Risk & Business Magazine Marcotte Magazine Fall 2017 | Page 30
CYBER-ATTACKS
Bracing For A
Cyber-Attack:
What You Need To Know
P
reparing for a potential cyber-
attack is one of the most
important things you can do
for your business this year. It’s
easy to get lulled into believing
that this kind of crime can only happen
to the Targets and Walmarts of the
world, but it’s simply not true. According
to a 2016 report on Fox Business, small
mom-and-pop businesses are being
deluged by cyber-attacks—to the verge
of bankruptcy for many entrepreneurs.
As large businesses have become uber
savvy about protecting themselves in the
wake of major data thefts over the years,
hackers have increasingly looked to small
businesses, which tend to have far fewer
protections in place.
In recent years, nearly half of all hacking
incidents worldwide have been targeted
toward businesses with fewer than 250
employees. Information stolen through
these cyber-attacks has been used to
30
perpetrate crimes such as identity
theft, fraudulent tax filings and health
insurance fraud. Even the US government
is taking notice, with a proposed Senate
bill designed to strengthen technology
safety measures for small businesses.
The evidence of increased threats is
everywhere, according to these statistics:
•
In the last twelve months, hackers
have breached half of all small
businesses in the United States
(2016 State of SMB Cybersecurity
Report).
• Eighty-seven percent of small-
business owners don’t believe that
they’re at risk of a cybersecurity
attack (Manta).
• In 2015, fraudulent email
campaigns targeted small
businesses 43 percent of the time
(Symantec).
• One in three small businesses don’t
have adequate protection—anti-
virus software, firewalls, data
encryption technology and other
tools—against cyber-attacks
(Manta).
•
About 60 percent of small
businesses that suffer a
cybersecurity attack go out of
business within six months
(National Cyber Security Alliance).
Who is at risk? Pretty much everyone.
If your business has customers and
a computer system, that is. Names,
addresses, driver’s licenses, and credit
card numbers are all examples of
Personally Identifiable Information (PII),
which is appealing to cyber criminals. In
addition, Protected Health Information
(PHI) is considered even more valuable
by some