Heres what they had to say:

1.

Encrypt data and install a web connection firewall

40% off TNW Conference!

Hackers dont just target the companys financial data.

13 ways entrepreneurs can help their company guard against hacking

Any kind of customer, as well as employee data, may be targeted via phishing attacks.

Data encryption is necessary to protect data from hacking attempts that manage to surpass the firewalls.

Rahul Varshneya,Benchpoint

2.

Article image

Create a positive security culture

Some employees are naturally fearful to present threats or concerns to IT personnel.

Stephen Hetzel,BidPrime

3.

When a developer finds a mistake, they fix it and release an update.

Article image

Businesses that dont implement the updates are vulnerable.

Vik Patel,Future Hosting

4.

Use website blockers

Website blockers restrict users from visiting websites that may expose you to phishing and hacking attacks.

Article image

It also allows you to restrict any other site of your choosing.

There are a host of free and paid versions to choose from as well.

Matthew Podolsky,Florida Law Advisers, P.A.

Article image

Enable two-factor authentication

Having your team use two-factor authentication will help to keep some hackers at bay.

Nicole Munoz,Nicole Munoz Consulting

6.

We create unique passwords for everything and also change them every 30 days.

Article image

It can be a bit exhausting, but its something I feel is a must-do.

We also dont store them on any file-sharing cloud sites to further protect them.

So far the approach has worked.

Article image

Jonathan Long,Uber Brands

7.

Use a password manager

Password managers are essential, especially when you have multiple accounts across systems.

David Boehl,GraphicBomb

8.

Article image

Talk about the worst-case scenarios

Everyone knows computer security is important but nobody takes it seriously.

Post security articles on team bulletins frequently.

Matt Wilson,Under30Experiences

9.

Article image

Train your employees to be vigilant

One of the most common methods hackers use is email.

Also, encourage them to alert others when one comes in.

Ismael Wrixen,FE International

10.

Article image

We remove wide-ranging access once a project ends.

Ryan D Matzner,Fueled

11.

Limit access

Youd be surprised at how many hacking attacks were simply the result of clever social engineering.

Article image

If you have fewer links in the information chain, there are fewer potentially exploitable weak points.

Bryce Welker,Crush The CPA Exam

12.

Justin Cooke,Empire Flippers

13.

Article image

Get cybersecurity insurance

It is hard to prevent a cyber attack by a skilled, highly motivated hacker.

Learn more at yec.co.

Also tagged with

Article image

Article image