lutz logo
lutz logo
  • Services
  • News & Insights
  • About
  • Client Portal
Search
  • Services
  • Accounting
  • Advisory
  • Financial
  • M&A
  • Talent
  • Tech
  • Accounting Services
Services
  • Audit & Assurance
  • Client Advisory Services
  • Outsourced Accounting
  • Tax
  • Business Valuation
  • Litigation Support & Forensic
View All
Industries
  • Agribusiness
  • Construction
  • Family Office
  • Healthcare
  • Manufacturing & Distribution
  • Nonprofit
View All
News & Insights
Financial Access Checklist
Guide
Financial Access Checklist

Share this information with your spouse to assure you each have access to manage important financial tasks independently.

Read More
  • Advisory Services
Services
  • Accounting
  • Financial
  • M&A
  • Talent
  • Tech
View All
Resources
The Art of Budgeting
Recording
The Art of Budgeting + Smart Saving Strategies
Learn how to get your finances under control and increase your savings! Hear real-life examples and best practices to secure a successful future.
Watch Now
Business Insights
Comparing Business Valuation Methods
Blog
Comparing Business Valuation Methods: Which is Right for You?
Valuation experts rely on three primary approaches to determine the value of a business: income approach, asset approach, and market approach.
Read More
  • Financial Services
Services
  • Financial Planning
  • Investment Advisory
  • Retirement Plan Services
  • Pooled Employer 401(k) Plan
View All
Resources
  • Lutz Financial Blog
  • Our Team
  • Client Portal
  • Charles Schwab Login
  • Send Files Securely
Contact Us
NEWS & INSIGHTS
Website Featured Content Images
Market Commentary
Financial Market Updates

Read our latest financial market updates and sign up to receive them straight to your inbox.

Read More
  • M&A Services
Services
  • Sell-Side Representation
  • Transaction Advisory
  • Exit Planning
  • Business Valuation
View All
Resources
Selling a C Corporation
Blog
Factors to Consider When Selling a C Corporation

Understand the tax issues affecting both buyers and sellers involved in C corporation merger and acquisition transactions

Read More
Business Insights
Post-Acquisition Checklist
Guide
Post-Acquisition Checklist for a Seamless Transition
To help you navigate this critical period, we've compiled a comprehensive checklist covering key areas that demand attention after the deal closes. 
Read More
  • Talent Services
Services
  • Search & Staffing
  • Outsourced HR
  • HR Consulting
View All
Candidate Resources
  • Job Seeker Process
  • Current Opportunities
  • Lutz Internships
Contact Us
News & Insights
Overcoming Bias in Recruitment
Blog
Unconscious Bias in Recruitment: How to Overcome It
Learn how to take the bias out of recruitment and build a diverse, talented workforce with these tips.
Read More
  • Tech Services
Services
  • Outsourced IT
  • Data Analytics
  • Technology Strategy
  • Software Consulting
View All
Resources
When to outsource your IT
Blog
How to Know When It's Time to Partner with an IT Pro

One day your technology seems manageable, and the next you're wondering if you need more support. Here are the clear signs it's time to outsource your IT.

Read More
Business Insights
Untitled design (1)-Mar-08-2024-08-50-35-9527-PM
Video
Pella Client Testimonial
"I've used them for valuation work, stock transfers, hosting all of my technology, and now data analytics. I'd say they lead the pack in terms of anticipating what I'm going to need before I even know I need it."
View Now
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
Webinars & Events
Events
Register Today

Register for an upcoming event or access our library of on-demand recordings.

View All
Market Updates
COMMENTARY
Stay Informed

Catch up on market moves with our weekly update, featuring in-depth insights and analysis.

View All
Resources
EBOOKS & GUIDES
Download Now

Take a deep dive into challenging business topics with these free educational resources. 

View All
  • News & Insights
  • Business Insights
  • Webinars & Events
  • Market Updates
  • Resources
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
  • About
About

Lutz is a business solutions firm for people seeking a partner to help energize and heighten economic and organizational success.

Our Company
Our Team
Offices
Careers
Internships
Contact Us
  • Contact
Client Portal

Log in to your relevant client portal to access your account, upload documents, or make a payment.

Make a Payment
Accounting Client Portal
Financial Client Portal
Charles Schwab Login
Send Files Securely
Contact Us
  • Cybersecurity

Cyber Security Best Practices for Your Business

Gary Newton, Lutz Tech Shareholder
April 17, 2018
Cyber Security Best Practices for Your Business

Cyber Security is a subject that continues to make headlining news. Because every business is at risk of a cyberattack, it’s important to know what types of threats your business could be subject to and understand the techniques you can implement to help prevent attacks from happening.

 

Types of Cyber Security Threats

There are two ways cyber security threats are generated, internally and externally. Internal threats are the most common and cause about 55% of cyber security issues while external threats cause about 45%.

Internal Threats

Internal threats exist within every type of organization. There are a variety of reasons why these threats generate internally, a few of which are due to a perceived injustice, retaliation, excessive privileges, a sense of entitlement, need for attention, and more. Generally, these acts are carried out by malicious insiders who have access to critical information and are paid money to leak it. They could also be a disgruntled employee who is in disagreement with management or was recently terminated.

In contrast, another form of internal threat is known as an inadvertent actor or unwitting suspect. They are employees who unknowingly solicit company information by clicking suspicious email links, practice poor web browsing habits, install virus ridden software, use easy to guess password, leave devices (work computer, cell phones, etc.) unattended and unlocked, and more. These types of internal threats can be easily avoided through employee education and training on safe cyber practices.

External Threats

External threats are generated outside of the business and consist of hackers, cyber criminals, terrorists, viruses, malware, unknown software vulnerabilities, phishing scams, and more. Some of these terms are difficult to understand, so here are a few explained:

Viruses: Viruses are pieces of code that can copy itself with intent to destroy data or impair a computer system. The two main types of computer viruses are worms and Trojan horses.

Malware: Malware is software intended to damage or disable a computer system. It’s common to get malware from internet ads, hacked websites, or malicious emails.

Phishing Scams: Phishing scams come in the form of emails that appear to come from a trusted or reliable source. Their purpose is to entice the reader to click or open provided links or attachments which contain malicious code. Phishing emails also fool users into providing username and password credentials for network access, applications, and email systems.

Knowing the different types of cyber threats and where they come from will help you better protect your business from a cyberattack. In the event your company is breached, here are two steps to follow in reporting it.

 

What should you do if your business is breached?

Step One

If your business falls victim to cybercrime, it’s important to contact your financial institution immediately.

Other resources to contact in the event of a breach include your local FBI office, county sheriff’s office, police department, or division of criminal investigation. You should also report a breach at ic3.gov.

Step Two

Gather all evidence that could have led to the breach. This includes any links, attachments, emails, or advertisements that could have caused the issue. This information will be helpful during the investigation in identifying the perpetrator.

Although a cyberattack isn’t always avoidable, here are a few tactics your business can implement to help mitigate the risk.

 

How Can You Protect Your Business?

Protecting your business before it is a victim of a cyberattack is critical in the prevention process. There are several techniques your business can employ to mitigate both internal and external cyber threats. Here are a few of them:

Preventing internal threats:

  • Educate your staff – this is your first line of defense against cyber attacks
  • Respect security assessments – both physical and cyber
  • Adhere to rotation of duties and changes of control policies
  • Analyze your organization’s culture and determine potential threats
  • Respect mobile devices and the information they have on them
  • Perform tests – phish your employees
  • Define what your business is trying to protect
  • Report any and all suspicious activity

Preventing external threats:

  • Identify security needs and risks – begin with the basics: strong passwords, antivirus, antispyware, intrusion prevention systems, encryption technologies, firewalls, content filtering, secure wireless access points
  • Keep your systems updated – Adhere to regular software and system patching schedules
  • Backup – Perform regular backups and test restores
  • Keep devices safe from physical theft
  • Secure your websites
  • Get external help!

In summary, cyber security is a present and increasing threat to businesses worldwide. With easier and cheaper accessibility, cyberattacks are more prominent than ever. Don’t wait until after a breach occurs. Take action now to protect your business by implementing safe cyber security techniques.

  • Achiever, Responsibility, Learner, Analytical, Belief

Gary Newton

Lutz Tech Shareholder

Gary Newton, Lutz Tech Shareholder, began his career in 1988 and has over 35 years of experience in the outsourced IT industry. With deep technical expertise and a passion for innovation, he plays a key role in overseeing client services, project implementation, and cybersecurity at Lutz Tech. His work has been instrumental in building the systems and teams that support the division's long-term growth and success. 

Guiding critical technology initiatives, Gary focuses on solving complex cybersecurity challenges, improving operational efficiency, and fostering continuous improvement within the department. He plays an active role in developing internal methodologies and mentoring emerging talent, helping them grow into technical leaders and trusted resources. 

 

At Lutz, Gary embraces change by staying at the forefront of evolving technologies and cultivating a culture of growth and adaptability. His hands-on approach and dedication have made him a cornerstone in shaping how Lutz Tech delivers reliable, forward-thinking IT solutions. 

 

Gary lives in Omaha, NE. Outside of work, he enjoys spending time with his family, the great outdoors, and staying active. 

402.496.8800

gnewton@lutz.us

Connect on LinkedIn

Recent News & Insights

Recent News
Lutz Announces Redemption of Ron Nebbia’s Shares
Lutz, a Nebraska-based business solutions firm, announces the redemption of ownership held by ...
Read More
Market Commentary
2025 Has Been a Boring Year + 5.14.25
2025 Has Been a Boring Year Imagine you went to sleep on New Year’s Eve and just woke up ...
Read More
Job Seeker
5 Ways to Maximize Your Chances of Employment
Let’s face it, job searching can be a rollercoaster. One moment you're motivated, the next ...
Read More
Guide
Finding a Lifelong Career
You’ll spend over 90,000 hours of your life at work. That’s more time than you’ll spend with ...
Read More
module-bg-desktop module-bg-mobile

Let’s get you where you want to go.

We work to simplify complexities, help make critical business decisions, and confidently focus on the things that are truly important to you. We embrace your business as our own to spark the right solutions and help you thrive.
Contact Us
Lutz-Logo-white
  • Services
    • Accounting
    • Consulting
    • Financial
    • M&A
    • Talent
    • Tech
  • About
    • Our Company
    • Our Team
    • Offices
    • Careers
    • Internships
    • Current Opportunities
  • Client Portal
    • Make a Payment
    • Accounting Client Portal
    • Financial Client Portal
    • Send Files Securely
    Submit RFP
TOLL-FREE: 866.577.0780 | © Lutz & company, PC 2025 | Privacy Policy
Follow us on Facebook Follow us on LinkedIn Twitter - X Logo Follow us on Instagram Follow us on Facebook