Top Security Predictions for SMBs in 2017
Ransomware
Most of the time security experts have spent tracking ransomware has mainly involved direct, intentional attacks on a high-profile target. Key examples include going after major U.S. hospitals that had the funds to pay large ransoms and a particularly urgent need to regain access to their data. However, that changed last November when a ransomware attack on the San Francisco transit system turned out to be the result of self-propagating malware that had no intended target and instead spread as widely as possible. Ransomware scammers may well try to duplicate the success of this scattergun approach in 2017, and the relatively low level of resources needed to do so means many will hit small and medium-size businesses for small but reliable ransom payments. Businesses must go back to basics and revisit their security software now that a “simple” breach could result in direct financial costs beyond mere disruption. In some cases, cloud hosting services might offer a level of security that is not viable on an internal network.Internet of Things
The Internet of Things is really a simple concept with possible significant consequences. The term itself describes the rocketing number of devices other than traditional computers that are connected to the Internet. The danger is that we often do not think of these devices as computers in need of security protection. For the multinational giants that make the devices, be they smart light bulbs, electronic locks or internet-connected security cameras, the obvious threat is of hackers trying to disrupt or disable devices to exact extortion, access data or simply cause trouble. Or, gain control over these devices and pivot to more critical systems. For small and medium-size companies, the real danger is being among those inconvenienced by such attacks if they too use smart devices. The consequences can be overblown, and the level of exaggeration can distract attention away from genuine damage. For example, a recent story about a hotel’s electronic room locks being remotely activated by hackers and leaving guests locked into or out of their rooms turned out to be mundane in reality. The attack simply meant staff could not reprogram keys when guests checked in. However, the hotel has since decided to return to old-fashioned physical keys, which could result in inferior customer service. With smart devices offering so many benefits for SMBs – for example, cutting energy bills through smarter heating and power controls – the key is to not simply rely on the manufacturer’s reputation but to proactively prepare for the risks of devices being compromised and the knock-on effects on day-to-day business. IT consulting experts could offer value-for-money advice in this field.Mobile Use
Mobile internet is another area where businesses risk indirect consequences from a wider trend. 2016 marked the first time that mobile devices made up more internet usage than traditional computers worldwide. Within the U.S. alone, mobile users made up 42 percent, and that number is rising rapidly. This will inevitably lead to cybercriminals exploiting security weaknesses in mobile operating systems through browsers and mobile apps. That could be particularly bad news for smaller businesses where “bring your own device” is a useful way to keep costs manageable while letting staff work on the move. Rethinking mobile strategies will be a valuable exercise – looking at how to make sure staff devices aren’t compromised, how business-critical data can be isolated from such attacks, and how to prevent a hacked device becoming a route into the business’s network. It may also include searching for dedicated mobile apps that include enhanced security. Sources: https://www.theguardian.com/technology/2016/nov/28/passengers-free-ride-san-francisco-muni-ransomeware http://www.theverge.com/2017/1/30/14438226/hackers-austrian-hotel-bitcoin-ransom-ransomware http://gs.statcounter.com/press/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide
Working with ATS is a breath of fresh air. ATS takes our information security concerns seriously and advises us how to avoid potential pitfalls with both hardware and software. We are beyond thrilled with ATS and only wish we had selected them a year earlier.
Joseph A. AppelbaumPresident & CEO, Potomac Companies, Inc.
ATS has been our trusted partner in recent upgrades we have made to our IT infrastructure and cyber security. Their account management, project management, and technical teams have all provided top-notch service, guiding us to make informed decisions, managing timelines for multiple projects, and most of all, listening to our needs and making recommendations based on our unique work environment. During the transitions, they have kept us operating smoothly and provided quick and helpful support through their Help Desk.
Amy GavinNutrition.org
I just wanted to take a moment to reach out and thank you for the excellent service you and your team have provided with the hosted SEIM solution. AlienVault is great, but the real value comes from your partnership. The appliance would not do nearly as much for us without your monitoring and consulting services. You have always been on top of things and there for us whenever there is an incident. I feel confident in that our network is secure and I am able to report that our board and clients with full assurance.
Chris HansfordEducationWeek.org
Previous
Next