1 / 4

Hass Associates Reviews Madrid

Hass Associates Reviews Madrid | How to Protect Your Small Business against a Cyber

aleenia23
Télécharger la présentation

Hass Associates Reviews Madrid

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hass Associates Reviews Madrid How to Protect Your Small Business Against a Cyber Attack

  2. The Seattle hacker drove a black Mercedes. He owned a Rolex. He liked to frequent a downtown wine bar. While it's easy to think of cyber criminals as faceless, digital pickpockets in far-flung countries, the reality is that they are among us. In one notorious case, a bandit and his gang of cyber crooks compromised at least 53 Seattle-area small and medium-size businesses between 2008 and 2010, stealing enough data to cause $3 million in damages to the companies, their employees and their customers. "This wasn't the type of crime that we anticipated," tech-company employee Alec Fishburne said at a news conference (where the Seattle victims agreed to be identified but asked that their businesses remain anonymous). The gang hacked Fishburne's firm from another office within the high-rise building. He became aware of the breach after noticing some unusual financial transactions. "It was very disconcerting for a small company … to wonder whether there was some internal fraud or embezzlement happening," he told reporters. Another Seattle company was hacked after its old laptops were stolen in an office break-in; about a month later, funds were siphoned out through fraudulent payroll accounts. A third victim had the identities of almost all its employees stolen when the hacker gang cracked the company's network security. "It's enraging, because you think you have a system that's going to work," said the company's president. "These guys are really smart and ambitious, and that's a tough combination." - See more at: http://www.entrepreneur.com/article/225468#sthash.8xrk7GH1.dpuf

  3. At least that company had a network security plan. Many others don't. According to a 2012 nationwide study of small businesses by digital security firm Symantec and the National Cyber Security Alliance (NCSA), 83 percent of small businesses have no formal cyber security plan, while 69 percent lack even an informal one. Meanwhile, 71 percent are dependent on the internet for daily operations, yet almost half believe data hacks are isolated incidents that won't have an impact on their business. They couldn't be more wrong. According to Symantec/NCSA research from 2011--the most recent year available--cyber attacks cost small and medium-size businesses an average of $188,242, and almost two-thirds of victimized companies are forced out of business within six months of being attacked. It doesn't have to be this way. The best defense against cybercrime is making hackers sweat for their spoils. According to a Verizon study of data breaches in 2011, more than 80 percent of victims were targets of opportunity--which means they did not protect their Wi-Fi systems with passwords and otherwise had poor security, if any at all. So make yourself a difficult target and keep your business secure with these six steps.

  4. Encrypt your data. Whether it's bank routing digits, credit card accounts or employee social security numbers, this type of long-gestating company-held information is what hackers use to steal money. "Anytime you're storing important data, when the data is at rest--which means it isn't being transmitted over the internet somehow--you want it encrypted," says Steve Cullen, senior vice president of worldwide marketing SMB and .Cloud at Symantec, which puts out the Norton anti-virus software. Lance Spitzner, an instructor at SANS Institute, a Baltimore-based security research and education firm, recommends turning on full-disk encryption tools that come standard on most current operating systems. (On Windows-based PCs, the feature is known as BitLocker; on Macs it's called FileVault.) Activating the feature takes only a few minutes; once on, it'll encrypt every file and program on the drive with no noticeable performance lag. But there is one catch: The encryption applies only when users are logged out of the computer. That means hackers can still attack through viruses and malware while the system is running. Setting computers to automatically log out after 15 minutes without use helps enforce this measure. The worst-case scenario if you don't follow these procedures? You don't encrypt your drives, but a devilish hacker does. By breaking into networks and encrypting businesses' data, some cyber criminals have held companies hostage virtually, demanding a ransom in exchange for the password. SEE MORE: http://www.entrepreneur.com/article/225468

More Related