Texas Self Storage Association has served its self-storage industry members since 1986.  Headquartered in Round Rock, Texas, TSSA is the leading expert in self storage in the state of Texas.  Whether you're an owner, operator, manager or employee,  TSSA's blog will provide you with the latest tips, advice and knowledge for running your self-storage business. 

Make Security a Priority
by Lynn Sykes, Storage Asset Management


While we hope that the holiday season is merry and bright for everyone, there are some people who are more "Grinch-esque" and seek to go "Christmas shopping" at local self-storage facilities. With current economic conditions, the self-storage industry has seen a significant uptick in break-ins and onsite criminal activity. There are markets throughout the state that are experiencing numerous break-ins in a single day. In the Plano area, the local police department sent out a notice to surrounding storage facilities alerting them that self-storage properties, in particular, have recently been targeted by criminals. One facility reported more than 75 break-ins during a two-week period. Vehicles, trailers and RVs are being stolen directly from storage sites. And in some cases, not only are items being stolen, but facility property is being damaged in the process.

If you take pride in your storage business and your reputation, crime at your facility can do real damage to both. As storage owners, you should want nothing more than for customers to feel the utmost level of security when storing their belongings at your property. There are numerous solutions to help bolster your facility’s security and mitigate criminal activity, and many of them will not break the bank. 

Basic Security Measures

Awareness is key. Most break-ins and other criminal acts are committed by current or past tenants, so make sure to include this information when training onsite managers and other staff to make them aware. Because of this statistic, close attention to detail should be paid when doing daily or weekly facility walk-throughs.

Get your tenants involved. You can also employ your tenants to “say something if they see something,” so you have extra sets of eyes on the lookout for strange tenant activity. This can be particularly helpful during periods when you are not watching your security camera footage or doing property checks. If a neighboring tenant notices another tenant engaging in questionable behavior, such as sleeping in their unit or loitering after hours, you want them to let you know. While you don’t want to give new tenants any doubt about the security of your facility, this kind of “village mentality” can be a huge asset in identifying problem tenants before the situation gets out of hand. And once you are made aware of a tenant who is breaching the lease or is cause for security concerns, don’t waste any time—nip it in the bud and send them a notice to vacate or a notice of termination ASAP.

Control your access hours. Many operators still allow 24/7 access for all tenants. This can be a huge misstep, as we have all heard the saying, “Nothing good happens at a storage facility after 10 p.m.” Take that into consideration and begin restricting 24-hour access for tenants who do not need to enter their units regularly after business hours, unless they make a special request, which can be reviewed and dealt with on a case-by-case basis.

Unique gate codes are a must. Ensuring you can track your tenants’ comings and goings through a gate/access control system should be considered standard practice in the self-storage industry these days. Providing each tenant with a unique gate code allows you to easily track gate activity through your access control system to help identify possible suspects should you experience a break-in or other type of criminal activity.

Make sure to review gate access log reports regularly to spot any patterns or discrepancies. This is a good way to detect tenants who are entering the facility late in the day and not exiting the property until after hours or even the next day. If you notice that a specific tenant is onsite during multiple reported incidents, they could be the culprit. Also, if possible, try setting up six-digit gate codes versus the typical four-digit access code. The probability that a criminal can guess a four-digit number is significantly higher, so if the functionality exists within your gate system, try this simple change to add one more layer of security to your facility.

Invest in cameras or a security system. Sure, certain high-tech systems cost thousands of dollars, so some smaller operators may not believe that a surveillance system is worth it, but the sense of security it will provide current and prospective tenants is worth the investment on its own. And that’s exactly what a security system is…an investment in the security of your facility, your onsite staff and your tenants.

Security technology has come a long way, and this type of digital surveillance is an excellent crime deterrent. Tamper-proof cameras that only record motion-detected activity is the way to go, as it is easier to spot an incident on recorded footage. This new camera technology has the capability to send notifications to a smart phone when activity is flagged. There are also third-party companies that monitor your cameras for you, so when suspicious activity is taking place, the monitoring company can broadcast a warning through a speaker and/or send you a notification. Make sure you choose a surveillance system that can be viewed from anywhere, and on any device with an Internet connection. Camera placement is paramount, so don’t sleep on that part of the equation. Setting up cameras near your gate, the office and around occupied and unoccupied units will provide optimal vantage points in common areas where criminal activity often occurs.

Adequate lighting is a bright idea. Criminals like to hide in the shadows and tend to steer clear of well-lit areas. At regular intervals, survey your property for sufficient lighting, and if you notice a lightbulb that is losing its luster, replace it immediately. This will not only help deter crime, but it will also help your customers to feel secure when visiting their unit at any time of the day or night. Also, consider switching to LED lighting and motion detection lighting to help illuminate your space and save on energy costs.

Ensure all units are locked. Whether you are an early adopter of the new smart locks or DaVinci locks, or you are a loyal user of disc or cylinder locks; make sure that all units are always locked. If you notice that a tenant forgot to lock their unit, overlock it and send them a notice of improperly secured space. If you discover that a tenant moved out without notifying the facility, put a lock on the unit until it is leased to a new tenant. This practice will ensure that you don’t attract “squatters” or that new tenants do not accidentally move into the wrong unit.

When in need, hire a security guard. An onsite security presence is a great way to deter potential criminal activity, however, it can get expensive in a hurry. It can be a good temporary solution if you are experiencing repeat incidents, like the facility mentioned above that had over 75 break-ins in the span of two weeks.

Utilize your local police department. Be sure to call your local police department to report any serious issues or incidents on your property. If your facility is located in a high-crime area or you notice a steep increase in criminal activity, request an officer to patrol the area more frequently. However, be cautious in contacting the police too often, as you don’t want to be viewed as “the facility that cried wolf” and encourage them to be less amenable to future requests for assistance. Also, some might suggest that an off-duty police officer parked at or near your facility will help to decrease crime, but it also can send an unconscious signal to current and prospective tenants that your property is not secure, which is the exact opposite reaction you want to elicit.

New Technology to Consider

Access Control – Recently, there have been major technological advances in the access control arena. With the rollout of Janus International’s Nokē Smart Entry System, Bluetooth smart lock technology has been introduced to allow customers to lock and unlock their units from a smart phone. It also gives operators the ability to revoke access rights upon tenant delinquency. PTI Security Systems and OpenTech Alliance also offer smart access control products to ease security woes, help automate your processes and provide an elevated customer experience. These types of smart access systems can also help bring in additional revenue, as customers are willing to pay for the added convenience and security. Facilities across the state are adopting this new smart technology and loving it…and so are their customers. We will continue to see an increase in the use of such systems as time passes and technology continues to evolve. Do some research to find out if a smart access system is right for your business. 

Locks - Most operators offer online rentals, but in order to do this successfully, you have to have a system in place to give access to new tenants. DaVinci locks or serial combination locks allow you to text a code to the new online renter, who can then remove the lock to access the unit. No need to send a manager to the property to unlock the unit for the new renter. This type of lock is helpful in dealing with delinquent tenants, too. As soon as the tenant pays their balance in full, you can text them the code so they can have immediate access to their unit.

In summary, security is vital to the success of your business and should be a top priority, not only during the holidays, but all year long. It's not something that you should “set and forget,” but rather something that should be consistently monitored (just like your facility) and reevaluated regularly. You don’t need all the new tech, but there are some great products out there right now that are worth the investment. In the end, do whatever is necessary to ensure the safety of your facility, your onsite staff and your tenants. May your holiday season be merry, bright...and above all, safe!


Additional Security Resources—Recent Luncheon Presentation Recordings

 
SAN ANTONIO LUNCHEON:
PROTECTING YOUR SELF-STORAGE FACILITY

Recorded on November 7, 2023
  


 
DALLAS LUNCHEON:

PROTECTING YOUR SELF-STORAGE FACILITY

Recorded on July 18, 2023


Make Security a Priority

A Safe Place

What Your Facility Needs to Ensure Its Safety
by Tracie Seed

Injury. Vandalism. Theft. Drugs. Prostitution. Aggravated assault. Rape. And even murder. While you may think this is a recap of an episode from NCIS, it is actually a list of things that can, and have, happened at self-storage facilities across the country. So how can you keep yourself, your employees and your property safe? It’s a matter of proactively utilizing safety equipment, tailoring business policies to your facility’s needs and taking a common-sense approach to thwart, or even prevent, unsafe or criminal activity.

SURVEILLANCE

Video systems installed inside and outside the facility, including parking lots, can help monitor suspicious activity from tenants and the public, as well as employees. In addition, a camera system can record instances of any physical or verbal abuse or harassment towards employees or visitors. If an angry customer denies yelling at and threatening a manager, you will have undeniable proof of the incident. The same is said for an out-of-control manager who treats your customers poorly.

Stanley Crossman, owner of The Attic Self Storage in Dallas and surrounding areas, says burglary often happens in broad daylight by employees of companies storing items at his facility. “For instance, a guy who worked for a pool company was coming in and stealing things out of his employer’s unit,” he explains. “Once the business owner realized he’d been robbed, it was obvious that it was an inside job, since the lock wasn’t broken.” Crossman states that initially his facility was blamed for the theft, but after reviewing video footage, it was clear that the pool company’s employee was the culprit.

Both Crossman and Michael Postar, owner of many facilities in Lubbock and Wolfforth, including Affordable Storage and A-Plus Super Storage, strongly suggest having one or more cameras as well as monitors in the office to provide a broad visual scope of the property. Managers can watch the property as a whole and the cameras dissuade both visitors and employees from engaging in criminal behavior. “If something happens, you can pull up various sections of the video and look at the timestamps. You’ll know who has come and gone,” says Crossman. Reviewing video footage on a regular basis will also help you catch undesirable activity early before it gets out of control. Crossman says that if he notices an access code being used more than normal, it is a red flag to check out what’s going on during that time and monitor activity more closely.

Postar has audio recording equipment in his facilities as well as panic buttons under the desks. “We display signs saying that there are cameras on the property and monitors in our office. These act as a deterrent to criminals,” he explains. Postar says that he has used both audio and video footage to protect his staff from aggressive police officers looking for information or wanting to enter a unit without a search warrant. “First thing I tell my employees to do is to call the corporate office and not engage with the police,” Postar says. “Once we get them on the phone, we let the officers know that they are being videoed and audio taped, and that usually calms them down.”

In addition to these safety measures, it’s important for onsite managers and staff to keep their eyes and ears open. Get to know customers. Greet them at their units when they are moving in. Walk the property daily and look for signs of intrusion or questionable items left outside units,   in the parking  lot or near  the dumpster. For example,     look for cut locks,  drug paraphernalia or lights    and sounds coming from a closed unit. Monitoring surveillance footage on a regular basis  can help you prevent further crime or uncover  the source of criminal behavior.

LIGHTING AND ACCESS

Todays self-storage customer, especially in the larger markets, expects a tech-based security system. Not only do owners who dont have a solid system in place risk the occurrence of criminal activity, they also  risk  losing customers to another facility that has these features in place.

Both Postar and Crossman point to security lighting  as an important and necessary feature a facility should have. “Most of the time, people break into a unit at night,” Postar points out. “Ample lighting serves as a deterrent because the last thing criminals want is to be seen.” Crossman uses LED lights, which he sets on a timer from sundown to sunup to illuminate his facilities, focusing on the perimeter and hallways. Crossman says that while the initial investment to replace all his lights with LED bulbs was a bit pricey, he believes it was a worthy investment. “I cant express enough how much better LED lights are than my old system,” he says. “They are much brighter, and they last longer.” Motion-sensor lighting has the added benefit of turning on the second someone crosses its path. For added protection, install these devices in areas where criminals may try to hide—in bushes, dark alleys, entrances, parking lots and dumpsters. Once exposed by an unexpected illumination, most criminals will immediately leave the scene.

Crossman says a secure gate system is a self-storage facility must. “When I started in the business in 1974, the best gate security system available was a chain link fence with a lock,” he recollects. “Now, gates are automatic and you can prevent people from entering.” In addition to limiting unwanted access, an automated gate system allows for a timestamp on who is entering and exiting the facility. If a tenant comes in several times a day or is coming in late and staying longer than usual, these behaviors are red flags. “You want to know who’s coming and going and how often,” he advises. “Someone might be coming in periodically throughout the day, which means they might be making meth or engaging in prostitution. You’ll need to keep a close eye on them!”

“I also require my tenants to use the round Chateau locks, which are made of hard steel that’s difficult to cut or grind down,” he explains. “Criminals want to quickly clip a lock, grab and go. This type of lock slows them down or they might decide it isn’t worth the risk to try.” As another defense, Postar locks each unused storage unit with regular locks. These locks prevent easy access of empty units to criminals. Also, if any of these locks are cut, this serves as a red flag that someone is trying to break in.

Advanced technology plays a big role in today’s controlled access security options, with products like Janus International's Nokē® Smart Entry System. This system is a Bluetooth electronic lock that allows customers to easily access your facility and their unit all from using a smart device. In addition, the Nokē® Smart Entry System incorporates digital key sharing, where tenants can go into an app on their phone and grant anyone temporary access to their unit. The digital key can be revoked at any time, and an activity log keeps track of exactly when the unit was accessed during the key-sharing time frame.

In addition, the system allows managers to set custom access hours for individuals and grant access to maintenance crews or other staff. There are a number of property management software companies that are fully integrated with the Smart Entry System, including TSSA members Easy Storage Solutions, SiteLink, Storelocal and storEDGE. “Our Smart Entry System offers self-storage facility owners and operators unprecedented levels of security and access control,” says Terry Bagley, President of the Door Entry and Facility Automation division, “The natural next step was to integrate with a wide variety of property management systems, and in doing so, streamline the rental process to allow site managers, as well as customers, the opportunity to interact with their sites and units in an elevated way the industry has never seen before.”

POLICIES ON CASH AND GATE HOURS

While you may have your safety devices in place, in order to secure your facility, it is imperative to implement some policies and procedures as well. Postar, like many facility owners and managers, requires staff to keep no more than $200 in accessible cash. “If you have a lot of tenants who pay in cash, you need to make bank deposits on a daily basis to get it off property,” he says. “You don’t want several thousand dollars coming in over the course of a few days and holding onto that in the office.” If it is widely known that you are a cash facility, you are putting yourself at risk.

Rather than being open 24 hours a day, both Crossman’s and Postar’s facilities have set gate access hours. Crossman has a strict 9:00 p.m. lockdown, while Postar’s gates are open from 6:00 a.m. to midnight. “Anything happening after 1:00 a.m. is just trouble. Most break-ins are at 3:00 a.m., right in the middle of the night,” says Postar. While Postar typically gives 24-hour access to a reputable business that needs it, Crossman has a policy to not work with limousine companies and delivery trucks. “If anyone wants in after 9:00 p.m., I have to wake up the manager, who lives onsite,” he explains.

Postar suggests more safety policies to consider. He doesn’t put his staff members' last names on their badges or business cards. In addition, the business cards list several employees’ names on them rather than a specific person. “We don’t want tenants or criminals tracking down our managers via the Internet and finding out where they live,” Postar explains. He also asks his managers to carry cell phones and to make copies of customers’ IDs before showing them a unit. Another option would be to keep a customer’s ID in a locked drawer to be returned to them after a unit tour.

COMMON SENSE

For the general safety of your property, tenants and employees, Crossman says to take a common-sense approach. “Repair driveways as needed and have fire extinguishers throughout the property,” he says. Postar concurs that a clean, well-appointed facility doesn’t attract people of questionable character. Thieves know what to look for in a vulnerable property—a broken fence, neglected repairs or darkened areas. “A nice outside appearance says that you run a reputable facility,” Postar says. “Criminals will want to stay away.”

In addition, if your property is kept up to standards, anything out of sorts will be more readily discovered. If you feel uneasy, both facility owners say that you need to follow your gut and keep calm. You can get a vibe really quickly if something is wrong and you have to pay attention,” Postar says. “Managers typically know who the regular customers are. If someone new comes in asking strange questions that a regular self-storage customer wouldnt, like about the facilitys structure or staffs schedule, thats a red flag that something is going on.” At this point, quickly end the conversation. Postar      says that for this and other safety reasons, it is good to always have a manager and assistant manager on duty, so there is backup if something goes wrong.

Choose what features fit your facility’s needs, implement them and use them to their fullest capability. If you can’t have a gate system, have the best video surveillance you can afford. If your facility is in a high-crime area, up the restrictions on access and add additional motion-sensor lighting. While unexpected safety issues occur on a weekly, even daily, basis, you can be proactive to ensure that your facility is a safe place.

Read More Blog Posts »

What Your Facility Needs to Ensure Its Safety

Is Your Data Secure?

Finding Your Way Through the Maze of Cybersecurity

by Jennifer Jones, JKJ Marketing

When it comes to data security, most self-storage owners believe that with basic firewall protection, their data and their tenants' data are secure. Some use third-party systems that have security protections in place when transmitting data. However, most owners believe that they will not be targeted by a cybersecurity attack. But that isn’t just self-storage owners; small-to-medium-sized businesses share the belief that they’re too small for cybercriminals to target them.

According to a study by Ponemon Institute and Keeper Security, “Fifty-eight percent of respondents believe ransomware is a serious financial threat and are concerned that negligent employees put their company at risk, but only half (50 percent) say prevention of such attacks is a priority. Many are not confident that their current anti-virus software will protect their company from ransomware.” The businesses in the study employ between 100 and 1,000 people. Most of the companies that participated in the study experienced a cyberattack or data breach with severe financial consequences losing an average of 9,350 individual records as a result of data breach.

TYPES OF ATTACKS

 According to the study, cybercriminals varied their methods between 2016 and 2017. “Phishing/social engineering has replaced web-based attacks (48 percent and 43 percent of respondents, respectively) as the most frequent type of attack. Compromised/stolen devices and denial of services attacks increased from last year’s study (30 percent and 26 percent, respectively).”

Ransomware is one of the most common I’ve heard about hitting the self-storage industry. There are two types of ransomware attacks:

  • Encrypting ransomware, which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content.
  • Locker ransomware locks the victim out of the operating system, making it impossible to access the desktop, applications or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.

Ransomware can be unleashed in a variety of ways: phishing/social engineering, insecure or spoofed website, social media, malvertisements and more.

Cybercriminals typically encrypt your data and hold it ransom, leaving the self-storage owner to ask themselves, “Do I pay or not?”

Among the participants in the study, of those that didn’t have full backups, about 60 percent paid, with the aver- age ransom being $2,157. If they didn’t pay, it was because they had a full backup or didn’t trust that the criminals would release the data.

WHERE ARE YOU VULNERABLE?

According to the study, “data breaches due to negligent employees or con- tractors (54 percent of respondents) increased significantly from 48 percent in 2016. This is followed by third-party mistakes (43 percent of respondents) and errors in system or operating processes (34 percent of respondents). However, almost one-third of respondents say their companies could not determine what caused the incident.”

The main points of vulnerabilities are mobile/Internet of Things (IoT) devices, laptops, smart phones, cloud systems, Intranet server, Web server, desktops, tablets, portable storage devices and routers.

IoT vulnerabilities include in-office wireless-based printers and other devices. Use of cell phones and tablets to access business-critical applications and IT infrastructure are also vulnerabilities.

EASY SECURITY FIXES

Company information isn’t just vulnerable to cybercriminals; it’s also vulnerable to employees and anyone else walking into your facility. There are several things you can do that cost little to no money.

  • Have and enforce a password policy. It’s the easiest and most affordable security measure there is.
  • Ensure that everyone logs out of the computer and locks up any filing cabinets before walking away from the desk.
  • If you have multiple employees, ensure that they all have their own passwords.
  • Install a firewall.
  • Install anti-malware.
  • Back up everything to an external device or to the cloud.

USING A THIRD-PARTY

If you use a third-party solution to take online payments, most have some sort of encryption protection before the sensitive tenant information is sent through the system.

Easy Storage Solutions co-founder Jimmy Sorenson says, “Credit card numbers and social security numbers (if collected by the facility) are encrypted before the data hits our servers.” The Storage Unit software servers have their own security and host through Amazon’s AWS, which is a cloud- based solution.

“Our software also allows for different people to have different access levels so a regional manager can have different access than a store manager.

“We also carry access control products and keypad entry, which integrates with our software. People get excited to be able to offer pay options where a tenant can swipe their credit card at the gate. However, we’ve never done that because people can install skimming devices and it’s another vulnerability, which would create a breach.”

BEST SECURITY PRACTICES

  • Don’t write down credit card or social security numbers and store locally in filing cabinets or on a computer. (Against PCI regulations.)
  • If a lease asks for a credit card, don't include the card numbers on a lease.
  • Don’t store credit card numbers in random places (including in an email), even in your database, if the field isn’t encrypted.
  • Don’t use repeating numbers for gate entry codes (ex: 1111).
  • Don’t browse questionable websites. Some facilities provide tablets for employees to use for browsing.
  • Back up your data to something that is offsite at night. Backing up to a USB and leaving it in the computer isn’t a secure backup, or backing up to a hard drive and leaving it in the facility risks it being burned in the case of a fire, or stolen during a break-in. The most secure backup is with a third-party service such as Carbonite or Backblaze which back up your whole computer.
  • Educate employees about not opening questionable emails, clicking on links when they don’t know who an email is from, surfing unknown or questionable sites, or downloading things from unknown origins.
  • Install spamware.
  • Install a firewall.
  • Minimize the amount of personally identifiable information (PII) that is collected from customers to reduce the impact to customers in the event of a data breach (which reduces liability).
  • Use a web-based software to minimize the amount of customer information that is stored locally on a PC.
  • Work towards a paper-free office environment where all paper files are scanned and stored on a secure server.
  • Existing paper files should be kept in locking cabinets.
  • Conduct regular user audits of your systems to ensure that all user access levels are correct and that ex-employees have been removed in a timely manner.
  • Questions you should ask your third-party provider:
  • Are you PCI compliant?
  • Do you encrypt data?
  • Do you use tokenization?
  • Do you offer SSL certification (if the vendor provides your website)?

While some software is sold as Software as a Service (SaaS), some third- party software is installed on your computer. QuikStor Security & Software offers a one-time purchase PC version. “The whole database is password protected, so a criminal would have to hack into the database to capture the tenant information like address, date of birth, etc., but the credit card fields are encrypted,” says April Lee, business development consultant for QuikStor. “The encryption means that a tech agent who can get in and help trouble- shoot information on your database wouldn’t be able to see the encrypted information in those fields. We also don’t store credit card information. We use a tokenized system, which means that once the software sends the card number to the credit card processor, the credit card company responds with a token that is specific to that facility and uses that instead.”

While each company will have their own security measures in place, QuikStor has a hybrid of both onsite and cloud-based servers. Even though their physical servers are in an offsite server location, only two people at QuikStor have access to enter where their servers are stored. “Everything is backed up offsite,” says Lee. “We have one server for cloud and one for offsite backup.” The duplication strategies that many technology companies have is so they are able to retrieve data if it’s compromised or if something crashes. Multiple backups and being able to fully restore from a backup is critical for business continuity.

Lee says that during her time with QuikStor as a tech, she talked to customers who had their software on their own computers. However, they didn’t have a backup and didn’t always subscribe to a backup service and then lost the data.

“We do have a feature on our software that logs people out during overnight processing,” says Lee. “So if someone breaks in during the night, they won’t be able to walk over to the computer and easily have access to the data. Except with the basic version of our software, you’re able to create individual passwords so every employee has their own log in. We also have audit reports to monitor and pre- vent employee theft. You can set the software to rent the oldest unit first to keep employees from taking cash from friends and allowing them to rent units off the books. There are also extensive unit controls so your employees can’t see reports and can customize what an employee can and can’t do.”

SECURITY YOU CAN’T SEE

Criminals continue to use ever-changing methods to make a quick buck. A survey of cybercriminals showed that they are looking for easy “typical” IT security that takes less than 24 hours to access. While we hear about the big data breaches of Uber, Yahoo, Marriott and others, most of the attacks are on regular businesses. But even basic security measures, policies and procedures can help protect your business and data from employee theft, a break-in, natural disaster and cyber- criminals.


Jennifer Jones is managing editor of Self-Storage News and owner of JKJ Marketing in Austin.

Read More Blog Posts » 

Is Your Data Secure?

Cybersecurity Tune-Up

by Taressa Dominguez, TSSA Director of Education & Marketing
April 28, 2020

As more and more self-storage facilities conduct business online and are shifting to no-contact leasing due to the public health crisis, the need for cybersecurity is at an all-time high and only increasing.  According to Ponemon Institute’s 2019 Global State of Cybersecurity in Small & Medium-Sized Businesses study, 66 percent of small businesses experienced a cyber attack, while 63 percent experienced a data breach with significant financial consequences.  The cause for concern is warranted—more than half of small and medium-sized businesses suffered losses due to cyber attacks in 2019 alone.  Add that to the current situation where the health crisis has forced self storage to move as much business online as possible, and you have a dire need to assess your facility’s cybersecurity protection.

However alarming the headlines and data may be, you can protect your business from cyber attacks by being alert and proactive.  Precaution and planning today can go a long way tomorrow.

Create a Security Plan 

Start with identifying the information you want to protect—the information that you need to conduct your business.  Once you’ve identified the types of information you want to protect, you can better implement procedures and programs to do so.  It is likely that you will want to protect multiple types of informationfrom customer records and payment processing to basic business records—making it entirely appropriate to layer your security programs and procedures. 

Address Your Vulnerabilities

To keep your sensitive information safe and out of the hands of hackers, you will need to limit access points to your system, as well as safeguard information to which access could be gained. 
Use security software.  Make sure you are guarding against malware, including antivirus and antispyware, and updating regularly oreven better—automatically.
Protect your network.  Utilize firewalls and encryption, as well as password-protect your staff Wi-Fi network and keep it hidden.
Manage your passwords.  Make them long and hard to guess.  You might even consider using a password manager program to help keep track.
Opt for multifactor identification. Requiring an additional access code just adds a layer of protection.
Scrutinize your emails.  If an email is suspicious, or you don’t know the sender, or you do know the sender but don’t recognize the email address when you mouse over it, do not open or click on anything in that email. Viewing emails in preview mode helps with this.
Create a backup.  Consider backing up your system to the cloud, or to an external device as well as the cloud.  If anything happens to the physical backup, you’ll still have the cloud version.  Not only does this help protect you against ransomware attacks, it can also be a lifesaver if your computer ever crashes.

Train Your Employees

Human errors or negligence lead to most cybersecurity breaches.  The Ponemon study indicates that 70 percent of breaches in the United States were due to negligent employees or contractors.  Whether due to a weak employee password or an innocent click on an email, breaches are likely to happen if we do not keep training staff to be hyper-vigilant and informed of the evolving vulnerabilities your facility faces.  

As these attacks continue to grow and become more sophisticated, the self-storage response must remain at-the-ready and prepared to adapt to new threats.  It isn’t enough to put a security program in place and be done.  You must also regularly evaluate your success in thwarting cyber attacks and consider the evolving creativity of these hackers.  Stay up-to-date and continue to assess your vulnerabilities.  Your creativity in defending your business must also evolve with the threat.

What are you doing to strengthen your cybersecurity?  


Let us know.

Read More Blog Posts » 

Cybersecurity-Tune-Up