-
Re: Securing Your Small Business from Cyberattacks
Peter Krawsky Jun 5, 2017 2:03 PM (in response to moderator_mel)This has become such a widely discussed issue lately.
-
Re: Securing Your Small Business from Cyberattacks
moderator_mel Jun 6, 2017 7:44 AM (in response to Peter Krawsky)1 of 1 people found this helpfulIndeed it has, Mr. Krawsky. It seems like identity theft and cyberattacks are pulled off so easily. What steps do you take to safeguard your sensitive business data? ~Moderator Mel
-
-
Re: Securing Your Small Business from Cyberattacks
parasush Jul 14, 2017 3:58 AM (in response to moderator_mel)There are some things needed to be taken care of for protecting your small business from cyber crime attacks.
Follow these practices:
- Encrypt your data- data file and program on computer that has to be transmitted should be encrypted first to save it from hackers using full-disk encryption tool( BitLocker or FileVault)
- Secure your hardware- Make your network storage safer using Kensington locks or implementing rack-mounting hardware solution.You can also opt for hardware-based encryption.
- Install anti-malware and anti-virus protection on your computer
- Lock your network
- Educate your employees and make them aware of security and cyber attacks.
Hope this helped!
Small business owners are just as vulnerable as large corporations when it comes to a security breach. Aside from personal information, hackers are also interested in your apps, software keys and passwords. Even though cyber criminals are constantly coming up with new techniques to exploit a company’s credentials, here are a few common attacks:
Inside Attack: A person with administrative privileges purposely misuses his/her credentials to steal company information.
Malware: Any kind of malicious software that allows a hacker to gain unauthorized access to a company’s private information.
Phishing: The collecting of sensitive information like login credentials and credit card information. This occurs when someone visits a site that appears legitimate, but is actually a fraudulent page or “spoof” of a legitimate page.
Ransomware: This type of malware allows a cybercriminal to demand private information, money or other form of payment before agreeing to unlock the computer affected. Ransomware is gaining popularity with hackers and is one of the fastest growing types of security breaches.
APT: Advanced Persistent Threats are a series of attacks that break into a company’s network in stages. This is done to avoid detection. There are 5 steps to this type of attack:
Reconnaissance - using of information from determining factors to understand the target
Incursion - the break in and delivery of malware
Discovery – avoiding detection, hackers tread carefully while searching for the desired information and creating a plan to obtain it
Capture – attackers follow their plan and extract information or disrupt operations carefully over an extended period
Exfiltration – data collected is sent back to a basecamp for review and then exploited
Did you find this information helpful or interesting? I’d love to know what you think! ~Moderator Mel