facebook linkedin twitter

Computerware Blog

Even If You Don’t Hear About Small Business Breaches, They Happen

Even If You Don’t Hear About Small Business Breaches, They Happen

If you have a bank account or a credit card, chances are you’ve been made aware of a hack or a data breach. Big organizations are more frequently being breached, forcing them to run damage control for the often millions of customers affected. News coverage often bashes these big organizations, but what about smaller ones? The truth is, smaller businesses are breached just as often, with the consequences being just as severe. 

Does Your Business Really Have to Worry About Data Breaches?

When the news reports a data breach or large-scale cyberattack, the event in question is usually one that has targeted an astronomical number of people, or has created difficulties that are undeniably newsworthy. How often has the national news reported a breach in one of your local Mom and Pop shops, as compared to entities like Equifax or Capital One?

Obviously, it makes sense that these small-scale attacks don’t often hit the national news cycle… after all, the Equifax breach compromised the data of 40 percent of Americans. However, in the month of July 2019 alone, there were approximately 2.2 billion records leaked over an assortment of 27 different cyberattacks. That’s about a quarter of the world’s population - not accounting for overlap between the information accessed.

Now, you may be wondering, how do these major breaches influence your business? Well, I’d like you to consider how many employees (out of a total of 49,000) Capital One has dedicated to its cybersecurity and data theft prevention? While I don’t have the official number to give you, it’s a pretty safe bet that it’s more than the average small business in Northern Virginia and Washington DC.

Why Small Businesses are Vulnerable

As a result, a cybercriminal generally finds it much easier to access a small business’ network, and while the gains to be had are significantly smaller than they would be to hack into a global enterprise, many cybercriminals prefer to take the “larger amounts of smaller payouts” than the “more challenging single payout” option.

It’s no wonder, either...nearly 40 percent of small businesses ultimately pay up when faced with ransomware, and a single person’s personal information can be sold on the Dark Web for anywhere from $1 to a thousand times that… all depending on how much of their data was stolen. How many records like this do you keep on your customers and employees? It doesn’t take very many to make it worthwhile for a cybercriminal to steal them.

Many Attacks are Random

Chances are, if you were to be targeted right now by some kind of online threat, it would probably be more due to bad luck than it would be due to a concerted effort against you, specifically. Many of today’s biggest cyberthreats are the ones that can spread independently - things like phishing, malware, and trojans. Once a system is infected, the threat can spread via a network connection or an email.

While these threats have largely become obscured by the more newsworthy breaches, they are no less dangerous to a business.

How Can My Organization Protect Itself without an Enterprise Budget?

Smaller organizations do have one considerable advantage over large enterprises, like the 49,000-employee Capital One: fewer employees means fewer points of entry for a cyberthreat. You need to be sure that each employee, each piece of technology, every access method, and too many other factors to list here are all properly secured. The smaller size of a small business makes this a much more manageable goal.

How to Secure a Small Business

  • Deploy the basics: protect your organization with centralized antivirus and antimalware, keep an updated firewall, maintain content filtering and intrusion detection solutions, use a spam blocker, and keep everything patched and updated.

  • Comprehensive monitoring: this helps to catch issues early before they become major problems.

  • Employee training: educating and evaluating you team will help prepare them for dealing with real threats they encounter.

  • Compliance audits: based on the industry you operate in and the data you retain, you need to be sure you are abiding by established security standards.

  • Data access requirements: enforcing things like Bring Your Own Device policies and password guidelines will help keep company data secure.

  • Backup and disaster recovery: in the case of a data disaster, you will want to be able to restore your business’ data from a backup and continue operations.

While this isn’t a one-size fits all list, a business of any size should use these practices as a least a starting point for their IT security. If you want more help in keeping your business secure, reach out to Computerware. An IT security audit and the right solutions are just a call to (703) 821-8200 away.

Tip of the Week: Automatically Organizing Your Ema...
How Augmented Reality is Changing the Face of Indu...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 17, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Software Cloud Business Management Hackers Data Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Business Hosted Solutions Productivity Email Malware IT Services Saving Money Efficiency Computer Productivity Google User Tips IT Support Smartphones Innovation Small Business Mobile Devices Data Backup Quick Tips VoIP IT Support Business Continuity Collaboration Gadgets Network Microsoft Office communications Data Recovery Android Upgrade Social Media Disaster Recovery Server Cybersecurity Mobile Office Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Holiday Ransomware Tech Term Vendor Management Operating System Passwords Windows 10 Windows Internet of Things Managed IT Services Apps Unified Threat Management Remote Monitoring Facebook Outsourced IT Automation BDR Mobile Device BYOD Remote Computing Managed IT services Apple Mobile Computing Data Management Users Analytics Windows 10 WiFi History Artificial Intelligence Marketing The Internet of Things Browser Cloud Computing Firewall Save Money Alert App Big data Help Desk Two-factor Authentication Bandwidth IT Consultant Business Technology Encryption Spam Office 365 Training Antivirus Gmail Office Managed IT Government Cybercrime Content Filtering Information Technology Going Green Maintenance Printer Hard Drives Bring Your Own Device Access Control Health Saving Time Computers Windows 7 Search VPN Managed Service Recovery Employer-Employee Relationship Retail Windows 8 Outlook Lithium-ion Battery Best Practice Cost Management Information Tech Support Hiring/Firing Virus Healthcare Budget Wireless Technology Customer Service It Management Phone System Travel Blockchain Education Data Loss Update iPhone Networking Hacking Project Management IBM Humor Money Document Management File Sharing Administration Hard Drive Wireless Law Enforcement Applications Twitter Current Events Intranet Compliance Mobility Website Patch Management Solid State Drive Avoiding Downtime Conferencing Data storage Risk Management Data Breach Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint SaaS Computing Running Cable Proactive IT Robot Social Data Security Securty Google Maps DDoS Storage Social Engineering Flexibility Scam Black Market Voice over Internet Protocol Cryptocurrency Word Monitoring Fax Server Laptop Business Intelligence Private Cloud Cortana Business Growth Digital Digital Payment Wi-Fi Excel Telephony Websites Router Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Telephone Systems Cooperation Software as a Service Company Culture Sports User Computer Repair Vendor Disaster End of Support Social Networking Hosted Solution Virtual Desktop Statistics Bitcoin Programming Identity Theft IT service Network Congestion Documents Data Protection Distribution Entertainment Teamwork Heating/Cooling Politics Co-managed IT Professional Services Virtual Reality User Error Downloads Emails Bluetooth Streaming Media Automobile Inbound Marketing Chromebook Redundancy Smart Devices Computing Infrastructure Hack Meetings Pain Points Memory How To eWaste Lifestyle Google Docs Net Neutrality Managed Services Provider Evernote Experience Chrome Download Monitors Virtual Assistant Cleaning Multi-factor Authentication Office Tips Taxes Telephone Processors Start Menu Tech Terms Computer Accessories Microchip Mobile Technology YouTube Distributed Denial of Service USB Managed IT Service Trending Presentation Gaming Console Unified Communications Settings Public Cloud Licensing Uninterrupted Power Supply Mouse Webcam Processor Specifications Safety Text Messaging Vulnerability Username Organize Medical IT Trend Micro Permissions Language Memes Unified Threat Management Backup and Disaster Recovery Sync External Harddrive Browsers Electricity Printing Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Navigation Thin CLient Virtual Machine cache Television switches Writing Smart Tech Reliable Computing 3D Solutions Ebay Music Piracy Upload Business Metrics Computer Malfunction Upgrades HTML eCommerce IT Fiber-Optic Database In Internet of Things Smart Phones Data Analysis Employees WannaCry Mobile Security Webinar GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Recycling Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Adminstration Integration Pirating Information Software License Trends Motion Sickness Best Available Google Calendar Deep Learning Devices Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Read Fraud Tactics Fileless Malware Hybrid Cloud UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Proxy Server Azure VoIP Shortcut Term Consultation IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Optimization Content Management Communitications email scam Addiction Administrator Entrepreneur Best Practives Directions Display Supercomputer HIPAA Upselling SSID How To Fake News Advertising Flash Environment Dark Web Free Resource Audit CIO Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Microserver Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Migration Connected Devices Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal Society IT Assessment Network Management LinkedIn Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel G Suite Get More Done Bookmark Computer Care Micrsooft Hacks Physical Security Application Printer Server Harddrive Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Turn Key Employer/Employee Relationships Debate Drones Desktop Finance Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Electronic Health Records Business Cards Service Level Agreement Banking Botnet Trojan Financial Surveillance Managing Stress Printers Regulation CrashOverride 3D Printing Capital Personal Information Productuvuty

toner1