Blog Post

Why would hackers target your Small Business?

Jordan

Would hackers actually target your business if they knew how small it was?  The short answer is: yes.

  • In the 2013 Verizon Data Breach Investigations Report nearly two-thirds of breaches they investigated were companies with less than 100 employees .
  • A 2013 Internal Threat Report from data security provider Symantec, shows that 31 percent of targeted cyber attacks in 2012 were against businesses with fewer than 250 employees .

There tends to a mindset among SMBs that because their company is small they don’t need to be concerned with security, because they aren’t valuable enough to be targeted by hackers.  But as we’re seeing more and more of these kinds of attacks, it’s being proven that that’s not true.  Small and mid-size businesses are often used as stepping stones to get to larger businesses because they tend to have weaker or more porous defenses.  A recent example is the Target breach that we all heard about. The attackers actually came through an HVAC company that had Target as one of their clients. However, you don’t need clients the size of Target to become a target yourself. Most hackers will gladly go after a company with less to offer if it will be easier, or less risk of being caught.

One of the ways these attacks can happen, would be for a hacker to use your business’ trusted reputation to attack your clients.  For instance, if you received an email that appears to be from one of your trusted vendors with a link or attachment, you would most-likely assume it’s safe.  However if that vendor had been compromised, the email you’re seeing could have been sent without the vendor’s knowledge by the attacker.  Through just a few clicks and following seemingly legitimate directions, you can give an attacker access to your computer.  With that access, the attacker could potentially probe your network for things like:  bank accounts, credit card numbers, employee information, clients’ information or even access you may have directly to one of your clients systems.  And that access could allow the hacker to use you as a pivot.  Pivoting is a technique of using a compromised system as a foothold as the attacker finds and compromises the next victim.  This can in turn affect your clients by essentially causing a chain reaction, again through sending your clients seemingly trusted emails from “you”.

So what should you do? Unfortunately when it comes to cyber security, there’s no silver bullet.  But there are things you can do to help protect your company.  Such as keeping your computers up to date (Windows XP will no longer be supported after April), making sure you have updated and reliable anti-virus, ensuring that you have good backups of any data that is valuable to your company, and exercising extra caution when clicking on links or opening attachments in email.

Every business is different, and the things that make sense for one business may or may not make sense in your environment. We strongly encourage SMBs, if you have any question at all as to how secure you really are, or if there are things you could do differently to improve the security of your business ask your IT security consultant to sit down with you and help you map out how you are doing and if there are any areas where you can improve.

fish hook
By Eberly Systems 20 Sep, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems 10 Sep, 2024
Focus on integrating with new team members and new customers
By Eberly Systems 09 Jul, 2024
Keeping you abreast of security news
By Eberly Systems 02 May, 2024
West Lawn, PA, May 2, 2024 — Eberly Systems , the West Lawn-based managed IT services and managed voice provider, today announces its acquisition of the Lebanon-based LYLAB Technology Solutions. Eberly Systems seeks to further a movement of people who are motivated and equipped to make a difference in their world through their daily work. They believe in building lasting partnerships based on trust and transparency while delivering industry-leading solutions to support and protect critical business assets. Driven by the principles of people, excellence, integrity, and stewardship, the team prides itself on partnering with companies to securely, reliably, and efficiently grow their businesses. “We cannot be more excited to join forces with the LYLAB team,” comments Kordel Eberly, Eberly Systems President & Founder. “ The integration of LYLAB Technology Solutions into Eberly Systems solidifies our commitment to providing small businesses with unparalleled service and support. We’re proud of this new opportunity to carefully design and manage the IT infrastructure and systems of even more local businesses and communities.” The acquisition solidifies the Eberly Systems commitment to supporting businesses in Lebanon County. Merging the two teams together as one entity offers the collective team the benefit of enhancing capabilities, refining processes, and extending reach to better serve the evolving needs of small businesses in the surrounding area. Future plans include expanding their presence into Lancaster County.
computer help with IT support
By Eberly Systems 16 Jan, 2024
A trusted MSP can be your invaluable strategic partner.
By Eberly Systems 02 Jan, 2024
These 5 key features of Office 365 Business Premium make it essential for businesses to have.
set of keys
By Eberly Systems 19 Dec, 2023
Eberly Systems has been hard at work over the last year in a concerted effort to enhance the security posture of our clients’ information technology environments. Here are the quarterly updates.
construction site
By Eberly Systems 03 Jul, 2023
After years of steady growth, the workforce at a construction development and property management company was becoming increasingly frustrated by disorganized data. Eberly Systems deployed a hybrid cloud storage solution for efficiency and secure data access.
By Nate M. 01 Jun, 2023
SharePoint file storage has both features and limitations that you should be aware of while storing and accessing files. Here's a rundown.
By Nate M. 05 Jan, 2023
These are the Eberly Systems recommendations for creating good passwords in 2023.
More Posts
Share by: