<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/sme/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #SME</title><description>Lifu Technologies - Blog #SME</description><link>https://www.lifutechnologies.co.za/blogs/tag/sme</link><lastBuildDate>Thu, 16 Apr 2026 13:31:59 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Practical Cyber Security advice for owners of SME with minimal budget]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Practical-Cyber-Security-advice-for-owners-of-SME-with-minimal-budget</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Low budget Cyber Security.png"/>Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC)]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_df8w4HfdSWiZkHVT12iyGQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_H1hY-iixSumOzGDc0s0UoQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ESgSYeYnRiazua4lzpcjAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qluedA3AQ9-vkUo7t-XbbQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qluedA3AQ9-vkUo7t-XbbQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><b><span>Thereafter: Assume compromise of EVERYTHING</span></b></span></h2></div>
<div data-element-id="elm_A7qRFjkxRJeX-j7-AFJYJA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A7qRFjkxRJeX-j7-AFJYJA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;"><span>Unless your company deals with national secrets, valuable transactions the likelihood of your company being targeted by hackers is small. &nbsp;Likelihood will be spray and pray attacks from hacker using phishing and business email compromises (BEC). Hackers offer phishing and business email compromise online as a service and utilize AI to increase volume and precision. Email addresses, phone numbers etc. they have from numerous data breaches.</span></span><span style="color:inherit;"><span>The best defense against this is creating awareness among your family, employees, about digital hygiene, which includes: </span></span><br><ul><li><span style="color:inherit;"><span>&nbsp;Questioning any request of data by following a link in a SMS. (Log on directly to the bank, Tax services, etc. and respond to queries there)</span></span></li><li><span style="color:inherit;"><span>Do not announce on e.g., Facebook that the whole family is on vacation.&nbsp;</span></span></li><li><span style="color:inherit;"><span>Double check odd requests from family/employees/bosses by a separate comms channel, e.g., use WhatsApp if the request came from email.</span></span></li><li><span style="color:inherit;"><span>Review your password reset procedures and include call-back, send the reset password to the employees' manager, so identification can be verified.</span></span></li><li><span style="color:inherit;"><span>Data privacy acts e.g., GDPR(EU), POPIA(ZA) applies basically to any organisation, so at a minimum this has to be addressed.</span></span></li><li><span style="color:inherit;"><span>Only install SW that is downloaded from the vendors website and minimize browser plug-ins. (Take extra care if you let your kids use your laptop/smart phone.)<br>&nbsp;<br>While not 100% guarantee for security, enabling multi-factor-authentication (<span style="font-weight:bold;">MFA</span>) will raise the defenses and hackers will potentially move on to the next potential victim.<br>&nbsp;<br>Finally, make sure your IT-department and/or IT Service provider is updated on <span style="font-weight:bold;">SW Security patches</span> as vulnerabilities are published.<br>&nbsp;<br>&nbsp;<br><span style="font-weight:bold;">Thereafter: Assume compromise of EVERYTHING</span><br>&nbsp;<br>In august a hosting company with 300 clients was hacked and everything was encrypted (including backups) and held for ransom, as a result several companies have declared bankruptcy with more to come. In the end the owner(s) are responsible and lesson #1 is to take data backups (systems can be re-created) and store the files at a different location. <br>&nbsp;<br>Recreation can take time days/weeks, so consider what is absolutely critical data/information required to continue production/operations for e.g., a week and make a plan for that. Thereafter test the plan.<br>&nbsp;<br></span></span><div style="text-align:left;"><span style="color:inherit;"><span>If you use cloud providers e.g., MS 365, do not assume they automatically backup your data. They can, but typically it is a separate billable service!</span></span></div></li></ul></div></div>
</div><div data-element-id="elm_YLaH8ZsoRGKDARI5Injmhw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 06 Oct 2023 15:07:38 +0200</pubDate></item></channel></rss>