Cyber Defense eMagazine August 2019
Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine August Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Cyber</strong>security & Your Company<br />
Identifiable Threats and How to Block them<br />
By Frances Dewing, CEO, Rubica<br />
As more smaller companies rely on technology to do their day-to-day business, their risk of being hacked<br />
increases. For some people, this may seem counterintuitive. Hacking larger corporations offers bigger<br />
payoffs and we tend to only hear of cyber attacks on big companies such as Adobe, Sony and Equifax.<br />
On the other hand, smaller businesses do not have the resources nor the money to invest in robust cyber<br />
infrastructures, leading them to be vulnerable. The result is loss of money, production and client<br />
information – and negative impact on reputation. These smaller businesses can also be the gateway to<br />
access the information of big corporations. For example: The Target hack, which resulted in tens of<br />
millions of consumer’s credit card details stolen, stemmed from hackers infiltrating a small HVAC<br />
company which allowed them to access credentials to Target’s network.<br />
According to Small Business Trends, 43% of cyber attacks are targeted at companies with 250<br />
employees or less. A small business is particularly at risk if they have frequent wire transfers or payment<br />
transactions, deal in customer personally identifiable information (PII), financial info, health data,<br />
intellectual property, or contract with larger entities or high-profile individuals (where they could be<br />
targeted as a weak link into them). Fortunately, there are a few things companies can look out for to<br />
prevent risks.<br />
87