It’s in the news every day. Dozens of small businesses all over Northern Ireland are getting hacked into on a daily basis.
Hackers are usually after your vital business data and they either want to steal it and resell it, or they want to encrypt it and then charge you for decryption of the data.
The personal details of only 50 customers can make it worthwhile for a hacker to spend a few hours breaking into a small business network.
Small businesses with between 1 and 25 computers are the main targets.
Unfortunately most small businesses don’t realise how affordable cyber security is until it’s too late.
Hackers see small businesses as easy targets, mainly because they see the gates are left open with no lock on them.
If your computer network is not being looked after on a regular basis, it will eventually be hacked. Just having an AntiVirus isn’t enough.
Contact us today for a free consultation. Find out how you can proactively protect and secure your small business network and your vital customer data.
The Three Main Types of Cyber Attacks
- APT (Advanced Persistent Threats) – An unauthorised user gains access to your computer. The hacker infiltrates the small business network and runs processes in the background and are usually undetected for months or even years, stealing data and using the business network to share illegal pornography, torrents and also to mine bitcoin.
- Malware – Malware will usually be installed from an online source such as an infected email or hacked website. There are some very easy ways to protect against this sort of attack, including a better Router, business class antivirus and staff training, which leads us to social engineering. Malware includes spyware, keyloggers, viruses and worms.
- Social Engineering – Staff that aren’t up to date on how to stop a cyber attack are the weakest link in any business. Your staff will be provided with free training once a year and monthly updates via email or more often if required. The most popular type of social engineering is called a Phishing Attack. This usually appears in the form of a deceptive email that tricks the user into giving away personal information.