Small to mid-sized business(SMB) owners who think because they are a small fish in a big pond that they are safe from the multiple phishing attempts across the nation and globally might want to adjust their thinking. SMB are just as or more so susceptible to phishing expeditions.
Last year Ransomware was all the rage in the nefarious underworld of hackers with a 61% increase of SMB experiencing cyber attacks in 2017. The outbreak of ransomware affected thousands of computers worldwide by inserting malware that encrypts hard drives on infected computers. Ransomware encrypts your files and then demands a ransom payment in bitcoins to restore them.
While larger businesses with full-sized IT departments have many effective protocols in place to safeguard them against cyber criminals, many SMB barely have a full-time IT consultant!
The greatest threat this year is malware delivered via email. Phishing has become one of the most common methods of malware infection in 2018 and the methods are more sophisticated than ever. A phishing attack can be a costly expense for any size business.
Phishing scams are initiated by cyber-criminal who send an email pretending to be someone else or from a well-known company, such as Google, to extract sensitive information from the targeted email recipient. Perhaps one of the most famous successful phishing attack is the one aimed a John Podesta, campaign chair for the Clinton presidential campaign in 2016. We all know how that ended — not well!
How John Podesta’s email got hacked, and how to not let it happen to you
Spear phishing is more sophisticated form of phishing that can be more effective, as it often is tailored to reach each individual in a more personal, less suspicious nature. Over seventy-five percent of businesses reported being a victim of phishing attacks last year.
Phishing rates have increased across most industries and businesses, large or small. The phishing rate has grown sixty-five percent this past year. Are you paying attention yet?
50+ Phishing Statistics and Facts for 2017-2018
Phishing scams work by tricking you into clicking on a link or attachment that either infects your files or leads to a legitimate looking page that is designed to steal personal information. That is why rule of thumb is to ‘Think Twice Before Clicking’ – if something feels off, listen to your gut.
Another important line of defense is to avoid clicking on unexpected links or attachments from a known associate or fellow worker. Is this invoice expected? If not, contact the ‘claimed sender’ via phone or with the ‘safe’ email you have on file to confirm.
What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It’s one of the oldest types of cyberattacks, dating back to the 1990s, and it’s still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated. ~~ CSO. “What is phishing?”
Take an extra close look at the email address and make sure no characters are out of order. Attackers are more sophisticated and their spear phishing emails might originate from someone you know. Even if you use caution and skepticism, it is still possible you might get phished.
TOP-CLICKED PHISHING TESTS
That is why it is important to have some sort of safety protocols in place, such as multi-factor authentication on all accounts, using a password manager or maintaining strong passwords. Finally, be sure to have a Data Backup and Recovery plan in place.
7 Steps to Secure Data for Your Small Business
Establishing certain safety protocols within the office and consulting an IT security company can help you avoid costly restore efforts. Comprehensive Data Security Strategies and Data Backup Protocols is a proactive way to avoid disastrous effects on your productivity and compromise of personal data.
We Offer It Solutions, Security & Backup
If you’re trying to run a business AND manage your IT, it’s time to consider outsourcing the latter.
We’ll work as your trusted adviser to recommend, install, and manage your technology according to your business objectives and ensure that your critical data is safe and accessible at all times.
There are many items to consider if you’re thinking about outsourcing your IT, Click link below to download our eBook that summarizes the key factors for this decision.
Businesses can’t afford to approach their IT issues haphazardly. They could lose vital files and data. That is why Omnimaven offers full on/off site backups in order to secure your data. One can never predict when a cyber attack, virus, natural disaster, fire or water damage might affect your data. Rest assured your data will be secure on our remote servers.