123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Hacking Small And Medium Businesses - Why Bother?

By Author: Kees Fountayne Buiel
Total Articles: 11
Comment this article

Why would a cyber attack on 15-person Company raise any alarm bells? Why is it a concern to anyone let alone the Department of Homeland Security?

There are millions of small businesses in the USA and globally, in fact over 100 million of them and this number are growing each year, and faster as the world changes employment strategies.

So, why are any of them a concern to a government agency like the DHS? Surely the DHS is focused on banks and larger companies, this is where the threat is? Keep them safe.
No, this is not so true. In a recent example, a small business working with utilities and government agencies, suffered a cyber attack that was an early thrust in the worst known hack by a foreign government into the USA's national electric grid.

The Wall Street Journal has reconstructed the events around the hack that revealed huge vulnerabilities at the heart of the electric power system.

Rather than strike the utilities head on, the hackers went after the system’s soft and unprotected contractors and subcontractors. There are hundreds of them, all vulnerable and some more than others.
This should be sounding an alarm bell to every large corporate if not every company.

Small and medium business generally has no reason to be on high alert against foreign agents 24 hours a day. Why would they be? They also don't have the people, systems or solutions in place to do this.
Yet through these small companies the hackers, in this case, found the footholds necessary to work their way up the supply chain.

Enabling the final target to be reached, hacked and exposed. Some experts believe 20 or more utilities ultimately were breached.
The hackers have the time and resources to do this and they are aware that small and medium sized businesses are a very soft target.
The WSJ article is a must read, I am not going summarize it here to save you time- just read it!

Have you read it yet?
On a similar note and to underline the issue the FBI is investigating the alleged theft of 18,000 insurance and legal documents relating to the September 11 attacks on the World Trade Center by a hacker with a long record of holding companies to ransom. This ransom attack, if it did happen, highlights the vulnerability of a business not just from within but across a huge web of suppliers and partners.
This type of breach, Data Breach can lay your clients details bare, data lost and cause untold issues, at the very least a PR nightmare.
Where does this leave you?

What can you do about the growing threat of hackers? First, put in place the best tech barriers you can afford, get some advice to - know where you are weak. Buy cyber liability insurance to cover the recovery costs too. Vulnerabilities change all the time, insurance is there to bring you back to life when all else fails.
Then patch your biggest vulnerability: your people. They need training and awareness of these issues, especially if you work for large corporate or government bodies.

It’s not just about employees having smarter passwords and spotting sketchy emails but also to think about their online actions. This is not about a list of rules; it’s about awareness and responsibility. Remember rules create a path for hackers to follow....

http://blog.microinsurance.com/post/gdpr-data-breach
http://blog.microinsurance.com/post/small-business-data-breaches

More About the Author

I am Curious, creative, Thinker, Love to breath, writer by day reader by Night

Total Views: 115Word Count: 546See All articles From Author

Add Comment

Computer Programming Articles

1. It Development Company | Top Mobile App Development Company India
Author: Alpesh Vaghasiya

2. What Is A Business?
Author: seo expert2300

3. Web Application Development Services-mustus Technologies
Author: MUSTUS

4. Advancements In The Sphere Of Web Designing Services In Recent Years
Author: Shruti Verma

5. Advanced Artificial Intelligence
Author: Pradeep

6. How To Record Xbox One Gameplay Videos?
Author: Jaxson Harry

7. Fast And Accessible Web Designing In Lahore
Author: marketing ninetwo

8. The Best App Development Companies
Author: Infotrench

9. R And Python Programming Languages For Predictive Modelling Howcan You Assess A Good Logistic Model?
Author: Suvardhan Raju

10. Makcorps Hotel Price Comparison Api
Author: Kunal

11. Difference Between Supervised Learning An Unsupervised Learning,what Is The Goal Of A/b Testing?
Author: Suvardhan Raju

12. Linear Regression,how Is Data Modeling Different From Database Design P-value Signify Statistical ?
Author: Suvardhan Raju

13. How Machine Learning Is Deployed In Real World Scenarios,what Are The Various Aspects Of A Machine ?
Author: Suvardhan Raju

14. Best Eeprom Programmer From Shenzhen Orod Technology
Author: Chip Programmer

15. Angular Training In Bangalore
Author: Angularexpert

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: