01.08.2019 Views

Cyber Defense eMagazine August 2019

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong>security & Your Company<br />

Identifiable Threats and How to Block them<br />

By Frances Dewing, CEO, Rubica<br />

As more smaller companies rely on technology to do their day-to-day business, their risk of being hacked<br />

increases. For some people, this may seem counterintuitive. Hacking larger corporations offers bigger<br />

payoffs and we tend to only hear of cyber attacks on big companies such as Adobe, Sony and Equifax.<br />

On the other hand, smaller businesses do not have the resources nor the money to invest in robust cyber<br />

infrastructures, leading them to be vulnerable. The result is loss of money, production and client<br />

information – and negative impact on reputation. These smaller businesses can also be the gateway to<br />

access the information of big corporations. For example: The Target hack, which resulted in tens of<br />

millions of consumer’s credit card details stolen, stemmed from hackers infiltrating a small HVAC<br />

company which allowed them to access credentials to Target’s network.<br />

According to Small Business Trends, 43% of cyber attacks are targeted at companies with 250<br />

employees or less. A small business is particularly at risk if they have frequent wire transfers or payment<br />

transactions, deal in customer personally identifiable information (PII), financial info, health data,<br />

intellectual property, or contract with larger entities or high-profile individuals (where they could be<br />

targeted as a weak link into them). Fortunately, there are a few things companies can look out for to<br />

prevent risks.<br />

87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!