
This month, hearings are being held in Washington related to the reported hacking of the U.S. electoral system by Russian operatives. In addition, every few months we read of high-profile cases that tell the story of employees or cyber criminals arrested for stealing identities and other data from large organizations. There is one clear message for business owners: hacking and data theft is the new normal. No business owner can prevent all high-tech mischief, but understanding types of cyber crimes and deterrence are important first steps.
Strike first by installing computer security software that operates in the background, places a firewall around your network, and sweeps for viruses, spyware, and malicious malware. For small shops, many ISP’s (internet service providers) offer free subscriptions to Norton™ Antivirus Security or McAfee® Total Protection within their internet package. If one is included, ensure that you download the protective software onto each office computer from your ISP’s website (there should be a link within the business customer tab). If security software is not available, purchase an antivirus subscription for your office network and be sure it is updated regularly (this can be automated). Consider one of these 13 security solutions that Sara Angeles reviewed for Business News Daily.
It might seem obvious, but ensuring that passwords are hacker-proof is an effective obstacle that some companies overlook. Weak passwords are the equivalent of leaving your shop door unlocked at night. Large businesses may use a password manager (see link under Resources below), but small businesses should heed these tips from the experts:
Finally, only you and your employees can deter or prevent cyber intrusions. Begin by training your employees about cyber security, including ways to avoid an attack. Below contains a list of some of the more common terms.
Bots or Botnets – malicious software robots that look for vulnerable websites in which to plant malware or steal data
Cyber Extortion – Hackers lock down your computer in exchange for payments to restore access. This is known as ransomware.
DOS (Denial of Service) Attack – coordinated website “hits” designed to crash your website
Malware – any malicious software or code that can infect your computer system such as Trojans, viruses, worms, bots, logic bombs, etc.
Phishing Scams – often launched via email, phishing mirrors legitimate web communication such as an email from your bank, complete with official logos (“spoofing”) in order to cause an unsuspecting recipient to respond with personal information.
Spyware – Downloaded to reside on your computer, spyware collects personal information about your computer use. Spyware and tracking cookies – also used by advertisers – are often delivered via free software downloaded from the internet.
Because technology and cyber crime are continually evolving, it pays to be vigilant. Hire a talented IT professional to administer your network and protect your company’s confidential information. Alternatively, find a good IT contractor who can set up a secure system, test it, and administer periodic upgrades.
At Partnership Employment, we spend as much time getting to know your organization’s unique requirements as we do screening our candidates. Let the professionals at Partnership Employment help you find a trusted IT expert to manage and protect your computer network system. Contact us today!
Password Management Software reviewed by PC Magazine.
Securing Your Wireless Network – Federal Trade Commission
Computer Security – Federal Trade Commission
Wireless Connections and Bluetooth Security Tips – Federal Communications Commission
Continue reading related hiring insights and career guidance.



Privacy Policy | Copyright 2026 Partnership Employment. All rights reserved.