Small business is risky business

1 January 2014 Information Security

Millions of small businesses with fewer than 20 employees, ranging from dentist offices, financial advisors, independent legal counsellors, IT consulting firms, and other companies are focused on their core competency and win by that. At the same time many of them can neglect the security of their IT equipment and put their customers, and the future of their business, at risk. Verizon’s 2013 Data Breach Investigations Report, which includes data from worldwide forensic investigations, found that of the 621 data breaches analysed, 193 breaches – more than 30% – occurred at companies with 100 or fewer employees.

A survey conducted by PricewaterhouseCoopers in 2013 for the U.K. Department for Business Innovation & Skills, found a 76% increase with the number of breaches in small- and medium-size firms. Of those small businesses that were attacked in the last 12 months, 15% confirmed unauthorised access to business data was gained, and 9% admitted that intellectual property was stolen. While the amount of money earned from a successful breach of a small business might not be as large as a massive breach of a major corporation, the ease of hacking smaller companies means cybercriminals can simply increase the number of their attacks to collect massive profits.

The results of security oversights for very small businesses can be devastating, and small businesses that provide financial services and healthcare services are among the most highly targeted by cybercriminals. In both sectors, customers trust these businesses with a great deal of sensitive information – medical records, payment and bank details, or other confidential information.

For financial and healthcare service providers, the consequences of such attacks are plentiful, including damage to their business reputations and the loss of angry or worried customers, along with computer network downtime that cripples their ability to function. Small businesses in these sectors also must worry about potential legal action and costly fines if the result of the data breach violated any government and industry regulations.

Financial services industry under siege

Cyber crime has become the second most frequent type of economic crime being experienced by financial services companies, after asset misappropriation, according to PricewaterhouseCoopers. Although financial institutions benefit from regulatory requirements and industry regulations designed to safeguard customer data, very small financial service providers are hindered by limited budgets and lack of expertise when protecting their customer information. Combined with the online connectivity and convenience that most customers demand, these businesses face a challenge. These businesses are obvious targets for cybercriminals that seek to steal stored credit card information, credentials, and bank account details of customers.

For any growing company, successfully earning the account of a well-known business is a milestone in its growth. For small financial service providers, managing the taxes of a local grocery store or helping process payroll for local charities is a sign of growth, and many will list their clients on their websites. But for cybercriminals, this can be an opportunity to attack the smaller business as a way to gain access to the larger clients.

The value of healthcare providers to cybercriminals

As if financial records aren’t sensitive enough, there are few things more sensitive than the healthcare records often stored by small dentist offices, physical therapists, and other independent healthcare providers. An IT security breach in these organisations will not just compromise patient data, but will also undoubtedly damage the trust of any patients.

Cybercriminals have a clear interest in targeting healthcare organisations. A 2012 study released by the Ponemon Institute revealed that 94% of hospitals in the United States had experienced at least one data breach in the previous two years. But cybercriminals aren’t typically interested in reports on patient blood pressure or medication… they are after money. The report found that the information stolen largely consisted of patient billing and insurance records. Identity theft, again for the purposes of stealing money, was a common outcome.

While small healthcare service providers may not have to deal with the volume of patient information found in larger hospitals, the changing nature of patient health records means they aren’t immune to the threat. Healthcare records have become increasingly electronic, and these records can easily make their way onto laptops and mobile devices such as smartphones and tablets. This means that in addition to a flood of sophisticated malware targeting their computers, very small businesses must also take great care to ensure any portable computers and mobile devices containing patient medical records don’t fall victim to physical theft.

What to do

Small businesses of all types, particularly healthcare and financial service providers, must have awareness of the different types of data that include customers’ personally identifiable information (i.e name, addresses, cellphone numbers, etc.); personal health information; customer information (such as credit card numbers and verification codes, billing and shipping addresses, purchasing history, shopping behaviour, etc.).

For small healthcare and financial service providers Kaspersky Lab recommends using a limited number of mobile devices for business purposes. While smartphones and tablets may add some convenience and accessibility, they add many new layers of risk. If any mobile devices are used for business purposes, they must be equipped with anti-theft security features that enable remote locking and wiping of misplaced devices.

Also, data encryption is a vital component of maintaining the security of sensitive data. Encryption is not only a key technology for any mobile device, but it should also be used on desktop and laptop PCs, as well as any file servers. Very small businesses can find straight-forward encryption technology in security that makes it easy to render sensitive data inaccessible to cybercriminals. Also, properly encrypted data will ensure protection from accidental deletion and unauthorised employee access as well. In fact, most financial and healthcare service providers will find that data encryption is required by law.

Small businesses of all types continue to be prime target for cybercriminals, and the more valuable data these businesses hold, the bigger the target they become. A single oversight by the business owner or a bad decision by an employee can allow a breach that can drive most small businesses into ruin, and with so much valuable data to steal, it stands to reason that cybercriminals, like all predators, will continue to attack targets they believe are the weakest to withstand them.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
NEC XON disrupts sophisticated cyberattack
Information Security
NEC XON recently showcased its advanced cyberthreat detection and response capabilities by successfully thwarting a human-operated ransomware attack targeting a major service provider.

Read more...
What’s your cyber game plan?
Information Security
“Medium-sized businesses are often the easiest target for cyber criminals, because they are just digital enough to be vulnerable, but not mature enough to be fully protected," says Warren Bonheim, MD of Zinia.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.