Main Menu


Try searching for

Identity theft

Social security protection

Credit monitoring

Reputation management

Blog > Internet Security > 9 Devastating Cybersecurity Mistakes
 February 13, 2020

9 Devastating Cybersecurity Mistakes

Hacker seen in shadow wearing a hoodie. Computer code is seen in the foreground.

These common cybersecurity mistakes could get you hacked.

According to the National Small Business Association (NSBA), cyberattacks cost small businesses an average of more than $20,000 per attack in 2014, more than double the cost of an attack in 2013. Nearly half of those surveyed have experienced a cyberattack. It is not a matter of if your business will be targeted but when.

Understanding some of the most common mistakes will help you discover your system’s vulnerabilities and develop a plan to make your business more secure.

  1. “We really didn’t understand the risks.”
    Attacks come in many forms, such as viruses, malware, cyber extortion, and data theft. Cyber extortionists hold information or systems hostage in exchange for payment. Data thieves will steal client information for use in identity theft rings or other criminal activity. Leaving client data unprotected is particularly bad for business. While losing a customer’s data would likely mean losing their business, depending on the nature of the loss, the client may also seek damages from you in court.
  2. “We all had the same password.”
    Your business is only as secure as your weakest password. Passwords such as 1234 or password leave access to your network wide open. Passwords should include numbers, letters, and special characters. Never share or use company-wide passwords. Do not use your name or birthday as part of your password as these may be easily accessible online. You should also require password updates at least every 90 days.
  3.  “We didn’t know how to set up security tools and utilities.”
    Protect your network with a firewall, which will block any unauthorized access. Use a virtual private network (VPN) to secure your network. Use encryption software to protect data traveling outside of your network. Install antivirus programs on all computers and update them frequently to prevent the latest viruses and malware.
  4. “We didn’t install the security update.”
    You should complete software updates in a timely manner. Hackers are constantly looking for software vulnerabilities. Software developers, in turn, create updates to fix those vulnerabilities. Failing to update your software is like leaving your door wide open to cybercriminals.
  5.  “We didn’t protect our smartphones.”
    For many small business owners and employees, the smartphone is a vital piece of workplace equipment. It is important to treat security on your smartphone as you would on a desktop at work. Use encryption software, follow password policies, install updates and backup your data.
  6. “Our data wasn’t backed up.”
    It is vital that you back up your data. Having an offsite backup service will help shorten recovery time from a cyber-attack or other IT disaster. Consult a trusted IT professional about the best options for your business. There are now a number of cloud-based backup services that can sync your data on a daily basis. This will speed up the recovery process if your data is damaged or corrupted as a result of an attack.
  7. “We didn’t have a cybersecurity policy.”
    A cybersecurity plan should set clear and concise ground rules for your employees and managers. The FCC offers a helpful online tool that allows you to develop a customized cybersecurity plan for your small business. You can access the FCC Small Biz Cyber Planner 2.0 at Once you have a policy you will need to audit the workplace for compliance on a regular basis.
  8. “Our employees don’t know about our cybersecurity policy.”
    Once you have a plan in place you must pass that knowledge on to your employees. Provide them with a copy of your cybersecurity policy and have them sign an acknowledgment that they received, read and understand the policy. Make sure employees feel comfortable reporting potential vulnerabilities and asking questions.
  9.  “We didn’t know cybersecurity insurance was available.”
    Not everyone needs cybersecurity insurance but it may be worth investigating depending on your business.

Get help from the professionals.

For more tips and guidance on how to further protect your personal data from identity thieves, IDShield offers one-on-one consultation to ensure your private information remains private. IDShield, your all-inclusive solution to identity protection, monitoring, and restoration, now brings you enhanced privacy and reputation management consultation.

IDShield is a product of Pre-Paid Legal Services, Inc. d/b/a LegalShield (“LegalShield”). LegalShield provides access to identity theft protection and restoration services. For complete terms, coverage and conditions, please see All Licensed Private Investigators are licensed in the state of Oklahoma. This is not intended to be legal advice. Please contact a lawyer for legal advice or assistance. If you are a LegalShield member, you should contact your Provider Law Firm.


Related Post

View from behind of a large wedding party outside in a garden by a fountain while a photo is being taken. Shows cybersecurity wedding success.

Cybersecurity Tips for Wedding Success

The big day is on the way! You’ve been planning your wedding with love and care, and finally all your hard work is about to pay off. Or perhaps you are a wedding guest, prepared to attend this exciting event. Whether you are a member of the bridal party or a...

A woman typing on her mobile phone as she sits in a cafe.

Public Wi-Fi May be Free But it Comes With a Price

Practically everyone uses public Wi-Fi. Most coffee shops, restaurants, gyms, planes, airports, and hotels offer it. It’s convenient and free. But the reality is, it comes with a price. Because when you use public Wi-Fi, you’re much more exposed to getting hacked,...

Screen showing the place to enter a password.

Why You Need Stronger Passwords

For every door that opens on the internet, there’s usually a “key” to open that door—in other words, a combination of username and password. And behind each door is a ton of personal information about you. If you use easy-to-hack passwords, reuse them across sites,...