If you think your business is too small to be targeted, you may be surprised

The Federal Trade Commission reports that 11.7 million people find themselves as victims of identity theft every year. Cyberattacks can target individuals and huge corporations alike.

You may be saying to yourself, “I don’t have 10 million identities in my database.” But it doesn’t mean that if you run a small business, you’re not a prime target for a cyberattack. Spear phishing, sending a targeted email that appears to be from an individual or business that you know, is on the rise and is spread almost evenly across business sizes.

Targeted attacks aimed at small businesses (1 to 250 employees) accounted for 30% of spear-phishing attacks, while medium businesses (251 to 2,500 employees) accounted for 31%, and large businesses (more than 2,500 employees) endured 39% of the attacks.*

So if you’re thinking you’re too small to be worth the effort, that’s just what hackers want you to think – because it makes your operation more vulnerable and easier to infiltrate.

As technology advances at a rapid pace, so must security measures. Some of the top concerns your organization should address include:

  • Protecting your information systems from viruses, spyware and other malicious code
  • Securing your Internet connection
  • Installing software firewalls on all your business systems
  • Patching operating systems and applications
  • Making backup (offsite) copies of important business data
  • Controlling physical access to computers and networks
  • Securing wireless access to your networks
  • Training employees on baseline security precautions

Considerations for your clients

If your client expresses concern that he/she has been hacked, share these tips so action can be taken immediately. 

*Symantec Corporation, Internet Security Threat Report 2014, Volume 19

View more

Back to Top

Related articles

Using technology in your practice
Using technology in your practice READ READ
Using technology in your practice [VIDEO]
Using technology in your practice [VIDEO] WATCH WATCH
Ensure that you are cyber secure
Ensure that you are cyber secure VIEW VIEW

Sort by topic

Sort by Topic