Categories: Articles

6 reasons why you’re an easy cybercrime target

As an entrepreneur, you probably think hackers won’t bother with you because your business is too small to care about. In reality, cybercrime targeting smaller companies is on the rise. Why are cybercriminals after your business—and what can you do about it?

Cybercrimes cost smaller companies 12% more in 2015 than in 2013.1 Not only is it growing, it disproportionately affects small businesses: Visa estimates 95% of credit-card data breaches it finds happen to its smallest business customers.2

When it happens, the consequences of cybercrime can be devastating to a small company. Cybercrime costs small businesses 4.2 times more per employee than it does larger businesses, and 60% of small businesses that experience a data breach go out of business within six months.1

What makes your business such a tempting target for cybercriminals? Here are some of the weaknesses that attract hackers—and how you can best defend yourself against each.

1. Small businesses have cut security spending in recent years, while large businesses have increased theirs. As large businesses become more difficult targets, cybercriminals prey on the easier ones.

Best Defense: Don’t skimp—devote an appropriate budget to cybersecurity.

2. Small businesses are less likely to have in-house IT specialists to keep up with security risks and trends.

Best Defense: Outsource security to trusted IT partners. Use automated updates and security software to protect your data.

3. Small businesses are turning to the cloud more often. Using cloud storage and data sharing applications has its benefits, but if the solutions you choose aren’t meant for business use, they can put your data at risk.

Best Defense: Use secure, business-class cloud storage and data-sharing solutions and apps.

4. Small business owners’ data has become increasingly networked. For example, today’s point-of-sale (POS) systems and printers include software that makes them vulnerable entry points because they are networked, shared, and connected to so many other applications in your business.

Best Defense: Choose printers with built-in, business-class security such as run-time intrusion detection and self-healing security features. Buy POS hardware that meets PCI compliance standards and supports PCI-compliant devices. Limit connections between your POS system’s payment data and other systems in your business.

5. Small business owners tend to use consumer technology for business—without considering the security risks—because it’s more affordable.

Best Defense: Don’t share a laptop with your kids—buy computers meant for business that are designed to safeguard data, identities, and devices. Buy technology with native (built-in) security features, such as preloaded security software and BIOS protection that allows you to lock down your hard drive, wipe data when needed, and enable a wide range of authentication options.

6. Small businesses tend to be more lax about physical security. Everyone at your company knows each other, right?

Best Defense: Prevent internal cybercrime by limiting physical access to data. Keep the server room locked and allow access only for employees who specifically need it. If you maintain physical backups on-site, lock them up. Protect devices and data on the go by using simple, physical protection such as security covers for tablets or a lock for laptops.

No matter how small your business is, taking cybersecurity seriously is essential to protecting what you’ve worked so hard to build.

 

 

[1] HP, Cyber security and your business
[2] Homeland Security, National Cybersecurity Awareness Campaign Small Business Presentation

used with permission from HP Technology at Work

Bryan Antepara: IT Specialist

Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers.

Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service.

He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Innovations in Microsoft 365 Support the Modern Workplace and Drive Productivity

The office worker of even 20 years ago could scarcely envision today’s dynamic and interconnected…

6 days ago

Harnessing AI: Beyond Self-Driving Cars

Artificial Intelligence (AI) has taken center stage, captivating attention primarily through its role in self-driving…

6 days ago

Unleash Your Creativity with Microsoft’s Copilot Image Creator

The ability to generate compelling, original images using AI is changing the way we think…

2 weeks ago

How to Choose the Right Microsoft Dynamics 365 Sales Partner and Why It Matters

With Microsoft Dynamics 365 Sales, businesses gain a powerful tool for nurturing leads, leveraging AI-based…

3 weeks ago

eMazzanti Technologies Ranked Among World’s Top Managed Service Providers

Annual Channel Futures MSP 501 global ranking identifies industry’s best-in-class businesses on Tech Industry’s most…

4 weeks ago

Are Vendors The Weak Spot In Your Cyber Defenses?

  Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. You engage with vendors…

4 weeks ago