Call us today on: +44 (0)203 88 020 88
SecureTeamSecureTeamSecureTeamSecureTeam
  • Home
  • Our Services
    • Infrastructure Testing
      • Internal Network Penetration Test
      • External Network Penetration Test
      • Wireless Network Penetration Test
      • Vulnerability Assessment
      • Network Segregation Test
      • Voice over IP (VoIP) Penetration Test
    • Application Testing
      • Web Application Penetration Test
      • Mobile Application Penetration Test
      • Desktop Application Security Assessment
      • Citrix Breakout Test
    • Configuration Review
      • Windows Server Build Review
      • Linux Server Build Review
      • Citrix Configuration Review
    • Information Assurance
      • ISO 27001 Gap Analysis
    • Cyber Essentials
  • News
  • Articles
  • About
    • About SecureTeam
    • STORM Appliances
      • Installing a STORM Device
      • Returning a STORM Device
    • White-Label Consultancy
    • Jobs
    • Cookie Policy
    • Quality Policy
    • Security Policy
    • Privacy Notice
    • Website Terms & Conditions
  • Contact Us

Articles

Home  >  Articles  >  The Top 5 Cybersecurity Threats Affecting Small Businesses
NextPrevious

The Top 5 Cybersecurity Threats Affecting Small Businesses

Articles | 20 July, 2018 | 0

If you are responsible for managing the IT of a small business, then you probably already know that it’s a jungle out there, one with cybercriminals hiding behind every bush.

According to the recent Verizon Data Breach Investigations Report, over the last two years small businesses have become the top targets of cybercriminals and are beginning to suffer from cyber breaches more than large businesses.

Cyber attacks against SMB’s are on the rise, primarily because cybercriminals expect a small business to have less resources dedicated to their security. Most small businesses do not have a dedicated security professional, they are just too small to justify the cost and this is the problem because it leaves them vulnerable and relatively easy-pickings for cyber criminals.

Against this backdrop, security through obscurity is no longer an option and the expectation that you are too small to attract the interest of cyber criminals is no longer realistic. We’ve put together a list of the five security areas that we observe small and medium-sized businesses being affected by the most:

Contents

  • 1 unpatched Operating Systems and Software
  • 2 Phishing Attacks
  • 3 Weak Passwords
  • 4 Secure Your Wi-Fi
  • 5 Make Yourself Malware Resistant

unpatched Operating Systems and Software

Making sure that your computers and the software that runs on them is up-to-date is absolutely essential and is the bedrock of good security practice. Hackers take advantage of the vulnerabilities in unpatched software and operating systems to infiltrate organisations far too often. Failing to apply software and operating system updates when they are released puts your business at risk and weakens the overall security of your IT infrastructure. Don’t make it easy for them, make sure your servers & workstations have the latest operating system patches applied and that all 3rd-party applications are up-to-date.

Phishing Attacks

Those sneaky phishers are getting smarter and the bad news is that with them targeting humans and not computers, there is no truly effective method of stopping them.  By posing as legitimate contacts who may be known to the organisation, the phishers can fool the best of us sometimes and the only real way to defend against a phishing attack is through employee education.  Helping your employees understand the threat and regularly showing them different examples of phishing attempts reduces the likelihood of them clicking on something they shouldn’t.  Our recent article “10 Ways to Protect Yourself Against Phishing Attacks” has some of our top tips to help you and your staff remain resilient to phshing attacks.

Weak Passwords

Humans are terrible at choosing good passwords that are difficult for hackers to guess. Even worse, we often reuse the same password on multiple websites – making it even easier for hackers to find a way into your corporate applications or infrastructure.  Implement a good password policy and use password vaults to store and generate passwords for your employees. Your staff should also be taught about the dangers of reusing passwords, as one bad password used twice can lead to a very expensive breach.

Secure Your Wi-Fi

We have all visited businesses that provide a single Wi-Fi network to both their employees and visitors, where the password is the telephone number of the business or an easy-to-guess word.  Simple Wi-Fi passwords might be convenient when you need to remember them but they present a significant threat from a security perspective – making it easy for hackers to infiltrate your wireless network if they have guessed the password.  If no further network controls are in place, once an attacker has compromised your corporate wireless network, they will most likely have access to your entire internal network.

If the attacker is using a long-range Wi-Fi antenna, they don’t even need to be that close to your business to launch an attack on your wireless network.  Lock your Wi-Fi down by changing your routers default administrator password, change your Wi-Fi network password encryption to WPA2+AES and change your Wi-Fi password to something that is long and hard to crack.  If you want to allow guest users to have Wi-Fi access when they visit your organisation, a separate SSID should be implemented which allows guests to access the Internet but isolates their devices from the rest of your network.

Make Yourself Malware Resistant

There are a number of things that you can do to make your business more resistant to malware attacks. The nuclear option is to completely lockdown your employees workstations by removing their admin privileges, so that neither they, nor malware can install anything on the machine. Restrict the kinds of websites that your employees can visit on their computers. Websites that contain pirate streaming movies, pornography and gambling often contain malware waiting to infect visitors foolish enough to click on their links. Make sure that you have a good antivirus (AV) on the workstations and your servers, which forces scans of all downloaded files as well as your email contents. When AV is properly implemented it can catch a lot of viruses before they spread across your network.

 

While these are SecureTeam’s top five threats facing small businesses today, they are by no means the only threats that could affect your business.  That being said, if you can stay on top of the above five threats then you will go a long way to ensuring a decent level of security for your business and dramatically reduce the chances of becoming a victim.

Ultimately management awareness and employee training on cyber threats is essential no matter what business you are in and with all of the recent news about cyber attacks large and small, ignorance of the threat landscape is no longer an excuse.  The good news is that there are hundreds of different groups and services that can help you improve your overall cyber security posture and help your small business get to grip with these threats, often for free.

We recommend that you invest in Cyber Essentials Certification at a bare minimum, its an inexpensive certification process run by the UK’s National Cyber Security Centre (NCSC) that will help strengthen your organisations cyber resilience.  Cyber Essentials certification for your business demonstrates your commitment to IT security in the eyes of your employees and customers.

The National Cyber Security Centre (NCSC) also provide a brilliant small business cybersecurity guide that you can download for free and comes with video guides, infographs, employee training materials and small business action lists for improving your company’s cybersecurity.

With some careful practices, good internal processes and regular employee education, both you and your employees can do a lot to help secure your business against cybercriminals. Even if all you do is pass through the Cyber Essentials certification process, its technical control requirements will put your business on a much firmer footing from a security perspective and help you proactively defend your business against a wide range of cyber threats.

Subscribe to our monthly cybersecurity newsletter
Stay up-to-date with the very latest cybersecurity news & technical articles delivered straight to your inbox
We hate spam as much as you do. We will never give your email address out to any third-party.

No tags.

Related Post

  • LinkedIn the Top Phishing Brand in Q2 2022

    By Mark Faithfull

    Phishing is the most common cyber attack vector, and while email is well known for phishing, increasingly LinkedIn is being used as well. End-user phishing was the initial access point in 56% of cyber attacks thatRead more

  • Phishing Attacks That Can Bypass MFA

    By Mark Faithfull

    A large-scale phishing attack campaign has emerged using adversary-in-the-middle (AiTM) to steal credentials and circumvent multi-factor authentication (MFA) needs. Microsoft have released a security blog post regarding the use of these phishing attacks and theRead more

  • Log4Shell (still) actively exploited on VMware Systems

    By Mark Faithfull

    The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER) released a joint security advisory last week to warn of the active exploitation of CVE-2021-44228. This vulnerability is commonly knownRead more

  • How the Phone-Wiping Banking Trojan BRATA is Becoming a More Advanced Threat

    By Mark Faithfull

    First discovered in 2019, BRATA malware is contained in a malicious app which victims are tricked into installing on their phones. BRATA is a banking Trojan that gains access to your bank, withdraws your funds,Read more

  • CISA Warn of 40 New Actively Exploited Cybersecurity Vulnerabilities This Month So Far

    By Mark Faithfull

    Last week saw the addition of 39 known exploited cybersecurity vulnerabilities to the CISA catalogue, bringing the total added in June so far to 40. The Cybersecurity and Infrastructure Security Agency (CISA), a branch ofRead more

NextPrevious

Recent Posts

  • Amex and Snapchat used in Open Redirect Attacks
  • VMware Patch Critical Authentication Bypass Flaw
  • Critical Confluence Vulnerability Exploited in the Wild
  • LinkedIn the Top Phishing Brand in Q2 2022
  • Microsoft Exchange Servers Open to Backdoor Hack

Recent Comments

    Archives

    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • July 2018
    • June 2018
    • April 2018
    • January 2018
    • October 2017
    BCS Cyber Essentials Cyber Essentials Cyber Essentials PLUS ISO 9001 ISO 27001
    information. secured.
    • Home
    • Our Services
      • Infrastructure Testing
        • Internal Network Penetration Test
        • External Network Penetration Test
        • Wireless Network Penetration Test
        • Vulnerability Assessment
        • Network Segregation Test
        • Voice over IP (VoIP) Penetration Test
      • Application Testing
        • Web Application Penetration Test
        • Mobile Application Penetration Test
        • Desktop Application Security Assessment
        • Citrix Breakout Test
      • Configuration Review
        • Windows Server Build Review
        • Linux Server Build Review
        • Citrix Configuration Review
      • Information Assurance
        • ISO 27001 Gap Analysis
      • Cyber Essentials
    • News
    • Articles
    • About
      • About SecureTeam
      • STORM Appliances
        • Installing a STORM Device
        • Returning a STORM Device
      • White-Label Consultancy
      • Jobs
      • Cookie Policy
      • Quality Policy
      • Security Policy
      • Privacy Notice
      • Website Terms & Conditions
    • Contact Us
    SecureTeam