Seventy-six percent of breaches are financially motivated, according to the 2018 Verizon Data Breach Investigations Report. But, how do attackers make money by infiltrating your system?
MYTH: Hackers Target Specific Businesses
Let’s dispel a common misconception that small businesses have little to offer bad guys. This is simply not true. Small businesses are at
Imagine your business as a house in a residential area. Your IP address from your Internet Provider is one of
What Happens After a Hacker Gets in Your System?
1) The bad guys examine your data on your computers. Unprotected data is a treasure trove. Personally Identifiable Information (PII) is a valued commodity on the dark web. W-2s, credit cards, drivers licenses and medical records are just some examples of what can be sold. Just like any other item in bulk, the initial attacker may sell a batch of records for a few dollars apiece to someone who intends to either use or sell them, which is the case for a credit card cloner, someone who will make fraudulent cards and sell them individually. This data theft is not easily detected, as the data is simply copied and left intact in your system. Loss of PII creates damage to a business through potential litigation and reputation loss.
2) With the explosion of various cryptocurrencies, bad guys will use attacks through infected ads and websites, phishing campaigns and other means to enlist computers into “mining” cryptocurrency. The computer is not damaged or altered but now is using
3) Ransomware is popular for a quick buck. Ransomware encrypts your data files, making them unavailable to you and your users. You are required to pay the ransom in the form of a cryptocurrency in hopes of being given the key to unlocking files. Unsurprisingly, not all bad guys are honest people, and many won’t hand you the key back to the data castle. This is becoming less popular with attackers as it’s a one-shot deal for them, whereas remaining on your network to harvest PII or mine cryptocurrency is a continual revenue stream. Businesses without good backups are most impacted
How Do I Stay Safe from Cyber Attacks?
Educating your employees is the single most important step in combating cyber attacks. Attackers have many tools to infiltrate your network through phishing emails and weak passwords. Training your employees goes beyond phishing tests and includes password hygiene and data breach awareness for management.
A
Having off-site backups can make the difference:
- Backups are both available on-premise and a separate off-site solution.
- Cyber attacks often target the on-site backup to make targets more likely to pay ransoms.
- Any backup is only as good as the last test restore. Backups should be frequently tested to make sure it can restore the data through disaster drills.
Backups are essential to cybersecurity, so much so that is the first thing Access Systems’ Network Operation Center (NOC) technicians do every day.
Backups Can Take the Power Out of Hacker’s Hands
Attackers are highly motivated to infiltrate your network. Their paycheck relies on it, but there are steps you can take to prevent cyber attacks. Besides strong passwords and phishing training for your employees, backups are your key to minimal downtime. Explore more about how backup and disaster planning can protect you on multiple different levels.