• Register

Data Net Blog

You Don’t Hear About the Small Businesses That Get Breached

You Don’t Hear About the Small Businesses That Get Breached

It feels like every week we learn about another big business or bank or municipality getting hacked, and the data of their customers getting stolen.

Big organizations are losing millions of dollars, forcing their hand to run damage control to millions of customers and deal with crushingly bad press. Beyond feeling a little numb to these cyberattacks (more on this in a moment), many small business owners might be feeling pretty lucky they don’t need to deal with these types of threats. Unfortunately, they are dead wrong.

The Big Breaches Hit the News, But They Aren’t the Only Breaches

It makes sense that we hear about the big cybersecurity attacks, like the ones that hit major entities like Capital One, Equifax, Yahoo, or Riviera Beach, Florida. When a breach affects thousands, or hundreds of thousands, or millions of individuals it’s going to hit the news.

Two out of every five Americans had their data stolen from the Equifax breach, and in July 2019 alone… just one single month, it’s estimated that 2.2 billion records were leaked across multiple cyberattacks. That’s like saying one out of every four human beings has had their data July. Granted, there is overlap. A single person could have had their information leaked multiple times, but still, this is insane.

This number comes from the top 27 cyberattacks worldwide this summer. 

While small businesses don’t have 100 million customer records for cybercriminals to pilfer, small businesses also don’t typically have the level of security a big enterprise would. Think about Capital One - how many of their over 49,000 employees are wholly dedicated to cybersecurity and preventing data theft? It’s not a stretch to say that they have more internal resources strictly dedicated to IT security than small California businesses.

Small Businesses are Low Hanging Fruit

It’s easier to get your way into a small business network, and although the payoff is smaller, it isn’t insignificant. Nearly 40 percent of small businesses end up paying the ransom for ransomware. A single record (a record is a collection of an individual’s personal information) can sell on the dark web for anywhere between $1 to $1000 depending on how much information is captured. How much customer (or employee) information do you have stored? It doesn’t take much to make it worth it to a cybercriminal.

Worst of All, Many Attacks are Still Random

The most popular online threats are still the ones that don’t target specific individuals or businesses. Phishing attacks, malware, trojans, and all of the threats we deal with at both home and at work essentially just spread on their own. They infect one computer which then infects others, or spreads out via email, etc. 

We don’t tend to hear about these threats as much anymore because of how massive the big cybersecurity breaches are, but these autonomous threats are just as dangerous and have the same consequences.

But My Organization Doesn’t Have the IT Security Budget of a Major Enterprise

Earlier I mentioned Capital One having over 49,000 employees, and assumed that they had many employees with roles were dedicated to cybersecurity. I’m only postulating this but it’s a pretty fair assumption to make. 

That said, a small business does have one advantage that massive organizations don’t; being smaller leads to fewer points of entry. A 49,000-employee business has a thousand times more points of entry than a 50-employee business. Security has to deal with every single employee, every single computer, every single way a user or employee can access company data, how the website accesses data, how their mobile app accesses data, how third-parties access data, etc.

For many smaller businesses, it can certainly be complicated, but not nearly as complicated. Does a 20-person office need an on-staff, in-house IT security expert? Probably not.

What Does a Small Business Need to Stay Secure?

  • The basics - centralized antivirus, antimalware, a firewall, content filtering, intrusion detection, and spam protection, kept updated and patched.
  • Network/device monitoring - catch issues early so they don’t escalate under your nose.
  • Employee training - educate employees and simulate threats to test the diligence of staff.
  • Regular compliance audits - this changes a little based on your industry and what kind of data you collect, but running audits regularly will help ensure you are safe.
  • Bring Your Own Device and Strong Password Policies - enforce best practices for accessing company data.
  • Data backup/disaster recovery - Always be able to restore from a secure backup.

Depending on your needs there might be a few other pieces to this puzzle, and it might seem like a lot, but your small business is just as much at risk, if not more so, than a large business.

We can help you with your IT security. Give us a call at (760) 466-1200 and ask about getting an IT security audit.

Do You Need Cybersecurity Insurance?
Tip of the Week: How to Identify (and Foil) a Phis...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 08, 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Data Privacy Productivity Malware Hackers Microsoft Efficiency Google User Tips IT Support Innovation Communication Tech Term Smartphones Email Hardware Cybersecurity Software Internet Communications Mobile Device Managed IT Services Computer VoIp Users Business Management Outsourced IT Android Windows 10 Cloud Ransomware Small Business Workplace Tips Collaboration IT Services Business Social Media Mobile Devices Cloud Computing Network Passwords Browser Miscellaneous Data Backup Information Backup Wi-Fi Internet of Things Data recovery Facebook Smartphone Applications Apps Hosted Solutions Chrome Bandwidth Holiday Microsoft Office Managed IT services Blockchain Gadgets Employer-Employee Relationship Windows Patch Management Managed Service Gmail Upgrade Wireless Access Control Laptop VPN Value BDR Managed IT Service Word Business Intelligence Networking Saving Money Marketing Phishing Save Money Compliance Business Technology Healthcare Going Green Net Neutrality Excel Processor G Suite Data Security Scam Data Breach Paperless Office Cortana Apple Router Mobility Wireless Charging Government Remote Computing Batteries Data Management RAM Remote Monitoring and Management Office Virtual Assistant Employee-Employer Relationship Medical IT Virtualization Tech Terms Cost Management Quick Tips Computers Office 365 Connectivity How To Automation Data Protection Business Continuity Virus Settings Payment Cards Company Culture Social Network Telephony Telephone System Physical Security Artificial Intelligence Voice over Internet Protocol Password Cleaning Inventory Microsoft Office 365 HIPAA Employees Alert Distribution Vulnerability Document Management Antivirus Maintenance Plug-In Voice over IP Streaming Media Storage Specifications Current Events Machine Learning Tactics BYOD File Sharing Millennials Certification Backup and Disaster Recovery Knowledge Battery Vulnerabilities Scams disposal Troubleshooting Windows Server 2008 R2 PowerPoint Recycling IT Management Mobile Security Unified Communications Authentication Hard Drive Solid State Drive Fleet Management Staff Internet Explorer Proactive IT Downloads Dark Web Conferencing Lead Generation Human Resources Mobile Office Wireless Internet Display Hard Drives Cryptocurrency Project Management Server Management Bring Your Own Device Update Congratulations Taskbar Analytics Sports Reporting Personal Information Botnet Operating System Authorization Processors Hard Disk Drive Travel Digital Websites Threat eCommerce SSD Trends Error Managed Services Provider iPhone Telecommute Amazon Training Benchmarks Windows 7 Search Website Hybrid Cloud Outlook Law Enforcement Telecommuting Help Desk National Security WhatsApp Online Shopping E-Commerce Bitcoin Remote Monitoring Microsoft Teams User Tip Spyware Video Education Safety Printing Sales A.I. Content Filtering Electronic Health Records Licensing Vendor Data loss Security Cameras Risk Management News SaaS Server Time Management Insurance Database Cables Profitability Big Data Technology Tips Tablet Payment Retail Network Attached Storage Environment Customer Service Live Streaming Edge Paper IT budget Twitter Movies Touchscreen WannaCry Health Tech Support HP Spam User Security Wearables GDPR Comparison Chrome OS File Management Cybercrime Eliminating Downtime Workers Updates instant Messaging Threats Remote Support e-waste Managing Stress Tip of the week OneNote Dongle Ink Thank You Regulation Analysis Disaster Recovery WiFi Financial Printers

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123