From cybersecurity risks to the actual process of switching to the cloud, we’ve scoured the Internet for this month’s link round-up for how to protect your small business from threats and pitfalls in the cyber world. Did you know that not all data should be migrated to the cloud? Or that tailgating isn’t just a term for the pre-football shenanigans you have with your friends? After this link round-up, you’ll be all the wiser.
The State of Ransomware Among SMBs
We’re big fans of visually-conveyed information, especially when the subject is so important. We’ve talked about ransomware before, but this infographic sums it up with the leading facts, short and sweet. For example, did you know that 81% of small businesses have suffered a cyberattack, and of those, 51% have been from ransomware?
Time to Read: 2 min
What is Exactis — and how could it have leaked the data of nearly every American?
A company you’ve probably never heard of — Exactis — collects data from web browsers using cookies. These cookies track your movements, communicate with other sites, and sync across your many connected devices. It reveals a lot about a consumer when looking at the data, which is how Facebook knows to target you for an ad that you’ve never Googled specifically (some of that is because you’re allowing Facebook to access your microphone). Learn ways to protect yourself while browsing and what to monitor for potential hacks.
Time to Read: 7.5 min
Migrating to the Cloud? Not as Simple as It Seems
This downloadable paper reveals the reasons shifting to cloud storage is wise while revealing the complexities that come with such a large organizational change. It’s important to recognize that cloud storage is not the end-all-be-all. It offers some great benefits, but not everything should be migrated to the cloud. Before leaping into the cloud era, it’s recommended to consult with professionals who are experienced with cloud migration. It’s not just switching email providers (like moving from Microsoft Exchange to Office365) or simply getting a cloud account and dumping all your information there. Get help from those who know what they’re doing.
Time to Read: 21.5 min
How to Protect Your Small Business from Social Engineering Attacks
We’ve touched on social engineering tactics in our posts about cybersecurity, but what kinds of social engineering could be used on your small business? While phishing is the most common, there’s also pre-texting, tailgating, and baiting. It’s important to know what each type of tactic entails and make sure you not only train your employees but frequently test them, as well.
Time to Read: 9.5 min
One in five email attacks uses compromised accounts
20% of all email attacks are now happening through account takeovers. The troubling part of these attacks is that they are generated from within using a reputable email address, which means it takes much longer to spot the hack, giving cybercriminals more time to wreak havoc on other computers. It’s crucial to train your employees to spot phishing attacks. Implement an open-door policy, where employees are encouraged to verify emails in person or over the phone to ensure their authenticity.
Time to Read: 2.5 min
Subscribe to our blog