Hackers Now Prefer Small Companies

Statistics are showing that small and medium-sized businesses are being targeted by hackers on an escalating scale. The reason for this is smaller businesses tend to have lax and weak security, making them much easier and quicker to steal from.

In physics, there’s a concept called ‘the path of least resistance’. The meaning is plain enough objects that move in a system take the path where they will encounter the least challenges and hurdles in order to quickly move to wherever they are going.

Apparently, the same principle applies to hackers nowadays. Instead of targeting larger firms for that big ‘score’, hackers are now considering it more feasible and much easier to victimize smaller firms and companies, even for a much smaller amount of money.

Why is that? First, smaller companies generally have much more vulnerable IT systems. Security is minimal or average at best, and the hackers don’t get as much heat or attention when compared to trying to breach the much more complicated, state-of-the-art security systems of bigger firms and businesses. Take a small newsstand business in Chicago: cyberthieves were able to install a Trojan in the cash registers which sent swiped credit card numbers to Russia. When the jig was discovered, Mastercard subsequently demanded an investigation – at the expense of the business owner – and the proprietor had to shell out a hefty $22,000.(i)

A survey in the United States reveals that more than half of small or medium-sized businesses believed that they ran no risk of being victimized by hackers, and less than half of the respondents had security systems in place.(ii) That looks like a path of least resistance, as far as hackers are concerned.

The loss of a few thousand bucks may not be much for a big business, but it can make a significant dent on the profits and sustainability of smaller organizations. And in the case of implanted viruses that steal credit card information, your reputation can also take a big hit. So if you want your business to stay truly safe before it’s too late, please contact us so we can discuss options and blueprints to make your business secure.

References: (i) and (ii)

Published with permission from TechAdvisory.org. Source.



Why Move Up to Windows 7 and 2008 R2?

It’s common for many businesses to forgo upgrading their systems when new software comes along it’s not only expensive, but why change something that’s been serviceable and reliable so far? However, considering that studies and tests are showing that Windows 7 and Windows 2008 R2 are significantly outperforming their predecessors, it may be time to at least consider beginning a gradual upgrade.

Read more...



Scammers Now Pose as Microsoft Reps

hand holding phone while dialingWhen someone who identifies him/herself as a representative from Microsoft calls you out of the blue, be wary. A new scam involves people posing as Microsoft employees and scaring victims into paying for bogus service and giving up credit information, by telling them that their system has been infected by a virus or that it’s running too slowly.

Read more...



Lock Access to Your Windows Desktop Quickly

Leaving your computer for a short time but don’t want anyone peeking at your desktop or files? Simply lock it. When you lock your desktop, anyone who wants to use it will have to log in using their username and password.

Read more...



Trigger Animation On Click of an Object in Microsoft PowerPoint 2010

In Microsoft PowerPoint 2010, you can set an animation to trigger when you click on an object. This is a simple way to add and control interactivity to your presentation. To add an animation trigger, select an object that already has animation applied to it.

Read more...



cartoon