E-business is a complex subject, but can simply be defined as transacting business electronically. These transactions typically occur in three modes: between the company and its buyers, between the company and the vendors it buys from, or transactions entirely internal to the company.


The number of e-business opportunities is limited only by creativity, cost and good business sense. Determine the best opportunities for payback and address them first. Make sure the benefit will meet or exceed the cost.

E-business can allow you to reach customers beyond the scope of your store, target additional customer groups, provide more efficient customer and vendor transaction processing, lower your marketing costs, and improve your company image.

But the decision boils down to one basic business principal: “Will the investment and ongoing expense be paid back with profit?” Analyze the risks by taking a hard look at all the costs involved. Then develop cash flow, income statement and balance sheet projections. How positive is the impact? How long does it take to pay back the investment?

One excellent resource is a business that has traveled a similar path. They can offer insight and advice that will help you make a sound decision.

Consumer attitudes of those who shop and purchase online are significantly different from the habits and preferences of consumers who visit stores. Their purchase decisions are driven and based on a different set of factors tied to the characteristics of the e-space environment. For an e-commerce business to survive, it is absolutely necessary to establish and maintain and intimate understanding of the customers, their behavior, and the factors that drive purchase decisions.

Online consumers are highly sensitive to the following characteristics:

  • Quick page download time (8-10 seconds)
  • Fast navigation
  • Logical and understandable first-page view
  • User-friendly web site that’s easy to read and view, with interesting graphics
  • Immediate customer service; a human to contact to ask questions while browsing
  • Complete product descriptions, prices and pictures
  • Contact information

A secure web site is critical to the success of your e-business. Not only do you want to protect your web site from hackers, but your customers need to feel comfortable that their online transactions are secure. Firewalls, encryption, secure network perimeters and virtual private networks can all be used to elevate security.

Work closely with your technology partner and ISP to determine the security required for your business and investigate various options. FBI statistics show that disgruntled employees are your biggest security risk, so internal business controls are imperative. The following steps will improve security:

  • Address computer security policies in the company policy manual
  • Post banner warnings on employee systems
  • Document computer and software policies with employee user agreements
  • Establish codes of conduct and terms for continuation of employment
  • Create a system to deactivate employee accounts prior to termination
  • Consider keystroke monitoring to support ongoing problems and termination
  • Establish a computer security policy
  • Establish policies for physical security of facility; door locks, restricted access, ID options, security guards, etc.
  • Implement policies for physical security of computers
  • Require a fine for loss of a laptop
  • Establish controls for contents of laptops
  • Restrict access to unused network jacks
  • Restrict the use of infrared devices
  • Establish policies to control the circulation and destruction of information
  • Use third-party “recoverable” encryption products for sensitive data
  • Shred proprietary and personal information before discarding
  • Map your network
  • Compile a list of all running services
  • Know and record typical traffic patterns; recognize abnormal patterns
  • Scan all disks for viruses
  • Obtain software from reliable sources
  • Implement and enforce account and password procedures
  • Delete obsolete or inactive web pages
  • Update anti-virus software regularly
  • Obtain and install security patches
  • If intrusion software is used, update it frequently and read the output
  • Install, test and update firewalls
  • Implement a policy to maintain and inventory software
  • Maintain backup sets of installed software
  • Prepare a contingency plan that will allow you to maintain service
  • Establish an incident response plan
  • Prepare a response checklist
  • Compile a written list of security personnel names and contact information
  • Turn on all logs in the event of an incident
  • Write logs to a remote computer
  • Read and analyze logs
  • Take a snapshot of the system during an incident
  • Verify time stamps on logs
  • Determine the cost of the incident
  • Contact appropriate authorities


The Business Payments Coalition.org provides a Small Business Payments Toolkit: What Small Businesses Need to Know about Payments and Fighting Fraud. businesspaymentscoalition.org/electronic-payments/small-business-payments-toolkit/


ASBDC seal 125px

Contact Washington SBDC


(833) 492-7232