We think of cybercrime as something that happens to someone else. Data thieves go after big companies; don’t they? The fact is, though, that anyone can be a target. If you’re on the Internet, hostile people regularly use machines to probe your servers for weaknesses. If they find one, it can cost you seriously.
A white paper by Hamilton Place Strategies estimates that cybercrime had a worldwide cost of $445 million in 2014, a bigger number than Microsoft’s or Exxon Mobil’s market capitalization. The median cost of a cybercrime nearly tripled between 2010 and 2015.
The cost doesn’t come just in direct harm, such as downtime, loss of data and recovery costs, but also in loss of reputation and legal liability. When an attacker grabs people’s credit card numbers — or even when there’s a reasonable chance it might have happened — customers are reluctant to do business with the same company again. You might have to mollify them with some kind of compensation.
Organizations might be legally liable for not being careful enough. If you handle personal health records, and they’re breached, the federal government might hit you with a fine under HIPAA, which can be as high as $50,000 per incident. If you’re managing a publicly traded business and fail to protect against financially related breaches, the business might have to pay a fine under federal law.
Types of attacks
The biggest single danger is social engineering attacks, which play on people’s trust. The usual form is a “phishing” email, which tries to trick you into divulging information. It may pretend to be a legal notice or a document from a colleague or customer. If you’re fooled, you might give them an important password or let them install malicious software on your computer.
The fastest growing threat is ransomware, which carries a very direct and painful cost. If this hits your computer, it encrypts your documents, and you have to pay an extortion fee through an anonymous channel to get them restored. One hospital had to pay $17,000 to get its systems running again.
Other channels of attack besides email include easily guessed passwords, insecure form processing and defects in server software. Attackers are constantly discovering new ways to exploit security holes and prey on people’s trust. It’s very hard to keep track of them all.
How to protect yourself
Guarding against cybercrime requires having at least one person on board who really understands computer security issues. A managed services company is often the best way to do this, especially for a small business. You’ll get recommendations and services that will keep you much safer. Backup, keeping software up to date and implementing employee policies may seem annoying at first, but they’ll become part of standard procedure.
Training is important. I realize it’s difficult for managers to make the time, but managers need to learn about security risks and understand how to set a policy that will keep employees from making expensive mistakes.
Everyone is vulnerable to online criminals, and there’s no such thing as 100 percent safety on the Internet. By taking the right precautions, though, you can eliminate the large majority of the threats to your business.
Centerpoint IT is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. Contact us at (404) 781-0200 or send us an email at info@centerpointit.com for more information.
Call our business managed IT services department directly at (404) 777-0147 or simply fill out this form and we will get in touch with you to set up a getting-to-know-you introductory phone call.
Fill in our quick form
We'll schedule an introductory phone call
We'll take the time to listen and plan the next steps
11285 Elkins Rd Suite E1, Roswell, GA 30076
© Copyright 2024 Centerpoint IT. All Rights Reserved. Website in partnership with Tech Pro Marketing. | Privacy Policy
Get Immediate Help For All Your Technology Issues (404) 777-0147
If you want our team at Centerpoint IT to help you with all or any part of your business IT, cybersecurity, or telephone services, just book a call.
Fill in your information below to get started today.
"*" indicates required fields
Fill in your information below to schedule now.
"*" indicates required fields
Before your organization commits to 1, 2, 3 or even longer managed IT services contract, understand what you’re getting. Centerpoint IT gives you the facts in our Managed IT Services Buyer’s Guide.
Enter your information below and we’ll send it over.
"*" indicates required fields
We are turning 15 and want to celebrate this milestone with you because without you this would not have been possible. Throughout this year look for special promotions on services and tools aimed at Making IT Simple for You so you can focus on your business.
We are turning 15 and want to celebrate this milestone with you because without you this would not have been possible. Throughout this year look for special promotions on services and tools aimed at Making IT Simple for You so you can focus on your business.
https://calendly.com/centerpoint-it/discovery-call