Months 5 cyber attacks targeting small businesses

Referring to statistics that about 43% of cyber attacks target small businesses, and only 14% of them have security measures strong e-mail to help them to face these attacks.

Also found research that about 60% of SMEs that relate to the cyber attacks stop working within six months of the attack, and also that these attacks cost small and medium businesses losses ranging from 84 thousand, 148 thousand dollars per accident breakthrough.

In the following months 5 cyber attacks targeting small businesses and how to avoid them:

1 – phishing attacks:

Gained attacks (phishing) phishing its name from the practice of Pirates of hunting a large number of victims to send thousands of e-mail messages, which are often used to steal user data, including login credentials, credit card numbers. Furthermore; often used phishing attacks to get a foothold in corporate networks, or governments as part of a larger attack.

Related topics what you read now:

Depends (Spear phishing) version of the more sophisticated of these attacks, which requires more time and effort, instead of sending thousands of emails matched, looking equal for the target and formulate a personal message aimed at achieving the same result is to steal the login data, or personal information. Addressing via SMS of the most methods of phishing in the year 2019.

Found the report of the company Proofpoint about phishing attacks for the year 2019 that all types of phishing attacks increased to approximately 83% compared to 76% in 2017, as the report revealed the investigation in breach of the data issued by the telecommunications company Verizon to 32% of data breaches involved on the operations of the phishing.

2 – attacks, ransom Ransomware:

Ransomware is a type of malware designed to prevent victims from accessing files, or the threat to publish the statements of the victim unless a ransom is paid, despite the lack of a guarantee of review of the access to the files, or that the shopper will destroy the data relating to the scandal.

It is worth noting that this kind of attacks is constantly increasing, where it predicts the report of the annual Electronic Crimes Act, 2019 issued by the company (Cybersecurity Ventures), that businesses will be the victim of an attack ransom every 14 seconds in the year 2019, and every 11 seconds by the year 2021.

3 – DDoS:

Works attack denial of service (DDoS) attack to disable sites on the web by immersing the system or server or network requests to access more than she can handle.

And DDoS attacks is usually one of two purposes: it may be an act of revenge against the company, or the process of a distraction to allow hackers to penetrate the system while running information security officer to restore the site.

4 – malware:

All previous attacks to serve as an introduction to install malware on a device or network, ranging from malware from computer virus Classic-to more evolved species like software a ransom demand, or software mining the digital currency, which uses computer resources to the digital currency without your knowledge.

Think malware somewhat easier threat letter can be protected, using firewalls and antivirus software, while phishing is a method used by mostly the crews of anti-cyber crimes who want to bypass the anti-virus programs.

You must take the Prevention of malware several different forms, the most important of which run automatic updates to the operating system, and in this way ensure to install the security fixes as they become available.

5 – data breaches:

In this attack, hackers exploit a security flaw in the site or the app or the server to steal the data of your customers such as: email addresses, phone numbers, and more.

Refer reports that the average cost of a data breach reality in 2020 will exceed 150 billion dollars, with the increased level of contact between the more elements of infrastructure for business, it is expected that the cost of cybercrime businesses more than $ 2 trillion through 2019.

Leave a Reply

Your email address will not be published. Required fields are marked *