ICFiles
SOC 2

content

Secure File Transfer Soc 2 starts at $1 per month

Join Us

 

ICFiles Logo

 

Technology: Cyber Crooks Target Small Businesses

What's New in Technology

April, 2010

Get this Article  Get this Article & Suite of Tools

Technology: Cyber Crooks Target Small Businesses

Don't assume that your business is too small to merit the attention of a hacker. These crooks don't care how big or small your company is. When it comes to stealing financial information - especially customers' credit card numbers - the incentive remains the same. Business owners are vulnerable in two arenas - their Web sites and their networks. Here are some tips to protect your company from cyber crooks.

E-Commerce
Hackers often use automated programs to capitalize on a flaw in common software that is used by thousands of computer users. Using this indiscriminate method, hackers want to reach and infect as many webpages as possible, planting something malicious that will get picked up by visitors to the site. Websites run by smaller companies with less security savvy are often considered easy targets for this type of criminal activity.

As if dealing with fixing the infected site is not enough, business owners could end up blacklisted by major search engines (Google, Microsoft, etc.), which means customers who find your name through a search will receive messages warning them that your site is not safe. How much business is lost when a website loses customers' confidence? Fixing the problem is only the first step. Corrupted pages must be identified and reinstalled with clean pages, and security gaps have to be closed. Then you can ask Google for a rescan to get your site declared clean and removed from the blacklist. Time-consuming recovery procedures can kill a new business. Prevention must be in place. Obviously, no prevention plan can be 100 percent guaranteed, but make sure you follow up on these tips:

  • Ensure your web hosting company is taking care of your security.
  • Most commonly used software is frequently the conduit used by crooks to infect your site. For example if you use a blogging program, make up strong passwords and keep them closely held. Educate staff regularly on the importance of keeping passwords a secret.

Not Always Technology
It is not always weaknesses in technology that allow hackers to get into your network.  Increasingly, employees are the weakest link. Employees whose loyalty to your business is unquestioned are often the chink in the armor. Here's how this breach occurs:

  • Crooks identify people likely to have access to administrative system programs. It is not too hard to do this using social (Facebook) and job networking sites (LinkedIn).
  • When the hacker has the target employee's email or instant messaging information, the cyber crook has a number of methods available to hijack the target's computer and gain access to the network with a virus or a bot.

It is worrisome - given the millions of people who use social networking sites - to note that hackers are increasingly using social networking as a key element in their attacks on secure networks.  Staying current on cyber crime continues to be an increasingly difficult job.

Get this Article  Get this Article & Suite of Tools

 

These articles are intended to provide general resources for the tax and accounting needs of small businesses and individuals. Service2Client LLC is the author, but is not engaged in rendering specific legal, accounting, financial or professional advice. Service2Client LLC makes no representation that the recommendations of Service2Client LLC will achieve any result. The NSAD has not reviewed any of the Service2Client LLC content. Readers are encouraged to contact their CPA regarding the topics in these articles.

Protected by Copyscape Plagiarism Finder

Dynamic Content Powered by Service2client.com
SEO Content Powered by DynamicPost.net

 

ICFiles
SOC 2

content

Secure File Transfer Soc 2 starts at $1 per month

Join Us

 

content

 
website bundles

MyWeb, WordPress
1 Click Hosting
Install free themes

websites

Hosting Bundles

 
 
Electronic Commerce

Copyright © 2024 Service2Client, LLC All Rights Reserved.
Terms of Service  |  Privacy Policy

CPA Website Content Powered by Service2Client.com


 

CLOSE