ALL >> Computer-Programming >> View Article
Hacking Small And Medium Businesses - Why Bother?
Total Articles: 8
Why would a cyber attack on 15-person Company raise any alarm bells? Why is it a concern to anyone let alone the Department of Homeland Security?
There are millions of small businesses in the USA and globally, in fact over 100 million of them and this number are growing each year, and faster as the world changes employment strategies.
So, why are any of them a concern to a government agency like the DHS? Surely the DHS is focused on banks and larger companies, this is where the threat is? Keep them safe.
No, this is not so true. In a recent example, a small business working with utilities and government agencies, suffered a cyber attack that was an early thrust in the worst known hack by a foreign government into the USA's national electric grid.
The Wall Street Journal has reconstructed the events around the hack that revealed huge vulnerabilities at the heart of the electric power system.
Rather than strike the utilities head on, the hackers went after the system’s soft and unprotected contractors and subcontractors. There are hundreds of them, all vulnerable and some more than others.
This should be sounding an alarm bell to every large corporate if not every company.
Small and medium business generally has no reason to be on high alert against foreign agents 24 hours a day. Why would they be? They also don't have the people, systems or solutions in place to do this.
Yet through these small companies the hackers, in this case, found the footholds necessary to work their way up the supply chain.
Enabling the final target to be reached, hacked and exposed. Some experts believe 20 or more utilities ultimately were breached.
The hackers have the time and resources to do this and they are aware that small and medium sized businesses are a very soft target.
The WSJ article is a must read, I am not going summarize it here to save you time- just read it!
Have you read it yet?
On a similar note and to underline the issue the FBI is investigating the alleged theft of 18,000 insurance and legal documents relating to the September 11 attacks on the World Trade Center by a hacker with a long record of holding companies to ransom. This ransom attack, if it did happen, highlights the vulnerability of a business not just from within but across a huge web of suppliers and partners.
This type of breach, Data Breach can lay your clients details bare, data lost and cause untold issues, at the very least a PR nightmare.
Where does this leave you?
What can you do about the growing threat of hackers? First, put in place the best tech barriers you can afford, get some advice to - know where you are weak. Buy cyber liability insurance to cover the recovery costs too. Vulnerabilities change all the time, insurance is there to bring you back to life when all else fails.
Then patch your biggest vulnerability: your people. They need training and awareness of these issues, especially if you work for large corporate or government bodies.
It’s not just about employees having smarter passwords and spotting sketchy emails but also to think about their online actions. This is not about a list of rules; it’s about awareness and responsibility. Remember rules create a path for hackers to follow....
I am Curious, creative, Thinker, Love to breath, writer by day reader by Night
Computer Programming Articles1. Why Take The Services Of An Iphone Application Development Company
Author: Moon Technolabs
2. Best Cpanel Providers That Offers Whm Cpanel License At Reasonable Prices
Author: Buy cPanel
3. 6 New Technologies Used For Java Developer
4. Top Java Web Systems To Use In 2019
5. A Brief Look At Custom Healthcare Software Development & Its Future.
Author: pawan yadav
6. Know About Importance Of Java Programming Language
Author: APTRON Noida
7. The Complete Guide To Understanding The Enterprise Application Integration
Author: rishabh Shukla
8. What Java Programmers Should Learn In 2019
9. Spring Framework Bean Scopes
Author: Kapil Gupta
10. Master The Art Of Java Se Support Roadmap With These Tips
11. How To Use Magento Import Export Extensions To Migrate Product Data?
Author: Shailesh Gajjar
12. A Complete Guide For Advanced Java
13. What Rings A Bell When You Hear The Word Java?
14. Most Recent Java Technologies And Trends
15. How To Disable Firewall On Mac
Author: karen minton