Categories: Articles

6 reasons why you’re an easy cybercrime target

As an entrepreneur, you probably think hackers won’t bother with you because your business is too small to care about. In reality, cybercrime targeting smaller companies is on the rise. Why are cybercriminals after your business—and what can you do about it?

Cybercrimes cost smaller companies 12% more in 2015 than in 2013.1 Not only is it growing, it disproportionately affects small businesses: Visa estimates 95% of credit-card data breaches it finds happen to its smallest business customers.2

When it happens, the consequences of cybercrime can be devastating to a small company. Cybercrime costs small businesses 4.2 times more per employee than it does larger businesses, and 60% of small businesses that experience a data breach go out of business within six months.1

What makes your business such a tempting target for cybercriminals? Here are some of the weaknesses that attract hackers—and how you can best defend yourself against each.

1. Small businesses have cut security spending in recent years, while large businesses have increased theirs. As large businesses become more difficult targets, cybercriminals prey on the easier ones.

Best Defense: Don’t skimp—devote an appropriate budget to cybersecurity.

2. Small businesses are less likely to have in-house IT specialists to keep up with security risks and trends.

Best Defense: Outsource security to trusted IT partners. Use automated updates and security software to protect your data.

3. Small businesses are turning to the cloud more often. Using cloud storage and data sharing applications has its benefits, but if the solutions you choose aren’t meant for business use, they can put your data at risk.

Best Defense: Use secure, business-class cloud storage and data-sharing solutions and apps.

4. Small business owners’ data has become increasingly networked. For example, today’s point-of-sale (POS) systems and printers include software that makes them vulnerable entry points because they are networked, shared, and connected to so many other applications in your business.

Best Defense: Choose printers with built-in, business-class security such as run-time intrusion detection and self-healing security features. Buy POS hardware that meets PCI compliance standards and supports PCI-compliant devices. Limit connections between your POS system’s payment data and other systems in your business.

5. Small business owners tend to use consumer technology for business—without considering the security risks—because it’s more affordable.

Best Defense: Don’t share a laptop with your kids—buy computers meant for business that are designed to safeguard data, identities, and devices. Buy technology with native (built-in) security features, such as preloaded security software and BIOS protection that allows you to lock down your hard drive, wipe data when needed, and enable a wide range of authentication options.

6. Small businesses tend to be more lax about physical security. Everyone at your company knows each other, right?

Best Defense: Prevent internal cybercrime by limiting physical access to data. Keep the server room locked and allow access only for employees who specifically need it. If you maintain physical backups on-site, lock them up. Protect devices and data on the go by using simple, physical protection such as security covers for tablets or a lock for laptops.

No matter how small your business is, taking cybersecurity seriously is essential to protecting what you’ve worked so hard to build.

 

 

[1] HP, Cyber security and your business
[2] Homeland Security, National Cybersecurity Awareness Campaign Small Business Presentation

used with permission from HP Technology at Work

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Shared Mailbox vs. Regular Mailbox in Microsoft Exchange

Microsoft Exchange provides multiple ways to control email communication in a business. Shared Mailboxes and…

2 days ago

Remote Work Rising: The New<br>Way We’ll Work

Remote working was once a niche specialty, only used by tech-savvy and freelancers. But in…

2 days ago

The Role of Print Servers In<br>An Organization

While we live in a digital age, print is still a staple for many businesses.…

2 days ago

Implementing Anti-Spoofing Rules for Email Protection

Increasingly, email communication is playing a pivotal role in business operations, facilitating collaboration, customer engagement,…

3 days ago

The Comprehensive Benefits of MSP Management for Servers, Exchange, O365, VPN, and Networks

As the digital landscape evolves, businesses of all sizes face the challenge of managing complex…

3 days ago

Cost-Benefit Analysis of On-Premises Network/Server Infrastructure vs. Azure-Based Cloud Infrastructure

In the evolving landscape of information technology, businesses constantly seek the most efficient and cost-effective…

3 days ago