Are you leaving your small business Web-use security door open?

Monday, May 15th, 2017


There is so much to be concerned with when running a small business. Economic uncertainty, the cost of health insurance benefits, regulatory burdens, keeping mission-critical operations running–all add up to a stressful experience. Now security concerns include more than just locking the doors; it means everything digital too. And the risks? With ransomware, phishing, insider threats, unsanctioned cloud apps, BYOD . . . lets just say, the Internet usage risks are probably even higher than the front door being left open . . . wide open.

Many small and midsized businesses (SMBs) are without full-time IT departments or even full-time IT personnel, making them a prime target for breaches. But SMBs tend to think they don’t have the resources to handle this type of security, whether it be the financial consideration, personnel needed, or when hardware is preferred, limited space constraints. Since hackers know this, SMBs have to be proactive when it comes to Web-use security–nowadays, even more so than corporations.

The connection between the human and the Internet is a weak link, making it one of the leading access points into a system for a hacker. Whether it’s from the employee clicking a Web link in an e-mail, clicking a malicious ad, or sharing company information with a cloud service, make sure to protect the business by managing that employee-Internet connection. Find a solution that allows you to easily and proactively monitor and secure your employees’ Web activity. Your business is unique–finding a way to solve these issues and concerns will take a unique solution.

A few tips for your Web-use security solution search:

  1. Find a vendor who will spend the time with you. The cyber world has its own language. It’s important to have a human being on the other end of the phone during the sales process, in customer service, and when you need technical support . . . yup, they still have human beings in technical support . . . go figure! Get with a company who wants to talk to you!
  2. Of course, it doesn’t help if that vendor doesn’t have what you need so make sure you list the top security priorities for your business. Do you want to filter access to certain Web sites or categories such as social media, or do you want to limit time that an employee may spend on one site? Are you are more concerned with your guest Wi-Fi and BYOD or throttling bandwidth use? Don’t get sold on something that doesn’t meet at least your primary concerns. One solution does not always fit all . . . in today’s cybersecurity world you need to focus on your specific business concerns. Just because an expensive, large scale, all-in-one network security solution or firewall has a Web-use add-on tool does not mean it will give you the pertinent, granular detail and control that you need to protect your mission-critical operations.
  3. Ask questions. The vendor should understand that you excel at what you do, not what they do. Don’t be intimidated by the security subject. Even those of us in this business spend a lot of time keeping up with the fast pace of cybersecurity. No question is unnecessary. If you think about it, then it is important to you and should be to the vendor too. Refer to Tip #1!
  4. Last tip for today . . . solutions come in many shapes and sizes. Don’t settle for something that doesn’t fit your business. Your business is special and unique. Your solution should fit and work in your environment without you constantly having to justify it and make it fit in.

Wavecrest can, and wants to, help you–with CyBlock Mini Appliance, specially designed for small businesses, remote offices, and limited space environments.

CyBlock Mini Appliance is an employee Internet-use security hardware solution that is not only the size of a wireless hub but is also economically priced. You gain an easy-to-setup, turnkey Web activity gateway with advanced filtering and monitoring capability, manual or automatic delivery of detailed, interactive reports, real-time monitoring by user, group, or category, the ability to easily manage BYOD, guest Wi-Fi networks, cloud services, and bandwidth use–all with included U.S.-based Technical Support.

Wavecrest also provides CyBlock Web security solutions in other shapes and sizes! Find out more about our other CyBlock deployments: Appliance, Hybrid, Cloud, and Software. As a customer-centric company, Wavecrest focuses on the needs of each customer. Let us help secure your business with a solution that fits every business size, type, and configuration.

About Wavecrest

Trusted for over 20 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit