We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...
“Employees can say, ‘Security isn’t my thing,’ and expect their IT department to take charge, but it shouldn’t be that way,” says Duquette. – Data leaks
Business owners need to take the time to get everyone thinking about cybersecurity—from the cleaning staff right up to the top executives, including the company president, he recommends.
Consider the consequences of your company’s information being stolen and have measures in place to deal with any breach, he says.
He suggests starting by asking a series of questions: “What is it that you are trying to protect? Who has access to it and what controls have been put in place? Would it be very damaging if the information got out?”
“I would say that these threats are actually increasing for small to mid-sized businesses because a lot of these companies hold very important information about clients,” Duquette says.
Cybercriminals, whether they’re your employees or hackers in a distant location, will also steal financial information.
“You have a lot of start-ups with high-value intellectual property (IP) that people would love to get their hands on,” Duquette adds.
Businesses must now report any breach involving personal information under its control, including with a service provider, to the federal Privacy Commissioner. This applies if it is reasonable to believe that the breach creates a real risk of significant harm to the individuals involved.
Here are other types of cybercrimes targeting businesses:
Cyber thieves may not be as interested in stealing your company’s information as they are in trying to get you to pay money or ransom to get it back. Ransomware is a software that blocks access to computers or files until a ransom is paid.
Phishing is still a threat to entrepreneurs Criminals will sometimes use chat bots or email scripts to obtain your personal financial or health information to steal your money or identity, or will sell it on the black market at a premium to other criminals looking to use your personal information for identity theft.
DoS disrupts access to your web properties by flooding them with traffic. This makes your website and services unavailable to legitimate users. It can be used as a means of cyber extortion.
Sometimes cybercriminals don’t want to attack their targets directly, instead they want to breach a server and take everyone’s information at once, says Ponnambalam. They will do this with rainbow tables, which essentially is a method of looking at password algorithms and gaining access to an entire server in a matter of minutes compromising every user of that service. Contact Musato Technologies to learn more about our ICT services and solutions.
Article by BDC