Are You A "Sitting Duck"? for Hackers?

Are You A "Sitting Duck" for Hackers?



You are under attack. Right now, extremely dangerous and well-funded cybercrime rings in China, Russia and the Ukraine are using sophisticated software systems to hack into thousands of small businesses like yours to steal credit cards, client information, and swindle money directly out of your bank account. Some are even being funded by their own government to attack American businesses.


Don’t think you’re in danger because you’re “small” and not a big target like a J.P. Morgan or Home Depot? Think again. 82,000 NEW malware threats are being released every single day and HALF of the cyber-attacks occurring are aimed at small businesses. You just don’t hear about it because it’s kept quiet for fear of attracting bad PR, lawsuits, data-breach fines and/or sheer embarrassment.


In fact, the National Cyber Security Alliance reports that one in five small businesses have been victims of cybercrime in the last year – and that number is growing rapidly as more businesses utilize cloud computing, mobile devices and store more information online. Quite simply, most small businesses are low-hanging fruit to hackers due to their lack of adequate security systems – which is what prompted this urgent post to all of you.


There are a few simple things you need to be doing on a consistent basis to avoid being the next statistic. They are:


Use a strong password. I know, simple, right? But so many people are still using easy-t-guess passwords like “password” or other words or phrases. Guess what: hackers have sophisticated software programs that can try to log in to your PC, account, web site, etc., at the rate of 8 million login attempts per SECOND. If your password is easy, they’re in. Your password should contain at least 8 characters, uppercase and lowercase letters, a number and a symbol (! or#, for example).


Install a “unified threat management” (UTM) system. Firewalls and antivirus aren’t enough to stop the sophisticated tools hackers now have. A UTM allows an IT administrator to monitor and manage a wide variety of security-related applications and devices to make sure you’re protected on all fronts. 


Educate your employees! Employees clicking on phishing e-mails or downloading virus-lade files is still the #1 way hackers gain access to and control of business networks. Therefore, you need to outline an Acceptable Use Policy (AUP) that details what employees can and cannot do with company-owned devices, files, software, etc. Plus you need to make them aware of how to spot a phishing e-mail or attack so they can avoid it altogether. 


Phone: 516-762-0155

Email: [email protected] 

Address: 366 S Oyster Bay Rd., Hicksville, NY 11801

#informationtechnology #IThelp #lawyers#attorneys #technology #ITservices#digitalinformation



要查看或添加评论,请登录

Michael Glasser的更多文章

  • Training

    Training

    Our staff of experts has extensive knowledge of the products we sell. We will come to your office and spend time with…

  • Webex plugin for Chrome may allow Malware to be downloaded to your computer

    Webex plugin for Chrome may allow Malware to be downloaded to your computer

    If you use WebEx's plugin on your Chrome browser you need to patch it now. If you happen to go to a URL that contains…

    1 条评论
  • Ransomware hitting Major Websites

    Ransomware hitting Major Websites

    Ransomware is a malicious attack that causes your data to be unavailable to you unless you pay a payment to unlock the…

  • Taking Security Seriously

    Taking Security Seriously

    Over and over recently we have seen small businesses come under attack from ransomware and viruses to phishing…

  • Consulting

    Consulting

    At Glasser Tech LLC, our goal is to make your firm be as efficient as possible saving you time and money. We will…

  • Ease of Use

    Ease of Use

    Glasser Tech's Mail Protection was designed with simplicity in mind. Users do not need to install or learn any new…

  • Have you ever received an email that looks like the picture below?

    Have you ever received an email that looks like the picture below?

    Were you tempted to click on the link where it says confirm account? You probably thought, well gee, it looks like it’s…

  • Network Design

    Network Design

    We can implement a design that best suits the amount of users you have. Whether you need a local area network (LAN) or…

  • APT Blocker-Your Best Defense in the War Against Ransomeware

    APT Blocker-Your Best Defense in the War Against Ransomeware

    The more sophisticated malware gets the more sophisticated your firewall has to be to fight it. WatchGuard has added…

  • Tips to Protect Yourself from Hackers

    Tips to Protect Yourself from Hackers

    Every day hackers find new ways to gain access to your most important data whether it be your own personal information…

    2 条评论

社区洞察

其他会员也浏览了