• Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to

You Don’t Hear About the Small Businesses That Get Breached

You Don’t Hear About the Small Businesses That Get Breached

It feels like every week we learn about another big business or bank or municipality getting hacked, and the data of their customers getting stolen.

Big organizations are losing millions of dollars, forcing their hand to run damage control to millions of customers and deal with crushingly bad press. Beyond feeling a little numb to these cyberattacks (more on this in a moment), many small business owners might be feeling pretty lucky they don’t need to deal with these types of threats. Unfortunately, they are dead wrong.

The Big Breaches Hit the News, But They Aren’t the Only Breaches

It makes sense that we hear about the big cybersecurity attacks, like the ones that hit major entities like Capital One, Equifax, Yahoo, or Riviera Beach, Florida. When a breach affects thousands, or hundreds of thousands, or millions of individuals it’s going to hit the news.

Two out of every five Americans had their data stolen from the Equifax breach, and in July 2019 alone… just one single month, it’s estimated that 2.2 billion records were leaked across multiple cyberattacks. That’s like saying one out of every four human beings has had their data July. Granted, there is overlap. A single person could have had their information leaked multiple times, but still, this is insane.

This number comes from the top 27 cyberattacks worldwide this summer. 

While small businesses don’t have 100 million customer records for cybercriminals to pilfer, small businesses also don’t typically have the level of security a big enterprise would. Think about Capital One - how many of their over 49,000 employees are wholly dedicated to cybersecurity and preventing data theft? It’s not a stretch to say that they have more internal resources strictly dedicated to IT security than small California businesses.

Small Businesses are Low Hanging Fruit

It’s easier to get your way into a small business network, and although the payoff is smaller, it isn’t insignificant. Nearly 40 percent of small businesses end up paying the ransom for ransomware. A single record (a record is a collection of an individual’s personal information) can sell on the dark web for anywhere between $1 to $1000 depending on how much information is captured. How much customer (or employee) information do you have stored? It doesn’t take much to make it worth it to a cybercriminal.

Worst of All, Many Attacks are Still Random

The most popular online threats are still the ones that don’t target specific individuals or businesses. Phishing attacks, malware, trojans, and all of the threats we deal with at both home and at work essentially just spread on their own. They infect one computer which then infects others, or spreads out via email, etc. 

We don’t tend to hear about these threats as much anymore because of how massive the big cybersecurity breaches are, but these autonomous threats are just as dangerous and have the same consequences.

But My Organization Doesn’t Have the IT Security Budget of a Major Enterprise

Earlier I mentioned Capital One having over 49,000 employees, and assumed that they had many employees with roles were dedicated to cybersecurity. I’m only postulating this but it’s a pretty fair assumption to make. 

That said, a small business does have one advantage that massive organizations don’t; being smaller leads to fewer points of entry. A 49,000-employee business has a thousand times more points of entry than a 50-employee business. Security has to deal with every single employee, every single computer, every single way a user or employee can access company data, how the website accesses data, how their mobile app accesses data, how third-parties access data, etc.

For many smaller businesses, it can certainly be complicated, but not nearly as complicated. Does a 20-person office need an on-staff, in-house IT security expert? Probably not.

What Does a Small Business Need to Stay Secure?

  • The basics - centralized antivirus, antimalware, a firewall, content filtering, intrusion detection, and spam protection, kept updated and patched.
  • Network/device monitoring - catch issues early so they don’t escalate under your nose.
  • Employee training - educate employees and simulate threats to test the diligence of staff.
  • Regular compliance audits - this changes a little based on your industry and what kind of data you collect, but running audits regularly will help ensure you are safe.
  • Bring Your Own Device and Strong Password Policies - enforce best practices for accessing company data.
  • Data backup/disaster recovery - Always be able to restore from a secure backup.

Depending on your needs there might be a few other pieces to this puzzle, and it might seem like a lot, but your small business is just as much at risk, if not more so, than a large business.

We can help you with your IT security. Give us a call at (760) 466-1200 and ask about getting an IT security audit.

Do You Need Cybersecurity Insurance?
Tip of the Week: How to Identify (and Foil) a Phis...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 14, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication Malware Hackers IT Support Small Business Innovation Smartphones User Tips Hardware VoIp Communications Google Cloud Computer Email Microsoft Software Mobile Device Workplace Tips Tech Term Users Managed IT Services Business Cybersecurity Android Internet Business Management Hosted Solutions Outsourced IT Cloud Computing Mobile Devices Windows 10 Ransomware Collaboration Backup Social Media Miscellaneous IT Services Passwords Network Phishing Information Data recovery Browser Upgrade Data Backup Wi-Fi Managed Service Apps Smartphone Saving Money Windows Wireless Facebook Networking Holiday Internet of Things Microsoft Office Gadgets Bandwidth Applications Marketing Blockchain Access Control Automation Chrome Data Breach Managed IT services VPN Employer-Employee Relationship BDR Patch Management Gmail Business Intelligence Going Green Conferencing Quick Tips Router Apple Save Money Managed IT Service Mobile Office Laptop Word Voice over Internet Protocol Compliance Value Business Continuity Physical Security Payment Cards Cost Management Bring Your Own Device Business Technology Health Social Network Tech Terms RAM Remote Monitoring and Management Computers Excel Scam Healthcare Cortana Medical IT Processor Net Neutrality Twitter Covid-19 Artificial Intelligence Government Remote Computing Wireless Charging Connectivity Password Data Security Office Virtual Assistant Mobility Company Culture Disaster Recovery iPhone Virtualization Education Batteries Remote Monitoring Paperless Office Office 365 Employee-Employer Relationship Virus Data Protection Windows 7 How To Server Retail Settings Remote Work G Suite Telephone System Telephony Data Management Unified Communications Authentication Telecommute Virtual Private Network Workers Time Management Insurance Internet Explorer Proactive IT SSD Remote Comparison Customer Service Holidays Downloads Dark Web Tip of the week Payment Wireless Internet Remote Support Computer Repair Alert Vulnerability PCI DSS HIPAA Wearables Update Safety Cleaning IT Voice over IP Sports Reporting Specifications Updates Authorization Data loss Customer Relationship Management File Sharing Millennials Chrome OS File Management Threat Remote Workers OneNote Trends Error Database instant Messaging Threats Amazon Big Data Technology Tips IT Service Knowledge Battery Network Attached Storage Environment Regulations Compliance Hard Drive Hybrid Cloud Outlook Edge Hosted Desktop Employees Distribution Lead Generation Certification Microsoft Teams HP Spam Managed Service Provider Current Events Printing IT budget Windows Server 2008 R2 A.I. Congratulations Cybercrime Vulnerabilities Scams Mobile SaaS Travel e-waste Meetings Processors Recycling Cables Profitability Dongle Botnet Firewall eCommerce Solid State Drive Fleet Management Management Display Document Management Antivirus Co-Managed IT Human Resources Paper Inventory Taskbar Movies Touchscreen Machine Learning WhatsApp Tactics Law Enforcement Telecommuting Cryptocurrency Project Management Backup and Disaster Recovery Website Recovery GDPR disposal Printer User Tip Spyware Personal Information Eliminating Downtime Profiles Sales Online Shopping Hard Disk Drive Multi-Factor Authentication Remote Working Content Filtering Training Benchmarks Managing Stress Staff News Humor Managed Services Provider Ink IT Management Licensing Mobile Security Help Desk National Security Microsoft Office 365 Search Maintenance Plug-In Hard Drives Virtual Reality Streaming Media Storage Server Management Live Streaming E-Commerce Bitcoin BYOD Analytics Shadow IT Tablet Video Mobile Device Management WannaCry Security Cameras Risk Management Troubleshooting Digital Websites Memes User Security Electronic Health Records Vendor PowerPoint Tech Support Operating System Financial Thank You Analysis Printers WiFi Regulation

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123