web analytics
364 NEWS
No Result
View All Result
Thursday, May 19, 2022
  • Login
  • Home
  • World
  • Economy
  • Business
  • Markets
  • Tech
  • Real Estate
Subscribe
364 NEWS
  • Home
  • World
  • Economy
  • Business
  • Markets
  • Tech
  • Real Estate
No Result
View All Result
364 NEWS
No Result
View All Result
Home Business

New Study Reveals the Top 3 Small-Business Cyber Threats You’ve Probably Never Heard Of

by admin
January 22, 2022
in Business
0
New Study Reveals the Top 3 Small-Business Cyber Threats You’ve Probably Never Heard Of
152
SHARES
1.9k
VIEWS
Share on FacebookShare on Twitter

If you think your business is completely protected from inbound cyberthreats, think again.

A study released Wednesday from the San Diego-based CyberCatch, a cybersecurity platform provider focusing on small and mid-size businesses, reveals that more than 30 percent of U.S. small businesses have weak points that bad actors can exploit. Moreover, fraudsters tend to set their sights on small businesses since smaller companies usually have weaker security safeguards in place compared with those at larger companies.

Some of the main vulnerabilities that small businesses face include “spoofing,” “clickjacking,” and “sniffing,” according to the study. 

Spoofing occurs when a bad actor uses a fake IP address to masquerade as an authorized device with the goal of tapping into a company’s private system. A clickjacking attack is a technique used to persuade a user to click on something that looks benign in their browser when they’re actually clicking on something malicious. And as it turns out, sniffing attacks have nothing to do with smell, but rather involve hackers intercepting a network’s traffic to access unencrypted data. 

After using its proprietary scanning tool to look for vulnerabilities in more than 20,000 randomly selected U.S. small businesses, CyberCatch found that around a third suffered from spoofing while 28 percent succumbed to clickjacking. The scan, which was conducted last November and December, examined different vulnerabilities including cryptographic failures, security misconfiguration, authentication failures and outdated components. 

So what can you do about it?

For starters, just having an IT team isn’t enough, says Sai Huda, founder, chairman and CEO of CyberCatch. Even if your IT team deploys anti-malware software on a network’s computers, a hacker could still steal an IT administrator’s password through a phishing attack, or another mechanism, and access sensitive data. 

“This is why a small business must first understand what are its crown jewels (its most valuable data and IT assets) and then make sure prevention, detection and response cybersecurity controls are implemented,” Huda explains.

Once you’ve assessed your valuable real estate, Huda recommends companies test all of their systems–which include websites, software and web applications–to locate any security vulnerabilities. Vulnerabilities can range from a disabled security feature in your system to injections of malicious code commonly seen in cross-site scripting (XSS) attacks.

If you spot any security holes, patch them up before a cyberattacker finds them. Huda also advises businesses to inspect their websites or web servers regularly to detect any other weaknesses in their software. With these safe guards in place, businesses will be better positioned to fend off the attacks coming their way. 

Read More

Tags: revealsStudy
  • Trending
  • Comments
  • Latest
Does omicron cause unusual symptoms?

Does omicron cause unusual symptoms?

December 13, 2021
One person dead following incident at SilverStar Mountain Resort

One person dead following incident at SilverStar Mountain Resort

December 20, 2021
Edmonton Police helping families in need through Holiday Heroes campaign

Edmonton Police helping families in need through Holiday Heroes campaign

December 20, 2021
Amazon staff had to use bathrooms as tornado shelters

Amazon staff had to use bathrooms as tornado shelters

December 13, 2021
Hashtag Trending Dec. 8 – Massive numbers of YouTube copyright strikes; Microsoft seizes hacker’s servers; Outage at AWS

Hashtag Trending Dec. 8 – Massive numbers of YouTube copyright strikes; Microsoft seizes hacker’s servers; Outage at AWS

0
With Stimulus Benefits Ending, What Should Small Business Owners be Aware of?

With Stimulus Benefits Ending, What Should Small Business Owners be Aware of?

0
7 Ways to Be a Truly Customer-Focused Business

7 Ways to Be a Truly Customer-Focused Business

0
Assumptions Can Hold Your Company’s Success Hostage. Here’s How to Fight Them

Assumptions Can Hold Your Company’s Success Hostage. Here’s How to Fight Them

0
21 April 2022 e-Edition

21 April 2022 e-Edition

May 19, 2022
REVIEW | Why the 2022 VW Caddy is one of the best family car buys in the land

REVIEW | Why the 2022 VW Caddy is one of the best family car buys in the land

May 19, 2022
Lamborghini hybrid to race at Le Mans in 2024

Lamborghini hybrid to race at Le Mans in 2024

May 19, 2022
China’s zero-Covid-19 policy dashes global hopes for quick economic return to normal

China’s zero-Covid-19 policy dashes global hopes for quick economic return to normal

May 19, 2022
  • Home
  • Advertisement
  • Contact Us
  • Privacy & Policy
  • Other Links

© 2021 364News - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Advertisement
  • Contact Us
  • Homepages
    • News 364
  • World
  • Economy
  • Business
  • Opinion
  • Markets
  • Tech
  • Real Estate

© 2021 364News - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In