Cybersecurity Defensive Stance Protects Small Business Computers

Cybersecurity Defensive Stance Protects Small Business Computers

I guess if you’re going to be a criminal, choosing the weakest people and situations to prey on seems the Cybersecurity Defensive Stance Protects Small Business Computersmost logical. In fact, this is the current trend for cybercriminals: to prey on small businesses.

According to a report from Verizon, of all the sizes of businesses in the economy, small businesses continue to be the most victimized. In 2012, Verizon recorded and verified 621 data breaches with approximately half of the breaches occurring at companies with fewer than 1,000 employees. Of the 621, 193 of the incidents were at companies with fewer than 100 workers.

Unfortunately over the past 6 years, small business cyberattacks have been running rampant, making it a trend in the world of cybercrime. Because larger corporations have taken such a defensive stance against cybercrime by utilizing sophisticated security strategies, cybercriminals are forced to look for other ways to lie, cheat and steal.

Small businesses usually don’t have the budget for big IT departments or to protect every computer used by the business, so cybercriminals are taking the path of least resistance and attacking small businesses. This is rather scary, seeing as though small businesses usually retain valuable information such as credit card numbers.

What are small businesses to do?

I think the first step is to become educated about the tactics cybercriminals are using to attack small businesses. Let’s start now. Here are some of the most common tactics used against small businesses by cybercriminals:

  1. Small Businesses as Stepping Stones: Cybercriminals target small businesses in growth industries and then patiently wait, hoping the small business will be acquired by a larger corporation. When the merger or acquisition takes place, cybercriminals gain access to breach the system of the larger parent company.
  2. “Ransomware” Scams: Cybercriminals hack into a small business’ computer system and lock it, demanding a ransom fee from the small business to unlock their system.
  3. Malicious Software: Cybercrinimals use this to steal information from mobile devices.
  4. Malware: Cybercriminals use a small business’ website as bait to gain access to the larger company’s database.

The next step is to use these tactics to create an individualized plan-of-defense, based on the niche of the small business. Before a detailed plan-of-defense is formulated, some good rules of thumb are to:

  • Create and use strong passwords by including capital and lowercase letters interspersed with symbols;
  • Keep antivirus software up-to-date at all times; and
  • Do not expose essential business services to the Internet.

Source: http://money.cnn.com/2013/04/22/smallbusiness/small-business-cybercrime/index.html?iid=EL

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.