The number of internet-enabled devices is expected to reach 75 billion by 2025, or more than triple the number of such devices in use by the end of 2018, according to the technology firm ITProPortal. A technology-driven restaurant owner can adopt internet-enabled devices to monitor and manage everything from the operation’s food waste to its energy use. While these devices promise significant cost savings and efficiencies, their access to your data creates new points of vulnerability. It is increasingly difficult to prevent security breaches as threats become more sophisticated and employees who aren’t adequately trained leave a business exposed to threats. To help manage such threats, the tech security firm ControlScan advises operators to use next-generation firewalls to limit entry points for malware, and to use a managed security service provider that can identify vulnerabilities in a network, investigate and report security breaches, and troubleshoot other network security problems. Whether you outsource your network security or not, being able to keep tabs on your network in those ways is becoming increasingly important as businesses across sectors find that it’s not a question of if a security event will occur, but when.
How easy is it for your employees to check their email via the POS device they use at your restaurant? This happens to be among the most common ways that malware can infiltrate a restaurant’s systems, according to Restaurant Nuts. As cybercrime grows in sophistication, attacks will become more difficult to prevent, but you can take some steps to protect your systems. First, make your expectations clear with employees regarding how they should be using your systems (including what, if any, personal use is allowed) and how to avoid accidental malware downloads. Assign each server a different login code so if a breach occurs, you can track transaction data and more easily identify if problems have occurred during a particular employee’s shift. Beyond your employees, use password managers and two-factor authentication where possible to protect online accounts, as well as firewalls that separate different functions of your business so if a breach occurs, you might be able to limit the damage it can do.