Small Medium Businesses (SMB) are the Targets - Part 1Posted Nov 7, 2011 @ 1:27 pm, Viewed by 619 Visitors, Read 641 Times.
Small Medium Businesses (SMB) are the Targets
Understanding the Threats,
Defending the Business
Just about everyone knows someone who has had a credit card compromised.
The cybercriminal is changing, and getting smarter, they are no longer focusing on identity theft of students, minimum wage workers or old age security seniors. Cybercriminals are going after the money. Cybercriminals are not only exploiting small and midsize businesses, they’re targeting them.
While thefts of hundreds of thousands or even millions of credit card numbers and personal information records make headlines, many small companies’ accounts have been cleaned out. Check out our whitepaper, we identify how SMBs are exploited, where their security fails and how they can shore up their defenses.
Businesses of all sizes are at risk, but the SMB in particular are the low hanging fruit for hackers and digital criminals From a technology perspective, SMBs typically lack the time, expertise and money required to properly protect their network. Perpetuating the problem is a small business user community that will access any site, or install any application that suits them in disregard or ignorance of the danger. In addition, a SMB owner attitude may contribute to the problem.
It is not un-common to hear:
• “we never had a problem”,
• “Why should I spend money on security and why would hackers attack me?
I’m just a small business with 50 PCs and one server.”,
• “I don’t have anything worth stealing”.
The perception that SMBs are more vulnerable to attack isn’t perception at all. It’s real. Just ask a cybercriminal how confident he or she feels about successfully penetrating the SMB network perimeter.
Being a target doesn’t mean that you have to remain defenseless. You must first understand the attacks that you must defend against, along with the vulnerabilities that will be exploited. In this report, we’ll break down the broad-based threats that SMBs face and detail the main vulnerabilities that attackers will exploit. Finally, we’ll list eight tips that you should consider as you fortify your defenses for today’s and tomorrow’s threats.
Next, consider the alternatives. Is it better to do it yourself or hire a specialist? For more information check out our website www.ITS-Secure.ca
Chief Security Officer