What can a small business learn from large-scale attacks?

What can a small business learn from large-scale attacks?

You would have to be living under a rock if you have not heard about the most recent CDK attack on dealerships.

15,000 car dealers were left dead in the water, back to paper to attempt to serve their customers.

Whilst the BIG attacks always hit the news, of which there have been several over the last few months, the question becomes what do we learn from these attacks for our businesses?

Here are just some of the recent ones:

CDK. A cloud-based application that allows auto dealerships to complete transactions, front office, back office, service departments and more. That attack has impacted organizations throughout the US. It is thought at this time the Blacksuit ransomware gang is responsible.

Federal Reserve. 33TB of sensitive information was stolen by a Russian cyber gang, Lockbit.

Change Healthcare. This attack impacted over 70,000 pharmacies. Change processes over 15 billion healthcare transactions per year. Critically, they are involved with a third of all American patient records. They were attacked by the Alphv ransomware group.

The big ones make the news. This helps fund the narrative of “it will not be me because I am too small.” - “They will not target my business because we have nothing proprietary etc.”

Nothing could be further from the truth. Everyone is just a payday to cyber criminals, no matter the size of your organization.

Large-scale complex attacks are difficult and require expertise. Smaller organizations are more vulnerable and here is why:

  • No IT department.
  • They outsource to an IT provider and have no idea if they are doing a good or bad job.
  • Lack of investment. Cybercriminals are out-investing you by a scale of 10-1.
  • Security is not important to your business. It’s a secondary afterthought.
  • Quite frequently, no cyber liability insurance is in place.

All these reasons present an open door to cyber attackers from around the world to attack your small business.

What can we learn? It is now time to start thinking of WHEN not IF. This will help guide your decision-making process around the appropriate protections.

Talk with your IT provider to find out what new protections can be put in place to combat cybercriminals. Below are just three steps you can take today that will help:

  • Implement a documented test and backup recovery program, tested every six to twelve months.
  • Explore and implement zero trust principles. An idea of least privilege.
  • Find out where you are today security-wise so you know as a leader where gaps exist and close them.

The risks have never been so severe to your business that we should all be taking new protections seriously.

Securely yours,

Scott

If you need any further assistance or have more content to review, feel free to ask!

要查看或添加评论,请登录

Scott Huxley的更多文章

  • vCIO Success: Building a budget (Part 2)

    vCIO Success: Building a budget (Part 2)

    A common question I would ask during a sales engagement was: 'Do you meet with your MSP quarterly?' The typical…

  • vCIO Success: The Relationship-First Foundation (Part 1)

    vCIO Success: The Relationship-First Foundation (Part 1)

    After nearly eight years in the MSP industry, progressing through roles from sales to vCIO and then leadership, I…

  • The Evolving Landscape of AI Cyber Threats: A 2025 Forecast

    The Evolving Landscape of AI Cyber Threats: A 2025 Forecast

    The other day, I experienced an AI taking my order at a drive-through. It did a great job, I must admit.

    3 条评论
  • The Danger of Doing Nothing

    The Danger of Doing Nothing

    Frequently within the IT industry, professionals are faced with the task of guiding customers or prospects towards…

    4 条评论
  • Yearly Penetration Testing: Ensuring Compliance and Mitigating Risk

    Yearly Penetration Testing: Ensuring Compliance and Mitigating Risk

    Having worked in this industry for some time, it is shocking how many companies have never had a penetration test…

  • Windows 10: Upgrade vs Replace?

    Windows 10: Upgrade vs Replace?

    Many clients and prospects still have aging machines that need to be updated to Windows 11. Pull a list from your RMM…

  • The Power of a Technology Roadmap

    The Power of a Technology Roadmap

    You wouldn't dream of heading out for a vacation without knowing where you're going, right? I mean, unless it was a…

  • Uncover Your Weaknesses Before Hackers Do

    Uncover Your Weaknesses Before Hackers Do

    As the saying goes, what gets measured gets done. So how good is your cybersecurity? Common answers I receive often…

  • I'm in love with Brad Pitt

    I'm in love with Brad Pitt

    To be clear here, I am not truly in love with Brad, though, I am sure he is a very nice person! You may have read a…

    2 条评论
  • The Alarming Rise of AI-Powered Cyberattacks

    The Alarming Rise of AI-Powered Cyberattacks

    We have seen plenty of discussion around the positive use of AI, such as automating manual tasks and summarizing large…

社区洞察

其他会员也浏览了