Alltech IT Solutions Blog

You Don’t Hear About the Small Businesses That Get Breached

You Don’t Hear About the Small Businesses That Get Breached

It feels like every week we learn about another big business or bank or municipality getting hacked, and the data of their customers getting stolen.

Big organizations are losing millions of dollars, forcing their hand to run damage control to millions of customers and deal with crushingly bad press. Beyond feeling a little numb to these cyberattacks (more on this in a moment), many small business owners might be feeling pretty lucky they don’t need to deal with these types of threats. Unfortunately, they are dead wrong.

The Big Breaches Hit the News, But They Aren’t the Only Breaches

It makes sense that we hear about the big cybersecurity attacks, like the ones that hit major entities like Capital One, Equifax, Yahoo, or Riviera Beach, Florida. When a breach affects thousands, or hundreds of thousands, or millions of individuals it’s going to hit the news.

Two out of every five Americans had their data stolen from the Equifax breach, and in July 2019 alone… just one single month, it’s estimated that 2.2 billion records were leaked across multiple cyberattacks. That’s like saying one out of every four human beings has had their data July. Granted, there is overlap. A single person could have had their information leaked multiple times, but still, this is insane.

This number comes from the top 27 cyberattacks worldwide this summer. 

While small businesses don’t have 100 million customer records for cybercriminals to pilfer, small businesses also don’t typically have the level of security a big enterprise would. Think about Capital One - how many of their over 49,000 employees are wholly dedicated to cybersecurity and preventing data theft? It’s not a stretch to say that they have more internal resources strictly dedicated to IT security than small Florida businesses.

Small Businesses are Low Hanging Fruit

It’s easier to get your way into a small business network, and although the payoff is smaller, it isn’t insignificant. Nearly 40 percent of small businesses end up paying the ransom for ransomware. A single record (a record is a collection of an individual’s personal information) can sell on the dark web for anywhere between $1 to $1000 depending on how much information is captured. How much customer (or employee) information do you have stored? It doesn’t take much to make it worth it to a cybercriminal.

Worst of All, Many Attacks are Still Random

The most popular online threats are still the ones that don’t target specific individuals or businesses. Phishing attacks, malware, trojans, and all of the threats we deal with at both home and at work essentially just spread on their own. They infect one computer which then infects others, or spreads out via email, etc. 

We don’t tend to hear about these threats as much anymore because of how massive the big cybersecurity breaches are, but these autonomous threats are just as dangerous and have the same consequences.

But My Organization Doesn’t Have the IT Security Budget of a Major Enterprise

Earlier I mentioned Capital One having over 49,000 employees, and assumed that they had many employees with roles were dedicated to cybersecurity. I’m only postulating this but it’s a pretty fair assumption to make. 

That said, a small business does have one advantage that massive organizations don’t; being smaller leads to fewer points of entry. A 49,000-employee business has a thousand times more points of entry than a 50-employee business. Security has to deal with every single employee, every single computer, every single way a user or employee can access company data, how the website accesses data, how their mobile app accesses data, how third-parties access data, etc.

For many smaller businesses, it can certainly be complicated, but not nearly as complicated. Does a 20-person office need an on-staff, in-house IT security expert? Probably not.

What Does a Small Business Need to Stay Secure?

  • The basics - centralized antivirus, antimalware, a firewall, content filtering, intrusion detection, and spam protection, kept updated and patched.
  • Network/device monitoring - catch issues early so they don’t escalate under your nose.
  • Employee training - educate employees and simulate threats to test the diligence of staff.
  • Regular compliance audits - this changes a little based on your industry and what kind of data you collect, but running audits regularly will help ensure you are safe.
  • Bring Your Own Device and Strong Password Policies - enforce best practices for accessing company data.
  • Data backup/disaster recovery - Always be able to restore from a secure backup.

Depending on your needs there might be a few other pieces to this puzzle, and it might seem like a lot, but your small business is just as much at risk, if not more so, than a large business.

We can help you with your IT security. Give us a call at 954-628-3770 and ask about getting an IT security audit.

Do You Need Cybersecurity Insurance?
Tip of the Week: How to Identify (and Foil) a Phis...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 13 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Document Management Data Security Recovery Threat Spotify Saving Money Business Management Law Enforcement Database Apple Maintenance Employees Telephony Edge Congratulations G Suite Travel Big Data Training Remote Monitoring and Management Health Knowledge Printers Gadgets Botnet Environment File Management Data Backup Battery WiFi Automation Microsoft CrashOverride Data Management Password Cleaning Telecommuting Taskbar Paperless Office RAM Printer Budget Insurance Display Encryption Website Office IT Support Remote Support Access Control Cost Management Virus Net Neutrality Synergy Miscellaneous Eliminating Downtime Artificial Intelligence Productivity Unified Threat Management Social Media Windows Server 2008 R2 HIPAA Network Content Filtering Quick Tips Access Unified Communications Biometrics Windows XP Tech Support Smartphone Internet Explorer Hard Drive Dark Web Online Shopping Plug-In Google Virtualization VoIP Dark Data Managed IT Service HaaS Email Management Applications Mobile Device Payment Cards Data Recovery A.I. Save Money User Tip Hiring/Firing Mobility Internet Movies Scheduling Politics Best Practices Ink E-Commerce Updates Emoji Time Management Computers Telephone Systems Bitcoin BYOD Paper Analysis Backup and Disaster Recovery Bandwidth Authentication Cybersecurity Mobile Security The Internet of Things Business Continuity Physical Security Data Yahoo Business Technology Data Breach Smartphones Machine Learning Hacking Facebook Proactive IT Outsourced IT Credit Cards Scam Managed IT Services Mobile Office Data loss VPN Managed IT Services Project Management Outlook Tip of the week Passwords Antivirus How To Leadership Specifications Settings Analytics File Sharing Comparison Hosted Solution Telecommute Employer-Employee Relationship Workers Medical IT Remote Monitoring Browser Email Samsung Batteries Multi-Factor Security Downloads Vendor Disaster Recovery Managed Service Voice over IP Live Streaming Update Hard Disk Drive Workplace Tips Dongle Staffing e-waste Microsoft Teams Spam Microsoft Office 365 Worker Electronic Health Records Files Sales WhatsApp Printing Spyware Going Green Remote Control eWaste Server Management SaaS Lead Generation Financial Managing Stress Windows 7 Cloud Computing Risk Management PowerPoint Error Instagram Information Technology Google Drive Backup eCommerce IT budget Hardware instant Messaging Hard Drives Human Resources Gmail User Security Benchmarks IT Support iPhone Payment Malware Twitter Virtual Assistant Reporting Processors Current Events Websites Android Word Information Users Entertainment Tablet Tech Term Spam Blocking Sports News Network Attached Storage Employer Employee Relationship Voice over Internet Protocol Computer Care Alert Laptop Gaming Console Communications Wi-Fi Safety Government National Security Hybrid Cloud Business Operating System Hacker Authorization Tech Terms Troubleshooting Tip of the Week Scams Company Culture Small Business Autocorrect Staff Phishing Communication Chrome OS Holiday Phone System Profitability Thank You Conferencing Healthcare Managed Service Provider Licensing Connectivity Blockchain Server Paste Hosted Solutions Retail Cabling Streaming Media VoIp Millennials Smart Technology Wearables Trends Productivity Customer Service Innovation Search Inventory Freedom of Information DDoS Data Protection Mobile Device Management Windows Employee-Employer Relationship Hackers Processor Patch Management Certification Technology Tips Personal Information Video Business Computing Wireless Internet Two-factor Authentication Printer Server Regulation Networking Windows 10 Cybercrime Google Maps Office Tips IT Management Security Cameras Managed IT Collaboration Privacy Storage SSD Windows 10 Scalability Emergency BDR HP disposal Webcam Internet of Things App Bring Your Own Device OneNote Cables Money Digital Video Games Vendor Management Avoiding Downtime Value Wireless Charging Microsoft Office Compliance Security Ransomware Excel Upgrade User Tips Amazon WannaCry Alerts Cloud Television Copy Threats Efficiency Touchscreen Apps Mobile Devices Remote Computing Vulnerabilities Chrome Cryptocurrency Gadget Vulnerability Cortana Software Marketing Education Automobile Recycling Tactics Technology IT Services Router Managed Services Provider Network Security Wireless Business Intelligence Shortcut Solid State Drive Office 365 Help Desk Telephone System IaaS Work/Life Balance Computer GDPR