24 Nisan 2017 Pazartesi Breaking News             Latest US News            New York

Pittsburgh might buy 'smart' garbage cans that signal when they're full
Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack.In...

The Cost Of Online Crime: Preventing Cyberattacks And Hacks On The Internet For Cheap

Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack.In...

The Cost Of Online Crime: Preventing Cyberattacks And Hacks On The Internet For Cheap

Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack.

In the last year, half of American small businesses have been breached by hackers. That includes Meridian Health in Muncie, Indiana, where 1,200 workers’ W-2 forms were stolen when an employee was duped by an email purporting to come from a top company executive. Many small companies are just one fraudulent wire transfer away from going out of business.

There’s lots of advice available about how to fight cybercrime, but it’s hard to tell what’s best. I am a scholar of how businesses can more effectively mitigate cyber risk, and my advice is to know the three “B’s” of cybersecurity: Be aware, be organized and be proactive.

Here’s how more companies can boost their cybersecurity preparedness without breaking the bank.

Almost any company can be vulnerable to a range of cyberattacks. A company manager or network security professional needs to know about the various types of digital threats and how to limit vulnerability.

There are some attacks that every employee should know about. The most common attacks use a method called “phishing,” or a variant that specifically targets one potential victim, called “spearphishing.” These typically take the form of email messages that appear to be sent by coworkers or supervisors asking for sensitive information. That’s what happened to the health care company in Muncie. These messages can contain instructions that a victim might follow, believing them legitimate – such as clicking a link that installs malware or captures login information, or even making a wire transfer to another business’s account.

The best defenses against these types of attacks involve skepticism and vigilance. Attackers can be very clever and persistent: If just one person has one weak moment and clicks on one malicious link, an entire network can be compromised.

Most companies go to great lengths to protect their physical assets and personnel. But many do not take similar precautions with their digital information. A key computer may be kept disconnected from the internet, but if it accepts flash drives or rewriteable CDs, or if its password is easy to guess, the information is just as vulnerable.

Small business owners need to prioritize cybersecurity. Without proper preparation, even large companies can find themselves unprepared for cyberattacks. When Sony was hacked in 2011, it did not have an executive focused solely on information security. But hiring someone did not prevent another hack in 2014.

Planning ahead is vital, instead of just being reactive. The National Institute for Standards and Technology Cybersecurity Framework lists five main functions of cybersecurity efforts: Identify vulnerabilities, protect against attacks, detect anyone who gets through, respond to the attack quickly and recover after the attack has been stopped.

Some companies are already receiving advice that following the NIST guidelines can reduce legal liability if cybersecurity problems arise or are discovered. Companies can also work with colleges and universities to create cybersecurity clinics, or even consider buying cyber risk insurance.

There’s no way to avoid being the target of a cyberattack, but that doesn’t mean becoming a victim. Simple steps can have huge results: The Australian government reported resisting 85 percent of cyberattacks by taking three basic steps: restricting which programs can run on government computers, keeping software updated regularly and minimizing the number of people who have administrative control over networks and key machines.

Cybersecurity doesn’t have to be rocket science; it’s just computer science.

Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

This article was originally published on The Conversation. Read the original article.

The Conversation's logo. Photo: The Conversation

Our editors found this article on this site using Google and regenerated it for our readers.

Breaking News Headlines

Perfect nails are just a latex brush away
Perfect nails are just a latex brush away
Bringing down Bill O'Reilly: The final days of a Fox News superstar
Bringing down Bill O'Reilly: The final days of a Fox News superstar
Magdalena Abakanowicz, Polish artist behind headless sculptures in Grant Park, dies at age 86
Magdalena Abakanowicz, Polish artist behind headless sculptures in Grant Park, dies at age 86
Save Telefilm Canada, filmmakers urge Trudeau | Toronto Star
Save Telefilm Canada, filmmakers urge Trudeau  | Toronto Star
Exchange Bank first-quarter earnings up 27 percent from 2016
Exchange Bank first-quarter earnings up 27 percent from 2016
Charge me up: Rural electric drivers face 'range anxiety'
Charge me up: Rural electric drivers face 'range anxiety'
These breakup texts are pathetic
These breakup texts are pathetic
Did Chicago loan coordinator win third time on 'Jeopardy?'
Did Chicago loan coordinator win third time on 'Jeopardy?'
Crowning Julia Roberts again not a good look for People: Menon | Toronto Star
Crowning Julia Roberts again not a good look for People: Menon | Toronto Star
White House Says It Didn’t Mislead Allies About Timing of Carrier’s Korea Heading
White House Says It Didn’t Mislead Allies About Timing of Carrier’s Korea Heading
iPad Pro 2 12.9-inch New Model Might Be Launched In May
iPad Pro 2 12.9-inch New Model Might Be Launched In May
Comedy Central orders South Side workplace comedy pilot
Comedy Central orders South Side workplace comedy pilot
NEWS ARCHIVES