• Register

Data Net Blog

You Don’t Hear About the Small Businesses That Get Breached

You Don’t Hear About the Small Businesses That Get Breached

It feels like every week we learn about another big business or bank or municipality getting hacked, and the data of their customers getting stolen.

Big organizations are losing millions of dollars, forcing their hand to run damage control to millions of customers and deal with crushingly bad press. Beyond feeling a little numb to these cyberattacks (more on this in a moment), many small business owners might be feeling pretty lucky they don’t need to deal with these types of threats. Unfortunately, they are dead wrong.

The Big Breaches Hit the News, But They Aren’t the Only Breaches

It makes sense that we hear about the big cybersecurity attacks, like the ones that hit major entities like Capital One, Equifax, Yahoo, or Riviera Beach, Florida. When a breach affects thousands, or hundreds of thousands, or millions of individuals it’s going to hit the news.

Two out of every five Americans had their data stolen from the Equifax breach, and in July 2019 alone… just one single month, it’s estimated that 2.2 billion records were leaked across multiple cyberattacks. That’s like saying one out of every four human beings has had their data July. Granted, there is overlap. A single person could have had their information leaked multiple times, but still, this is insane.

This number comes from the top 27 cyberattacks worldwide this summer. 

While small businesses don’t have 100 million customer records for cybercriminals to pilfer, small businesses also don’t typically have the level of security a big enterprise would. Think about Capital One - how many of their over 49,000 employees are wholly dedicated to cybersecurity and preventing data theft? It’s not a stretch to say that they have more internal resources strictly dedicated to IT security than small California businesses.

Small Businesses are Low Hanging Fruit

It’s easier to get your way into a small business network, and although the payoff is smaller, it isn’t insignificant. Nearly 40 percent of small businesses end up paying the ransom for ransomware. A single record (a record is a collection of an individual’s personal information) can sell on the dark web for anywhere between $1 to $1000 depending on how much information is captured. How much customer (or employee) information do you have stored? It doesn’t take much to make it worth it to a cybercriminal.

Worst of All, Many Attacks are Still Random

The most popular online threats are still the ones that don’t target specific individuals or businesses. Phishing attacks, malware, trojans, and all of the threats we deal with at both home and at work essentially just spread on their own. They infect one computer which then infects others, or spreads out via email, etc. 

We don’t tend to hear about these threats as much anymore because of how massive the big cybersecurity breaches are, but these autonomous threats are just as dangerous and have the same consequences.

But My Organization Doesn’t Have the IT Security Budget of a Major Enterprise

Earlier I mentioned Capital One having over 49,000 employees, and assumed that they had many employees with roles were dedicated to cybersecurity. I’m only postulating this but it’s a pretty fair assumption to make. 

That said, a small business does have one advantage that massive organizations don’t; being smaller leads to fewer points of entry. A 49,000-employee business has a thousand times more points of entry than a 50-employee business. Security has to deal with every single employee, every single computer, every single way a user or employee can access company data, how the website accesses data, how their mobile app accesses data, how third-parties access data, etc.

For many smaller businesses, it can certainly be complicated, but not nearly as complicated. Does a 20-person office need an on-staff, in-house IT security expert? Probably not.

What Does a Small Business Need to Stay Secure?

  • The basics - centralized antivirus, antimalware, a firewall, content filtering, intrusion detection, and spam protection, kept updated and patched.
  • Network/device monitoring - catch issues early so they don’t escalate under your nose.
  • Employee training - educate employees and simulate threats to test the diligence of staff.
  • Regular compliance audits - this changes a little based on your industry and what kind of data you collect, but running audits regularly will help ensure you are safe.
  • Bring Your Own Device and Strong Password Policies - enforce best practices for accessing company data.
  • Data backup/disaster recovery - Always be able to restore from a secure backup.

Depending on your needs there might be a few other pieces to this puzzle, and it might seem like a lot, but your small business is just as much at risk, if not more so, than a large business.

We can help you with your IT security. Give us a call at (760) 466-1200 and ask about getting an IT security audit.

Do You Need Cybersecurity Insurance?
Tip of the Week: How to Identify (and Foil) a Phis...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, October 23, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Business Computing Productivity Data Malware Hackers Privacy Google User Tips Efficiency Microsoft Communication Tech Term Smartphones Email Innovation Communications Internet Mobile Device Computer Hardware Cybersecurity IT Support Software VoIp Android Windows 10 Cloud Ransomware Users Small Business Workplace Tips Managed IT Services Business Management Business Passwords Social Media Browser Miscellaneous Mobile Devices Collaboration IT Services Network Outsourced IT Information Wi-Fi Internet of Things Smartphone Applications Hosted Solutions Cloud Computing Chrome Holiday Microsoft Office Blockchain Backup Managed IT services Data recovery Gadgets Employer-Employee Relationship Data Backup Gmail Apps Windows Wireless Upgrade Bandwidth VPN Value Business Intelligence Word Networking Patch Management Managed Service Saving Money Save Money Marketing Phishing Laptop Access Control G Suite Paperless Office Healthcare Going Green Cortana Scam Data Breach Processor Router BDR Net Neutrality Wireless Charging Data Management Government Remote Computing Data Security RAM Remote Monitoring and Management Mobility Managed IT Service Office Virtual Assistant Medical IT Virtualization Tech Terms Cost Management Batteries Quick Tips Computers Facebook Office 365 Employee-Employer Relationship Automation Connectivity Virus How To Data Protection Settings Company Culture Telephony Artificial Intelligence Voice over Internet Protocol Password Physical Security Payment Cards Compliance Excel instant Messaging Threats Knowledge Battery Troubleshooting IT Management Mobile Security OneNote PowerPoint Staff Unified Communications Authentication Hard Drives Employees Internet Explorer Hard Drive Proactive IT Certification Downloads Dark Web Analytics Current Events Conferencing Lead Generation Wireless Internet Server Management Apple Websites Congratulations Vulnerabilities Scams Bring Your Own Device Update Operating System Windows Server 2008 R2 Sports Reporting Digital Recycling eCommerce Authorization SSD Botnet Solid State Drive Threat Processors Telecommute Travel Display Trends Error Human Resources Amazon iPhone Safety WhatsApp Cryptocurrency Project Management Hybrid Cloud Outlook Website Taskbar Law Enforcement Telecommuting Education Personal Information Sales Online Shopping Microsoft Teams Remote Monitoring Hard Disk Drive User Tip Printing Spyware Data loss Training Benchmarks A.I. Big Data Technology Tips News Content Filtering Database Licensing SaaS Edge Windows 7 Search Server Cables Profitability Network Attached Storage Environment Help Desk National Security Live Streaming E-Commerce Bitcoin Tablet IT budget Twitter Retail Video Paper HP Spam Security Cameras Risk Management User Security Movies Touchscreen Telephone System Electronic Health Records WannaCry Cybercrime Tech Support Workers GDPR Dongle Time Management Insurance Comparison Eliminating Downtime e-waste Business Continuity Payment Managing Stress Inventory Remote Support Customer Service Tip of the week Ink Document Management Antivirus Wearables Business Technology Voice over IP Microsoft Office 365 Backup and Disaster Recovery Cleaning Health Maintenance HIPAA Plug-In Machine Learning Tactics Alert Vulnerability Updates File Sharing Millennials Streaming Media Storage Chrome OS File Management Specifications BYOD disposal Thank You Regulation Analysis Disaster Recovery WiFi Printers Financial

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123