123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Hacking Small And Medium Businesses - Why Bother?

Profile Picture
By Author: Kees Fountayne Buiel
Total Articles: 7
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Why would a cyber attack on 15-person Company raise any alarm bells? Why is it a concern to anyone let alone the Department of Homeland Security?

There are millions of small businesses in the USA and globally, in fact over 100 million of them and this number are growing each year, and faster as the world changes employment strategies.

So, why are any of them a concern to a government agency like the DHS? Surely the DHS is focused on banks and larger companies, this is where the threat is? Keep them safe.
No, this is not so true. In a recent example, a small business working with utilities and government agencies, suffered a cyber attack that was an early thrust in the worst known hack by a foreign government into the USA's national electric grid.

The Wall Street Journal has reconstructed the events around the hack that revealed huge vulnerabilities at the heart of the electric power system.

Rather than strike the utilities head on, the hackers went after the system’s soft and unprotected contractors and subcontractors. There are hundreds of them, all vulnerable and some more than others.
...
... This should be sounding an alarm bell to every large corporate if not every company.

Small and medium business generally has no reason to be on high alert against foreign agents 24 hours a day. Why would they be? They also don't have the people, systems or solutions in place to do this.
Yet through these small companies the hackers, in this case, found the footholds necessary to work their way up the supply chain.

Enabling the final target to be reached, hacked and exposed. Some experts believe 20 or more utilities ultimately were breached.
The hackers have the time and resources to do this and they are aware that small and medium sized businesses are a very soft target.
The WSJ article is a must read, I am not going summarize it here to save you time- just read it!

Have you read it yet?
On a similar note and to underline the issue the FBI is investigating the alleged theft of 18,000 insurance and legal documents relating to the September 11 attacks on the World Trade Center by a hacker with a long record of holding companies to ransom. This ransom attack, if it did happen, highlights the vulnerability of a business not just from within but across a huge web of suppliers and partners.
This type of breach, Data Breach can lay your clients details bare, data lost and cause untold issues, at the very least a PR nightmare.
Where does this leave you?

What can you do about the growing threat of hackers? First, put in place the best tech barriers you can afford, get some advice to - know where you are weak. Buy cyber liability insurance to cover the recovery costs too. Vulnerabilities change all the time, insurance is there to bring you back to life when all else fails.
Then patch your biggest vulnerability: your people. They need training and awareness of these issues, especially if you work for large corporate or government bodies.

It’s not just about employees having smarter passwords and spotting sketchy emails but also to think about their online actions. This is not about a list of rules; it’s about awareness and responsibility. Remember rules create a path for hackers to follow....

http://blog.microinsurance.com/post/gdpr-data-breach
http://blog.microinsurance.com/post/small-business-data-breaches

More About the Author

I am Curious, creative, Thinker, Love to breath, writer by day reader by Night

Total Views: 411Word Count: 546See All articles From Author

Add Comment

Computer Programming Articles

1. Which Is The Best Programming Language To Build A Mobile App?
Author: DianApps

2. Explore Career Growth With The Best Business Analytics Courses In Bhopal
Author: Rohan Rajput

3. From Zero To Hero: Python Pygame Tutorial For Aspiring Game Developers
Author: Tech Point

4. Beginner’s Python Pytorch Tutorial: Start Your Ai Journey Today
Author: Tech Point

5. Top 10 Cloud Security Threats And How To Prevent Them
Author: GIGABITTechnologies

6. Error Code 30174-45 In Office 365/2019/2021 In Windows 10/11
Author: jamess

7. Complete Python Tkinter Tutorial: Master Gui Programming Easily
Author: Tech Point

8. Unlock Your Data Skills With The Best Business Analytics Courses In Bhopal
Author: Rohan Rajput

9. Clinic Management Software: Features, Benefits, And How To Choose The Right One
Author: Agness Ruth

10. Top Training Institutes For The Best Business Analytics Courses In Bhopal
Author: Rohan Rajput

11. Why Is The Cloud Networking Solution Important For Any Business?
Author: GIGABITTechnologies

12. Pros And Cons Of Having A Design System
Author: brainbell10

13. Discover The Best Business Analytics Courses In Bhopal To Elevate Your Career
Author: Rohan Rajput

14. Exploring Decentralized Exchange Development
Author: davidbeckam

15. How Decentralized Exchanges Make Crypto Trading Better
Author: davidbeckam

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: