Cybersecurity Tip for SMBs: Lock the Backdoor

Updated 08/02/2023


Cybersecurity Tip for SMBs: Lock the Backdoor

My oldest daughter has a terrible habit of leaving the backdoor unlocked, losing her keys, and suffers from the general carelessness that accompanies being a very young adult.

Her lack of situational awareness drives my husband crazy. He’d grown up on the Southside of Chicago and was the victim of a variety of thefts there and in other parts of the country.

He’d even chased down a couple of purse-snatchers while in Las Vegas. Life has taught him to be vigilant and aware.

It’s generally true, though, that teens and young adults approach life with an “it won’t happen to me” attitude. I know I did. But as an adult (and mother), I see the world very differently.

I’m sure you too, have had those moments when a particular memory knocks on the door of your mind, pricks the back of your neck, and you think, “How on earth did I survive?” or, “Man, I am so, so, lucky.”


Imagine that you have three doors that must be locked and checked regularly in order to protect your business data. There’s the “Human Firewall” door, the “Process” door, and of course, the “Technology” door.

If you’re like most business leaders, you make sure that you check and lock the “Technology” door on a regular basis. You likely have a firewall, Multi-Factor Authentication (MFA) protecting your applications, antivirus, backups, and monitoring and patching, at minimum.

But what about the other two doors?

You wouldn’t think it would be an issue, but fortifying your “Human Firewall” door with security training is key to protecting your business. Especially when 74% of breaches are the result of human error.[1]

Don’t be fooled by sending a couple of videos to your employees. Locking this door requires engagement from the company leadership and a commitment to being vigilant and aware.

I know of too many organizations that have provided sub-par training programs just to check a box yet still suffered significant financial losses via Business Email Compromise (BEC) or downloading a malware virus.

The most neglected door, however, is the “Process” door. These are the procedures that govern how your employees handle data, what you should do in the event of a cybersecurity incident and define your information security policies such as password policies and much more.

This door is often left wide open, and as a result, it allows threat actors to get a hold of your data and it prevents you from creating a resilient organization.

Consilien is one of the few Managed Security Services Providers (MSSPs) to have a comprehensive program that includes locking all three doors:

  • Door 1: We can help you create a culture of security awareness with our Signature Security Awareness Training program and Information Security Consulting.
  • Door 2: We can help you create sound processes and implement good governance with Information Security Policies and Standards, Cybersecurity Risk Assessments, Compliance Programs, and Consulting
  • Door 3: Provide you with and manage robust technology solutions to protect your company’s data, IT infrastructure, and, ultimately, your reputation.

Call us today at 866-680-3388 for a free Assessment. We’re here to help.

[1] Verizon 2023 Data Breach Incident Report