{"id":13161,"date":"2019-04-16T16:16:21","date_gmt":"2019-04-16T12:16:21","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity\/13161\/"},"modified":"2019-11-15T15:22:21","modified_gmt":"2019-11-15T11:22:21","slug":"startup-cybersecurity","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity\/13161\/","title":{"rendered":"Startups and information security"},"content":{"rendered":"<p>Startups tend to be created by people who burn with an idea and want to put it into action as soon as possible. Money is usually tight, and expenses run high, what with product development, promotion, and all the rest of it. When managing priorities, emerging businesspeople often neglect matters related to information security. This post is about why one shouldn\u2019t do that.<\/p>\n<h2>A hacker\u2019s meat is a startup\u2019s poison<\/h2>\n<p>Many startups try to save on security, confident that a small company with limited resources holds no interest for cybercriminals. The truth is, anyone can fall victim to cybercrime. First, because many cyberthreats are massive in scale, their originators aim wide, trying to hit as many as they can in the hopes that at least some will generate a return. Second, commonly being weakly protected, startups present attractive targets for cybercriminals.<\/p>\n<p>Whereas corporations sometimes spend months to recover from a cyberattack, a small company may simply not survive one. In 2014, hostile cybercriminal actions brought about the closure of a startup called <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2014\/06\/18\/code_spaces_destroyed\/\" rel=\"noopener noreferrer nofollow\">Code Spaces<\/a>, a hosting provider with tools for joint project management. The attackers accessed the company\u2019s cloud resources and destroyed a considerable portion of its clients\u2019 data. The service owners restored as much data as they could, but they were unable to return to normal operation.<\/p>\n<h3>Mistakes that may cost you your business<\/h3>\n<p>To properly safeguard your startup, given a limited budget, you might want to build a threat model before you go ahead with the launch\u00a0\u2014 to figure out which risks are relevant for your business. Here, we help you by covering the typical mistakes of many first-time entrepreneurs.<\/p>\n<h4>1. Lack of knowledge about personal data storage and processing laws<\/h4>\n<p>Many governments try to safeguard the security of their citizens. Europe has the <a target=\"_blank\" href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\" rel=\"noopener noreferrer nofollow\">GDPR<\/a>, and in the U.S. there are <a target=\"_blank\" href=\"https:\/\/iclg.com\/practice-areas\/data-protection-laws-and-regulations\/usa\" rel=\"noopener noreferrer nofollow\">multiple acts for different industries and states<\/a>. All of these laws apply, regardless of whether you have read them.<\/p>\n<p>The punishment for breach of the related legal requirements may vary, but negligence is very likely to cost you a pretty penny: a fine at the very least\u00a0\u2014 and a big one, too. At worst, you will have to suspend operations until you\u2019ve eliminated any nonconformities with the relevant laws.<\/p>\n<p>One more important detail: Sometimes the law has a wider coverage than you might expect. For example, GDPR applies to all companies that handle European citizens\u2019 data, even those from Russia or the U.S. So the best policy is to study both your domestic regulations and those of your partners and clients.<\/p>\n<h4>2. Weak protection of cloud resources<\/h4>\n<p>Many startups rely on public cloud services, such as Amazon AWS or Google Cloud, but not all of them use proper security settings for such storage spaces. In many cases, containers with client data or Web app code end up protected by nothing but weak passwords \u2014 and internal corporate documents can be accessed with direct links and are visible to search engines. As a result, anyone can get hold of critical data. Sometimes, in their quest to keep things simple, startups leave important documents available to anyone in Google Docs for good\u00a0\u2014 simply because they forget to restrict access to them.<\/p>\n<h4>3. Unpreparedness in the face of DDoS attacks<\/h4>\n<p><a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ddos-distributed-denial-of-service-attack\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">DDoS<\/a> is an efficient way to down an Internet resource. On the darknet, such services are relatively inexpensive and therefore quite affordable both for competitors and cybercriminals, who need them as cover for more sophisticated hostile attempts.<\/p>\n<p>In 2016, <a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/coinkite-is-closing-down-its-web-wallet-citing-legal-and-ddos-issues\" rel=\"noopener noreferrer nofollow\">a cryptocurrency e-wallet service called Coinkite was forced to close down<\/a> because of continuous DDoS attacks. According to its developers, they hadn\u2019t had a moment\u2019s peace since they launched the service. After holding out for several years, the company gave up and refocused on hardware wallets.<\/p>\n<h4>4. Poor employee awareness<\/h4>\n<p>People are often the weak link in any given business. Attackers know it full well and use <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/phishing-psychology\/25440\/\" rel=\"noopener noreferrer nofollow\">social engineering<\/a> tricks to penetrate the corporate network or fish out confidential info.<\/p>\n<p>Poor awareness is doubly dangerous for companies employing freelancers: It may prove quite a challenge to control what devices and what networks they use for work. Therefore, it is very important to motivate and steer all workers toward a security-focused attitude.<\/p>\n<h3>How can your startup stay afloat?<\/h3>\n<p>To avoid exposing yourselves to cybercriminals and stay in business, give proper consideration to cybersecurity when mapping out your business plan:<\/p>\n<ul>\n<li>Figure out which resources need protection first and what security tools you can afford at the earliest stages. In fact, many safeguards will not involve much expense.<\/li>\n<li>Use robust passwords to protect your work devices and accounts. Our <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a> solution includes the Kaspersky Password Manager utility built to generate robust passwords and store them inside encrypted containers. Do not neglect two-factor authentication\u00a0\u2014 you will find it almost everywhere these days, and it really works.<\/li>\n<li>Thoroughly review the data-storage laws of the countries in which you plan to operate, and make sure your company\u2019s personal info storage and processing workflow is compatible with those laws. If possible, consult lawyers about the traps and pitfalls of each market in question.<\/li>\n<li>Keep a close eye on the security of third-party services and software. How well-protected is the collaborative development system you use? Is your hosting provider safe? Are there any known vulnerabilities in the open-source libraries you use? These questions should interest you at least as much as the consumer properties of the end product.<\/li>\n<li>Raise your employees\u2019 cybersecurity awareness and encourage them to dig into the subject on their own. If your company has no cybersecurity professionals on board (typical for a startup), find someone with at least some interest in the matter who can start by following our blog.<\/li>\n<li>Do not forget about computer infrastructure protection. We have a <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">solution<\/a> for budding companies with limited budgets. It will help automate security oversight over your workstations and servers and make secure payments online. No administration skills are required.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>What makes startups dependent on data protection for success?<\/p>\n","protected":false},"author":2484,"featured_media":13162,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[234,2087],"class_list":{"0":"post-13161","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-small-business","10":"tag-startups"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity\/13161\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/startup-cybersecurity\/15619\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/startup-cybersecurity\/17538\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/startup-cybersecurity\/15686\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/startup-cybersecurity\/14412\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/startup-cybersecurity\/18286\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/startup-cybersecurity\/17201\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/startup-cybersecurity\/22629\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/startup-cybersecurity\/5920\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/startup-cybersecurity\/26456\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/startup-cybersecurity\/11640\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/startup-cybersecurity\/11680\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/startup-cybersecurity\/10608\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/startup-cybersecurity\/19042\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/startup-cybersecurity\/23078\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/startup-cybersecurity\/18279\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/startup-cybersecurity\/22468\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/startup-cybersecurity\/22405\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/small-business\/","name":"small business"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13161"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13161\/revisions"}],"predecessor-version":[{"id":14457,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13161\/revisions\/14457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13162"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}