You are on page 1of 13

Small business digital policy guide

be
safe online
Socialize
Most employees will have their organization’s best interests at heart but in an
era when everything is mobile, the boundaries between private and work life are
blurring, making it difficult for even well-intentioned workers to steer clear of tech
trouble. What does that mean in reputational, legal and financial terms
for your business?

As mobile technology, social media and the associated issues surrounding them
restructure conventional business practices, will you be ready to meet
the new challenges?
Introduction
With the rapid changes in hardware, how we make connections, how we access
content and how we interact with technology, there’s never been a more exciting
time for business.

The advent of social media, mobile It may feel as if you need to expand But with some essential safety advice
devices and the accompanying or incorporate an IT team, even if and tips for managing things such
tools are benefitting us in ways until recently your company has been as social presence, your business
unimaginable a decade ago. As managing the transition to digital can make the most of emerging
smartphones and tablets have with little or no internal support. But technologies.
integrated fully into our home and considering the average cybercrime
business lives, the pace, scope and incident cost $8.9 million in 2012 -
capacity of work has increased - but so according to the Ponemon Institute
has the potential for problems. Cost of Cyber Crime report - and
experts say attacks, particularly using
Judy Bitterli is a Senior Social media, too, has changed the viruses, worms and malware, are
Vice President at AVG. landscape, largely for the better, but increasing, it’s integral to a healthy
She blogs about online there are important issues to consider business to have the understanding,
experiences at as we become ever more accessible policies and infrastructure in place to
http://blogs.avg.com and interconnected. meet these threats.

Be Safe Online Small business digital policy guide www.avg.com 2


Social recruiting
You’ve probably heard about the recent college graduate who was headhunted over
social media, with her personalized job offer posted on Instagram and Facebook.

It was a coup for Detroit-based ePrize, a tool, promoting its presence on various with individuals following your social
national digital marketing agency, which channels not only to clients but to presence, you may even turn the head of
drummed up industry kudos and media valuable job candidates. an exceptional candidate who didn’t think
attention for its creative use of social they were in the market for a career shift.
networks. By harnessing social media’s capacity
for recruiting and vetting candidates, The ease with which social media
Crucially, ePrize chose Samantha Banky organizations are gaining exposure to provides insight into a prospective
in part because she was an early and the kind of people they want to attract, employee is one of its best features,
avid adopter of social media. She, like taking some of the work out of managing though be wary of the legal perils: read
the brightest and best job candidates, postings and applications, and displaying on for expert advice on how to stay
embraced it as a platform to launch her the character of the workplace. above board. But bearing in mind how The ease with which
professional career. quick and simple it is to get started - social media provides
Social followers are likely to share any and how effective an estimated 90% insight into a
More importantly, ePrize recognized the job vacancies you post, letting your of employers find it - what are you prospective employee is
potential for social media as a recruiting connections do the legwork for you. Plus, waiting for?
one of its best features

Be Safe Online Small business digital policy guide www.avg.com 3


Social branding
Is your business on board with social media? If it isn’t, you can bet your competitors
are - and they’re loving it. Whether you are using social for recruiting, brand
awareness or building customer loyalty, it’s a winning scenario.

Social sites and industry-specific with the ethos and atmosphere. Neither should content be aggressive,
networks are providing cost-neutral ways condescending or unpleasant towards
to attract and retain both employees There are also examples of best practice a rival. Interact with followers, which
and business. See the following page for and things to avoid when using social builds trust and increases the likelihood
more information about smaller or newer media in any business-related capacity, of retaining and capturing new followers
players in the social stakes. including: who will share your content. Responding to
posts and questions puts a human face on
Moreover, social channels provide ● Resisting the temptation to make your a business - plus it’s just polite
opportunities for marketing, promotional, organization’s social presence too salesy, ● Be careful who the business entrusts
brand awareness and customer or client publicity driven or all about recruiting.
Resist the temptation with its social profiles. An intern or
loyalty efforts. Businesses can build Offer followers something of genuine to make your someone inexperienced with technology
links with potential employees or clients value, such as industry news, successful organization’s social or the business’s objectives, or someone
by demonstrating a flavor of what life is campaigns or even just something funny presence too salesy, with an axe to grind, could embroil the
like in your workplace and giving them ● Keep posts brief but not boring and publicity driven or all business in a damaging controversy with
the chance to see how they might fit in certainly not offensive or risque. about recruiting. just a few keystrokes.

Be Safe Online Small business digital policy guide www.avg.com 4


Social climbers
Apart from the obvious channels - LinkedIn, Twitter and Facebook - other social sites
and industry-specific networks can be good places to invest in, both in terms of
recruiting and for building brand awareness and loyalty.

Google+ Pinterest
With around 360 million active users, Google Plus boasts Visually display your organization’s unique aspects, such as
+ perks, such as a group video service. More crucially, actively an appealing work space or a company night out, while luring
engaged Google Plus users can get a boost in search rankings - followers. In turn, users can keep tabs on what potential
what better way to promote your business? employees are up to and establish whether they might be a
good fit for your company.

Instagram YouTube
A specialized app for capturing and enhancing pictures Promote your organization’s values and benefits through
of your business’s atmosphere, without the need for a peppy presentations that demonstrate your strengths. Just
photography degree. keep it genuine, interesting and, most of all, short.

Dribbble Tumblr
One of the up-and-coming social sites that are industry- A social media blog site where employers can get valuable
specific. Dribbble gives designers and creatives a place to insight into a job candidate’s ability, initiative and commitment.
showcase their work.

Be Safe Online Small business digital policy guide www.avg.com 5


Policy minded
Social media has helped the hiring process in many ways, but if you don’t know
how to use it correctly you could be setting yourself up for a costly lesson.

The occasional personal Facebook work time, and the consequences of be considered proprietary information?
updates aren’t always bad for business: violating it.
if a reporter, for instance, tells their On a related note, how should a
followers over Twitter or Facebook Though the courts are still catching business respond to false or negative
about an exclusive hitting the pages up to the evolving social sphere, legal statements from competitors, former
or the screens later in the day, it could experts say a company’s safest position employees or failed job candidates?
create a buzz around the company’s is to have a comprehensive framework What about an employee whose private
site. for averting and dealing with problems. social media activity reflects poorly on
your business, or reveals information
But plenty of scenarios can spell Case in point: what rights do individuals that could be advantageous to
A robust policy should trouble if there is no clear social media have to LinkedIn accounts that competitors?
outline the stance on policy for employers to turn to when were created or expanded in a work
social media or mobile things go awry. A robust policy should setting? If someone sets up a business Even if social media isn’t directly
device usage during and outline the stance on social media or in competition with their former incorporated into your business, it’s an
outside work time mobile device usage during and outside employer, could their LinkedIn account issue that can’t be ignored.

Be Safe Online Small business digital policy guide www.avg.com 6


Left to their...
Bring Your Own Device, more commonly known as BYOD: it’s an acronym that
holds both promise and fear for business owners of all sizes and industries.

With smartphones becoming the go- But there are both practical issues and Another practical consideration is
to gadget, and tablets and laptops the potential for security problems the pressure put on company WiFi or
rounding out the mobile device trio, as employees may be taking sensitive networks when many personal devices
it’s becoming ever less likely that your data with them wherever they go can access them, even just to update
employees will arrive at work without - home, out socially or in other non- mobile software or apps.
at least one internet-enabled device. secure settings.
So how can businesses both protect Do your employees understand basic
themselves and make the most of For a start, who covers the service plan safety procedures for mobile devices,
BYOD? and other charges for things such as such as using security software,
security software, cloud storage, data password protection, encrypting
On the plus side, the BYOD trend can downloads and apps? If an employee is sensitive data, only allowing legitimate
improve employee productivity and expected to use their personal device for work and using a business-issued downloads, taking care on unsecured
accountability, whether or not it’s for work, who is responsible for things device to make calls home to their websites and when using public WiFi
company issued or a personal device such as repairs or upgrades? What if loved ones? What if their device is lost, networks and disabling Bluetooth
approved to be used for work. the individual is travelling abroad stolen or otherwise compromised? when not needed?

Be Safe Online Small business digital policy guide www.avg.com 7


...Own devices
It can be a logistical nightmare for IT departments to coordinate different devices
operating on different platforms, all with separate service plans and capabilities.

But in the BYOD world businesses must Furthermore, data is collected through customers or clients? If they’re calling
put a premium on ensuring data only apps and other mobile device functions an ex-employee, do you stand to lose
leaves the office a secure manner. In and can be shared with third parties business?
this regard, it can be easier if not more without the user’s knowledge. Could this
cost-effective to distribute devices that mean things such as contact information Employees also may store or backup
employees can expect to use for some for customers, clients, patients or others data on cloud computing services, such
personal matters. is inadvertently going to third parties, such as Google Drive, Dropbox and Apple
as analytics companies and advertisers? iCloud, which can be accessed on mobile
Either way, do you know where your Apart from concerns about hackers, devices. These services can provide flexible
company info is going? Smartphones show lost hardware or other data-breach working solutions, but they pose potential
the user’s location whenever the device is Is there a concern that possibilities, there are questions around problems. Experts say even encrypted data
on them, and can build a profile of travel where your employees how employees may use company data can be accessed, particularly if the terms
habits and activities. Is there a concern can be found, so can stored on their devices, especially if they of service state that the cloud provider
that where your employees can be found, sensitive company no longer work for you. For instance, can disclose account information to law
so can sensitive company data? data? what happens to contact details for your enforcement or third-party sources.

Be Safe Online Small business digital policy guide www.avg.com 8


Data breach
Cybercrime and problems associated with employees using their personal devices
at work, known as BYOD, are putting strains on SMBs. Experts say, however, there
are ways to reduce these threats, starting with appropriate policies.

External attacks are responsible for 92% of data breaches, with Most breaches would be easily prevented, with 78% of
1% traceable to business partners, according to Verizon’s 2013 techniques reviewed to be in the low or very low category of
Data Breach Investigations Report sophistcation, says Verizon’s 2013 Data Breach Investigations
Report

Nearly 60% of full-time employees participate in BYOD, but According to the Ponemon Institute’s 2012 Cost of Cyber Crime
only 20% have signed a BYOD policy, says Verizon’s 2013 Data report, the average cybercrime incident cost $8.9 million.
$
Breach Investigations Report

76% of network intrusions resulted from weak or stolen 78% of firms whose employees BYOD have no policy. Of those
credentials; 40% from malware; 35% from physical attacks, bringing their own devices to work, 17.7% say their employer’s
such as ATM skimming; 29% from leveraged social tactics, IT department doesn’t know, and a further 28.4% say their
including phishing, according to Verizon’s 2013 Data Breach IT departments ignore BYOD. Statistics are from a report
Investigations Report conducted on behalf of Logicalis, an international IT solutions
and managed service provider

Be Safe Online Small business digital policy guide www.avg.com 9


Keeping safe
When it comes to security, experts say the focus should be on the data, not
the device. Two elements are imperative in order for businesses to be in the
safest possible position.

I
n other words, putting stringent ● Determine if unnecessary data is kept such scenarios, you could be making a
controls on what devices employees on devices, clearing what’s not needed costly mistake.
can bring into the workplace is a and monitoring what remains
losing battle, and resources are better ● Collect, share and analyze tactical A necessary safeguard could be
spent on managing how those devices threat intelligence and incident data for cybersecurity or liability insurance,
are used. This doesn’t have to be an the purposes of detection and defence. which the U.S. Department of
onerous task, and can be achieved by Homeland Security states is “designed
applying a number of checks. According to the FBI, organizations to mitigate losses from a variety
are increasingly being targeted for of cyber incidents, including data
Firstly, organizations should regularly data that could prove valuable in the breaches, network damage and
audit what mobile infrastructure, wrong hands, such as employees’ cyber extortion.” More information is
devices and apps are in place in order private details or confidential client available from the U.S. Department
to create a strategy that identifies information. If you assume general or of Homeland Security at http://www.
weaknesses and offers solutions. professional liability insurance policies dhs.gov/publication/cybersecurity-
Verizon recommends an audit should: will provide adequate protection in insurance

Be Safe Online Small business digital policy guide www.avg.com 10


Best policy
Just as experts advise businesses to create a social media policy, every SMB
should have a solid, comprehensive BYOD policy that every employee under-
stands and adheres to.

Businesses worry more about the But certain policy elements will be illegal, threatening or offensive (such
security implications of BYOD than universal, including: as cyberbullying campaigns targeting
the effect on employee productivity. coworkers) will be prohibited
That was the verdict of 1,650 ● Required security software must
information security professionals who be used and kept current, the original ● Certain business data, such as
were surveyed on Holger Schulze’s operated system will be left in place and confidential client information, will
Information Security Community the user will not ‘jail break’ the device not be downloaded to, stored on or
LinkedIn group. While 70 per cent said transferred by personal devices
they were worried about loss of data or ● Employer and employee will agree to
malware infecting their network, only whether the device can be shared and ● Any sensitive data downloaded or
54 per cent said BYOD posed concerns
Expert advice is with whom, how, for what purposes and stored on the device (such as in e-mail)
about how hard staff would work. available and BYOD to what extent (if any) will be securely deleted
Crucially, only 6 per cent said they were policies should be
ready to embrace BYOD across their tailor-fit for individual ● Access to certain websites and ● The employer has the right to remotely
business. businesses. personal use that could be deemed delete data if a device is compromised.

Be Safe Online Small business digital policy guide www.avg.com 11


Go Ahead
Coping with the fast-paced changes in technology can feel like a full-time job in
itself. And while the genie is out of the bottle - there’s no going back to the days
when people weren’t intrinsically connected - there are plenty of opportunities for
businesses to grasp the power of the new social environment.

Learn more about internet security at www.avg.com


Join us on Facebook www.facebook.com/AVGFree

You might also like