No Immunity Against Cyber Attacks

The greatest deception is the one we play on ourselves.  That could never happen here, right?  I’m too small for anyone to bother hassling with me, don’t you think?  But that same self-deception opens the door to individuals and organizations that, in fact, look for ways to steal, cheat, and do harm.

And the area of cybersecurity – especially for small businesses – has emerged as the place where so much of this harm is being done, and on a regular basis.

Recent surveys sponsored in part by the National Cybersecurity Authority found that most U.S. small businesses lack a formal Internet security policy, only about half have rudimentary cybersecurity measures in place, roughly one-quarter have outside experts test their systems for hacker-resistance, and an alarming 40 percent do not back up data in more than one location.  Yet 85 percent of small business owners believe their organizations are safe from hackers, viruses, malware, and data breaches.

The harsh truth, however, remains that hackers look for the path of least resistance.  The massive credit card information theft affecting Target department stores began by a single hacker getting into a small subcontractor’s computer systems.  Small businesses – and those that neglect cybersecurity threats – represent a path to much larger targets, and therefore exist as attractive targets themselves.

Cost concerns do not have to preclude taking some sensible, cost-effective precautions.  The Federal Communications Commission recommends the following steps be taken among small business owners:

  • Train employees in cybersecurity principles.
  • Install and update anti-virus and anti-spyware on every computer.
  • Use a firewall for your Internet connection.
  • Download software updates as they become available.
  • Make backup copies of important data.
  • Control access to computers and network components.
  • Secure your wi-fi networks.
  • Require individual user accounts for each employee.
  • Limit employee access to data and limit authority to install software.
  • Regularly change passwords.

Don’t fool yourself that it can’t happen to you, because it can.  Cybersecurity must rise to the top of your priority list, to safeguard your company’s critical information.  The Reschini Group can work with you to determine a proper protection strategy, and our experts are here to help.

Here are some additional resources that may be beneficial:

More About Cybersecurity

Read The Reschini Blog: Protecting Yourself from Online Data Breaches

Read The Reschini Blog: Guiding Parameters for Preparedness in Cybersecurity

Get: Cyber Risk Exposure scorecard

Get: Cybersecurity for Small Business

Get: Cybersecurity for Healthcare Organizations


Copyright 2017 The Reschini Group

 The Reschini Group provides these updates for information only, and does not provide legal advice.  To make decisions regarding insurance matters, please consult directly with a licensed insurance professional or firm.

Tagged with: , ,