Debbie A Ferguson Inc

View Original

Small Business Cyber Security Threats: Are You At Risk?

A hand holding a black key attached to a keychain with a micro SD card attached to it.

As more of our lives - work, shopping, communication, and more - goes online, society is more and more at risk for hackers, scammers, and other fraudsters to try to access our information. The news nearly every day is riddled with stories of data breaches at companies both large and small; bad actors don't target the largest fish, they target the most vulnerable. Our Small Business Cyber Security Package may be a great, low cost solution to protect you, your business, and your customers from threats online. Learn more about our services and read on to learn about the kinds of threats and what can be done about them.

Malware

The term "malware" comes from the Latin prefix "mal," which means "bad," and a combination of the words "malicious" and "software." The word "malware" has come over the years to refer to a number of different types of fraudulent software, apps, and coding that can infect your computer, phone, network, database, or system. Most malware is introduced to computers by users downloading files or clicking on links in emails or on the Internet, inadvertently or on purpose. A big part of protecting your data is to be aware of what is clicked on or downloaded to your devices, keeping your devices updated, and training everyone who uses them what to look for. Here are a few types of malware:

Spyware

Spyware is a kind of program that is secretly uploaded to your computer while you are doing normal things on the Internet. Spyware can come from poorly vetted ads, misidentified links, and links sent via email that appear to be from someone you know and trust but are not. Spyware collects personal data, keystrokes, browsing history, and more and sends it to someone who collects it and then uses or sells it.

Viruses

Viruses are programs that infect your computer and alter its performance. Viruses can collect data that is saved on or accessed by your device and send it on to a third party.

Adware

This is a type of program that displays advertising, and it often comes packaged along with free software. While not always harmful, adware is generally not created with as much care as other parts of a program and can be susceptible to exploits or leave access points open for hackers.

Ransomware

Perhaps the most dangerous of all the types of malware, ransomware is a very effective tool for hackers because most of our lives are contained on electronic devices with access to the Internet. Ransomware can lock you out of your device, databases, systems, and more, and lock you out of systems you use to run your business. Hackers tend to target vulnerable businesses with ransomware because these businesses cannot afford to be locked out and unable to run their businesses for long. One way to protect your business from ransomware is to have an on-site backup and recovery system in place for your data and systems and to make sure that it is current and up-to-date. Limiting who can install software to machines on your network and making sure that those persons are properly trained is another great step.

Phishing

While most people think that they are too savvy to be taken in by a phishing scheme, it must be said that phishing has become so sophisticated that even experts have been fooled. The prevalence of phishing attempts has grown exponentially in the last few years, and the growing cybersecurity problem presented by phishing in time and money lost is staggering. Phishing starts when an attacker sends some form of communication - texts, an email, or a social media message - that appears as though it comes from someone the recipient trusts. The goal is to get someone to click a link or download software, or to provide logins and passwords via fake pages that look real. Caution is the biggest tool to avoid phishing schemes. If an email, text, or other communication is unprompted, seems dramatic, or seems "off" in some way, you should take the time to find out if the person really did send the link or request.

Third Party Software

It's pretty common these days to outsource some things to third parties, but this type of software can put your business at risk. Unless you have been able to make sure that the software and licensing agreements adequately protect your interests, you may be exposed to vulnerabilities. While how someone else puts their programs together may be out of your control, you should always read the terms and conditions and licensing agreements thoroughly to double check how data breaches are handled, what liability using the software opens you up to, and what kinds of remediation and restoration you’re entitled to in the event of a data breach.

Keeping abreast of changes in the technological landscape can be difficult for small business owners, particularly when you're busy running your business or aren't tech savvy. Our Small Business Cyber Security Protection Plans can help you head off problems before they start, and your membership in our Small Business Legal Subscription Plans can help you through any issues that you may already have. Our network of lawyers can assist you with simple cyber security questions to dealing with a complex cyber attack, and, starting at $49 per month, will pay for itself the first time you use it. Our network of qualified attorneys are available to help you with contracts, documents, debt collection and more for just one, low, monthly fee. Learn more about all the benefits of our Small Business Legal Protection Plans and our Small Business Cyber Security Solutions or sign up now!