Just recently hackers accessed 1.5 terabytes of data from cable channel HBO, including scripts and a full episode of Game of Thrones. Last week, Distributor Star India was forced to admit the cyberattack originated from their servers, releasing a statement that said, “We take this breach very seriously and have immediately initiated forensic investigations at our and the technology partner’s end to swiftly determine the cause.”
The most interesting quote, however, came from HBO CEO Richard Plepler in the immediate wake of the cyberattack: “The problem before us is unfortunately all too familiar in the world we now find ourselves a part of.” So even if you don’t watch Game of Thrones, don’t subscribe to HBO, or don’t think your personal or business information is of the same value to hackers as that of an international hit TV series, you are certainly still be at risk.
Most of the world’s biggest and most harmful data breaches have occurred in the last two years. In 2017 alone, everything from usernames and passwords to Social Security numbers and medical information has been stolen. Which means that enhanced layers of security are required to keep your critical data safe even if your business is small and off the radar so to speak.
Small businesses are becoming the fastest growing target for cyberattacks including Ransomware. According to a recent white paper by IBM, small businesses are hit by 62% of all cyberattacks and 60% of small companies were unable to stay in business for more than six months after an attack or hack.
Protecting your business from an attack or hack is a multilayered process and no single solution can guarantee prevention or recovery. For any business a successful strategy encompasses 4 layers of prevention: A firewall, anti-virus, anti-malware, and anti-ransomeware applications and at least 1 layer of recovery to ensure quick and painless data restoration with minimal data loss in the event of an attack.
If you're not sure how you're protected today, we can help you evaluate your current security at no cost.
Microsoft announces price and term changes for Office 365
Hackers are constantly evolving, exploiting new vulnerabilities, and dwelling in small business environments—until they encounter EDR.