusiness KNOW YOUR DATA KNOW YOUR DEVICES PROTECT YOUR NETWORK SECURE PHYSICAL DEVICES KEEP YOUR FACILITIES SAFE PROTECT YOUR WEBSITE AND ENSURE SAFE BROWSING CREATE CLEAR CYBER SECURITY POLICIES PROPERLY DISPOSE OF END-OF- LIFE DEVICES AND DOCUMENTS SCREEN EMPLOYEES THOROUGHLY 1 2 3 4 5 6 7 8 9 10