Information Technology - Blog V-Soft Consulting

You are Being Hacked!  This is How You Protect Your Business

Written by Michael-Ross | May 17, 2018 4:20:19 PM

It's not a question of if you're business is getting hacked it is just a matter of when. Hackers are everywhere, in coffee shops around the world or even in a home office in your neighborhood. Here are some details about hacking and cybersecurity that will save your business tens of thousands of dollars and a lost reputation.

Hacking and Ransomware Facts

The impact from a cybersecurity event can range from stolen data, slowing business down, to disruptions in your ability to operate. This computer hacking leads to ransomware attacks, theft of personal information, and will seriously impact and damage your company brand.

Small to Medium Businesses are the Target

More and more cyber threats are aimed at small businesses because they are more likely to pay the ransom and avoid conflict. Small businesses are used by hackers to gain access to other small businesses as well as larger enterprises, and small businesses usually lack security personnel and finances to deter these ransomware and cyber threats.

Distributed denial of service (DDoS) attacks are on the rise, can affect anyone and may be perpetuated by anyone for purposes of revenge, activism, etc."

According to Cybersecurity Online

 

 

There is No Immunity from Cyber Attacks

The Department of Homeland Security is warning us that Russian state sponsored cyber actors are focusing their attacks on public-sector organizations and private sector corporations alike – even small office home offices (SOHO).

Cybersecurity Guide for the SMB

A plan that is executable either by you or an experienced cyber security firm is what your business needs. This plan prioritizes steps that can be taken to defend your network and data against most known attacks. Some of the steps may seem common sense, some are beyond the capability of the average small business but all are accepted standards of cyber security. Here is a practical cybersecurity checklist for you to begin implementing:

  1. Train employees on cybersecurity threats.
  2. Conduct a cybersecurity readiness assessment
  3. Discuss with your attorney how you might handle a ransomware attack
  4. Contact local law enforcement for their protocols for a ransomware attack
  5. Apply best practice multi-level password protocols
  6. Educate yourself at the Center for Internet Security

Advanced Cybersecurity Preperation - Next Step PEN Testing

A 'pen test', also known as penetration testing, is when you hire an exterior firm to hack your systems. During this fake hack the firm will work on finding the vulnerabilities on your computer system, network or web application.

The results of this penetration testing will guide you on what your vulnerabilities are as a a business and help you develop a common sense security plan that is executable, either by you or an experienced cyber security firm. Giving priority to your weakest links prioritizes steps that can be taken to defend your network and data against known cyber-attack vectors.

Most organizations only grow in security maturity the hard way..."

Brian Krebs, Krebs on Security

Authored By

Ron Lenox is a veteran of the cyber security field and advocate for protecting business clients' networks and information assets. Ron enjoys bowhunting, astronomy and traveling. Wildlife photography is a special passion of Ron's when he is not busy preparing a great steak on the grill followed up with a fine cigar.