Hacking small and medium businesses - why bother?
Computers & Technology → Technology
- Author Kees Buiel
- Published April 2, 2019
- Word count 561
Why would a cyber attack on 15-person Company raise any alarm bells? Why is it a concern to anyone let alone the Department of Homeland Security?
There are millions of small businesses in the USA and globally, in fact over 100 million of them and this number are growing each year, and faster as the world changes employment strategies.
So, why are any of them a concern to a government agency like the DHS? Surely the DHS is focused on banks and larger companies, this is where the threat is? Keep them safe.
No, this is not so true. In a recent example, a small business working with utilities and government agencies, suffered a cyber attack that was an early thrust in the worst known hack by a foreign government into the USA's national electric grid.
The Wall Street Journal has reconstructed the events around the hack that revealed huge vulnerabilities at the heart of the electric power system.
Rather than strike the utilities head on, the hackers went after the system’s soft and unprotected contractors and subcontractors. There are hundreds of them, all vulnerable and some more than others.
This should be sounding an alarm bell to every large corporate if not every company.
Small and medium business generally has no reason to be on high alert against foreign agents 24 hours a day. Why would they be? They also don't have the people, systems or solutions in place to do this.
Yet through these small companies the hackers, in this case, found the footholds necessary to work their way up the supply chain. Enabling the final target to be reached, hacked and exposed. Some experts believe 20 or more utilities ultimately were breached.
The hackers have the time and resources to do this and they are aware that small and medium sized businesses are a very soft target.
The WSJ article is a must read, I am not going summarize it here to save you time- just read it!
Have you read it yet?
On a similar note and to underline the issue the FBI is investigating the alleged theft of 18,000 insurance and legal documents relating to the September 11 attacks on the World Trade Center by a hacker with a long record of holding companies to ransom. This ransom attack, if it did happen, highlights the vulnerability of a business not just from within but across a huge web of suppliers and partners.
This type of breach, Data Breach can lay your clients details bare, data lost and cause untold issues, at the very least a PR nightmare.
Where does this leave you?
What can you do about the growing threat of hackers? First, put in place the best tech barriers you can afford, get some advice to - know where you are weak. Buy cyber liability insurance to cover the recovery costs too. Vulnerabilities change all the time, insurance is there to bring you back to life when all else fails.
Then patch your biggest vulnerability: your people. They need training and awareness of these issues, especially if you work for large corporate or government bodies.
It’s not just about employees having smarter passwords and spotting sketchy emails but also to think about their online actions. This is not about a list of rules; it’s about awareness and responsibility. Remember rules create a path for hackers to follow....
Small and medium business generally has no reason to be on high alert against foreign agents 24 hours a day. Why would they be? They also don't have the people, systems or solutions in place to do this.
http://blog.microinsurance.com/post/gdpr-data-breach
http://blog.microinsurance.com/post/small-business-data-breaches
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- GoPDF An Online PDF Editor Releases Mobiles Apps Compatible with iOS & Android: A Faster Solution for PDF Editing
- The Best AI Logo Generators in 2024
- Adapting to Rising Parcel Rates in 2024 with Business Central and Order Ship Express
- Zoviz Launches New Solutions Day by Day to Users as An AI Logo Maker
- Is Your Finance Strategy Ready for ERP Software?
- A Beginner's Guide to Starting a Career in Web3
- Harnessing the Power of License Plating in Dynamics 365 Business Central
- Crypto Weekend: Hydra Being “Abandoned”, New Blockchain Games And Partnerships
- Crypto And Web3: Integration That Opens Up New Opportunities
- Top 10 Features You Didn't Know Existed in Product Configurators for Business Central
- Enhancing Test Case Reusability with Execution Recording
- The Ultimate Guide to Hiring ASP.NET Developers for Your Business
- INVESTIGATING THE NEW MACBOOK AIR M3: STOCKPILING AND SPEED EXPERIENCES
- How to Fix Sump Pump Drainage: A Complete Guide to Keep Your Basement Dry
- From Paper to Digital: Transforming QA with Dynamics 365 Business Central
- How AI Content Moderation Keeps Your Brand Afloat
- the best metal detector
- You’re probably not ready for AI. Guide to K-12 data collection.
- Elevate Your Business Central Experience with Free Barcoding Integration
- Choosing the Best SMS Gateway Provider: 5 Essential Features for Success
- Designing Easy to Use Software: Understanding the Basics of UX Testing in Quality Assurance
- The Link: Merging Brains and Computers
- Machine translation vs AI translation: What sets them apart?
- Navigating the Path to Data Excellence: A Guide to Choosing the Right Power BI Consultant with GTH Cloud 365
- The Future of AI: Exciting Times, Big Questions
- The Evolving Landscape of SEO in 2024: Navigating the Digital Frontier
- Customize Your Gaming Console To Optimize Your Gaming Experience
- Data Recovery Complications
- Unveiling the Power of Digital Platforms
- Revolutionizing Connectivity: Digital Transformation in the Telecom Industry