{"id":19384,"date":"2022-02-08T19:01:10","date_gmt":"2022-02-08T15:01:10","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity-mistakes\/19384\/"},"modified":"2022-02-08T19:01:10","modified_gmt":"2022-02-08T15:01:10","slug":"startup-cybersecurity-mistakes","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity-mistakes\/19384\/","title":{"rendered":"Typical startup cybersecurity mistakes"},"content":{"rendered":"<p>You can find about a million tips on how to keep a startup afloat on the Internet. Usually advisers draw attention to the issues of business planning, marketing strategy, attracting additional investment and so on, but articles rarely talk about the problem of building a solid cybersecurity system. However, the lack of a clear understanding of threats can cost a startup a potentially successful business. We decided to talk about most typical cybersecurity mistakes and, more importantly, how to prevent them.<\/p>\n<h2>Source of the problem<\/h2>\n<p>Here is a typical start-up story: you and your friend come up with a brilliant idea, you discuss it with your inner circle, you gather a group of enthusiasts, and the dream team is ready. This is how the stories of Airbnb, Pinterest, Twitter, Uber and many other famous projects famously started.<\/p>\n<p>However, problems arise when a startup moves from an initial idea to building real workflows and hiring additional staff. At this point, the small group of like-minded people expands and becomes a team of random people with different views on life and different life experiences. In such a team, employees may have very different understandings of what information should be considered as confidential and how to keep it secure.<\/p>\n<p>Here is an example: one employee decides that it would be convenient to write the password for an online service on a chalkboard \u2014 their thinking is, everyone who needs it can find it quickly and easily. Another member of staff posts a selfie in the office on a social network, writing \u201cwho would write something confidential on the chalkboard, where everyone can see it\u201d? This kind of misunderstanding is one of the reasons why young startups can run into cyber-security issues. The problem can be solved only by developing a corporate cybersecurity culture.<\/p>\n<p>At the same time, people who come to work in startups are often enthusiasts and adventurers \u2013 they quickly fall in love with the idea, and can often quickly change their interests and leave. In addition, quite often modern startups depend on IT specialists who generally tend to move from business to business over the course of several years.<\/p>\n<p>The combination of these two facts can create high employee turnover. In such conditions various mistakes can easily multiply, especially cybersecurity related ones. Therefore it is easy to overlook a cyberthreat that can easily be avoided.<\/p>\n<h2>Typical cybersecurity mistakes<\/h2>\n<p>Let\u2019s imagine: you hadn\u2019t noticed how your small startup became a fully-fledged business. What cybersecurity mistakes could you have made so far?<\/p>\n<h3>Excessive access rights<\/h3>\n<p>Often when a startup employee needs access to corporate resources or services, he immediately gets administrator rights. The person who shares those access rights usually thinks it\u2019s easier to give access to everything once, without understanding the real needs of a particular employee and his responsibilities, than get new requests for access every week. But the more access rights an employee has, the chance of an error grows. If you want to minimize the number of cyberincidents, each workflow participant should have only those access rights that are necessary for their tasks.<\/p>\n<h3>Lack of information storage system rules<\/h3>\n<p>In general, this is bad for any business. But in a startup, due to the above-mentioned staff turnover, one day you may simply not be able to find important work files. Most likely they exist somewhere, but where exactly is the mystery. A developer or marketing intern knew about this once, but left the company recently without telling anyone.<\/p>\n<h3>Forgotten passwords<\/h3>\n<p>Another common problem is forgotten passwords for corporate social networks or other rarely used services. Perhaps a new staff member sets up a Facebook or LinkedIn account to help promote the business, but fails to share the account details with other members of staff, then promptly leaves for another role \u2013 the login credentials have gone, with little chance of recovery.<\/p>\n<h3>Shared passwords<\/h3>\n<p>Some people may think that with high turnover it may be a good idea to use shared accounts. But the more people know a password, the more likely it leaks due to phishing, negligence or malicious intent. In addition, it greatly complicates the investigation of an incident, when it happens. Let\u2019s say it turns out that someone has gained access to an account \u2013 the experts suspect that the password was intercepted by malware and wants to check the computer of an employee who had access. Only to find that everyone had!<\/p>\n<h3>Passwords in cloud services<\/h3>\n<p>Another password-related mistake is to store them in some file in Google Docs, as incorrect setup means it\u2019s usually accessible by anyone with the link. The obvious advantage is that it is very convenient to transfer the necessary information to all employees, it is enough to put all the necessary passwords in one document and send a link. However, such Google documents can be <a href=\"https:\/\/www.kaspersky.com\/blog\/collaboration-solutions\/35740\/\" target=\"_blank\" rel=\"noopener nofollow\">indexed by search engines<\/a>. In other words, the file with all your passwords could potentially fall into the wrong hands.<\/p>\n<h3>Lack of two-factor authentication<\/h3>\n<p>Some of the problems associated with passwords would be less dangerous if startups did not neglect <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> on work accounts. This allows you to protect important data from various theft methods, such as phishing. First of all, two-step protection should be put on all financial services, such as Upwork.<\/p>\n<h2>Universal cyberthreat prevention tips<\/h2>\n<p>To avoid the \u2018typical\u2019 mistakes that many small businesses and start-ups make, try to follow these tips:<\/p>\n<ul>\n<li>When it comes to granting access to resources or services you should follow the <a href=\"https:\/\/www.kaspersky.com\/blog\/zero-trust-security\/36423\/\" target=\"_blank\" rel=\"noopener nofollow\">least privilege principle<\/a>. That is, an employee must have the minimum set of access rights \u2014 enough only to perform their tasks.<\/li>\n<li>Know exactly where your startup\u2019s important information is stored, and who has access to it. From this, develop guidelines when hiring new employees, including clearly defining which accounts are needed for each employee, and which ones should be limited only for certain roles.<\/li>\n<li>Mature corporate cybersecurity culture helps to prevent many cyberthreats. You can, for example, start with creating a cybersecurity manual for employees so that everyone is on the same page. Here\u2019s a good <a href=\"https:\/\/www.kaspersky.com\/blog\/security-awareness-basic-instruction\/40416\/\" target=\"_blank\" rel=\"noopener nofollow\">example<\/a> for new employees.<\/li>\n<li>All passwords must be stored in a secure password manager. It will help your employees not to forget or lose them and also to minimize the chance that an outsider will get access to your accounts. Also use two-factor authentication mechanisms wherever possible.<\/li>\n<li>Advise your employees to lock their computer when they walk away from the desk. They should keep in mind that an office can be visited by all kinds of third parties, including couriers, clients, subcontractors or job seekers.<\/li>\n<li>Consider installing <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">antivirus software in order to protect devices<\/a> from viruses, trojans and other malicious programs<\/li>\n<\/ul>\n<p>A large number of threats can be prevented with <a href=\"https:\/\/me-en.kaspersky.com\/small-business-security\/small-office-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a>. This solution not only protects your employees\u2019 devices from ransomware and other common cyberthreats, it also includes a password manager.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity flaws typical for young companies<\/p>\n","protected":false},"author":2684,"featured_media":19385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[2005,187,2087],"class_list":{"0":"post-19384","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-access-rights","10":"tag-passwords","11":"tag-startups"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/startup-cybersecurity-mistakes\/19384\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/startup-cybersecurity-mistakes\/23887\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/startup-cybersecurity-mistakes\/9749\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/startup-cybersecurity-mistakes\/26135\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/startup-cybersecurity-mistakes\/24097\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/startup-cybersecurity-mistakes\/32357\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/startup-cybersecurity-mistakes\/43559\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/startup-cybersecurity-mistakes\/15792\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/startup-cybersecurity-mistakes\/24816\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/startups\/","name":"startups"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2684"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19384"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19384\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19385"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}