According to studies accumulated by smallbiztrends.com, 50% of small businesses report they have had data breaches involving customer and employee information in the past 12 months. Further investigation shows that In most cases, these attacks can be attributed to lack of security, malicious attack, employee errors, lost or stolen devices, or any combination of the aforementioned. Simply put – there is an overwhelming amount of threats that are actively targeting small businesses and self-storage is no exception. A data breach for a self-storage operator not only comes as a costly and time consuming repair of damage, but will also permanently tarnish your company’s reputation for future tenants.
Educate Employees on Cyber Attacks
Cyber-attacks don’t always come in the form of a big red shiny button with semi-inviting words such as “Click Here”. You can be putting your company at risk by simply visiting an infected website or even clicking on an infected advertisement. Unfortunately, new forms of malware are being developed every day with the sole intent of deceiving you. While you may never be aware of every type of threat knocking at your doorstep, it’s important to prepare for these threats as best as possible. Employee error makes up for over 90% of all digital attacks according to leading data security and government studies. That means limiting employee exposure to these threats and training employees on proper protocol should be your first priority. |
- Management software acts as the central hub of your self-storage operation and connects with many different partners and associated tasks. In order limit the access of employees to unnecessary and vital information, check with your management software provider on how to configure user rights and permissions.
- Restricting access to the internet is another way to protect yourself if you’re concerned about your employees browsing habits. This can be done in a variety of ways and should be considered on a case by case basis. In some situations, a written agreement specifying justified internet use may be appropriate, but you may also consider router blocks or specialized software that only allows access to approved websites.
- Antivirus/antimalware software will protect against the majority of common cyber-attacks and can be seen as your first line of defense. Make sure to keep your software up to date to give you protection against the latest malware developments.
- Your Operating System (OS, such as Windows) should be set to automatically download and apply updates. Many vulnerabilities are often found and exploited in these systems so by making sure you are as up to date as possible it will help protect against new threats.
- Ransomware is a steadily growing threat that can hold your business hostage. This form of malware can come in many forms, but what they all have in common is the ability to use strong encryption to lock you out of your system until you pay reported costs of anywhere between $200 to $10,000. To further exemplify this threat, the FBI released a report in June 2016 showing that on average, 4,000 ransomware attacks occurred per day with the most common method of delivery being fake emails or “phishing” methods.
Mobile Security

Mobile apps and browser-based software offer additional accessibility to your facility at a higher risk for data breaches. According to a Ponemon Institute study commissioned by mobile security firm, Lookout, 588 IT and IT security professionals were surveyed who are employed in Global 2000 companies: 67% of which say they it is certain or likely that their organization has had a data breach as a direct result of employees using their mobile devices to access their company’s sensitive and confidential information.
With a growing need for mobile accessibility, it’s important to take the proper precautions and most importantly to know what the dangers are.
It’s important to make responsible decisions now to protect your business instead of after the damage is done. Whether it be a curious click of a button, a negligent habit, or a targeted attack; the possibility of becoming compromised is real and should be proactively addressed before it’s too late.
With a growing need for mobile accessibility, it’s important to take the proper precautions and most importantly to know what the dangers are.
- While Android devices have always been more prone to mobile malware, attackers are also targeting Apple IOS devices as well. For example, the malware XcodeGhost exploited a weakness used by IOS app developers to infect almost 40 apps in the Apple Store that would download other malicious apps to the unknowing user’s phone. It’s important to keep your phone’s software up to date as possible to protect yourself from these vulnerabilities. Always check reviews, verify the publisher, and avoid any suspicious apps.
- The use of public networks has always been an issue with mobile devices. At the very least, they pose a risk of others eavesdropping in on the information being transmitted over the same network. At the worst, it could be a fake network altogether just waiting for you to send your information over. The best way to avoid these complications is to turn off any settings that allow your phone to automatically connect to available networks and for you to only connect to secure, password-protected networks that you are familiar with.
- Human error accounts for the majority of data loss for mobile devices as well. People will make mistakes, and that will lead to phones and tablets becoming lost and/or stolen. If you’ve decided to move towards mobile devices, just be aware of that simple fact and have a plan ready for when things go south.
- Require every device that can connect to your business is password protected. While most passwords can be cracked quite easily, it will serve as a stall at the very least. While the phone itself may be protected with a password, it’s important that you not save important passwords to access your business on your phone. You may think your device is protected, but if they get access to your facility information you are putting yourself and your tenants at risk.
- Maintain tracking software on all devices connected to your business as well. If someone has stolen your device with malicious intent you may be able to locate it via software such as Find My iPhone or Lookout. If it is giving you a current location, I strongly urge you to contact the authorities instead of attempting to retrieve your phone yourself for your own safety.
- If all else fails, be prepared to wipe your device. Despite the fact that you may have important documents, pictures, or messages it’s crucial that you protect your business first. That means having some form of software that will remotely delete all data from your device.
It’s important to make responsible decisions now to protect your business instead of after the damage is done. Whether it be a curious click of a button, a negligent habit, or a targeted attack; the possibility of becoming compromised is real and should be proactively addressed before it’s too late.
Cyber security is a serious matter, and unfortunately hits us when we least expect.
If you have any additions to this list or questions about security let me know in the comments below!
If you have any additions to this list or questions about security let me know in the comments below!
-Kevin Kerr
Marketing Manager
Empower Software Technologies
Empower Software Technologies