Small business is risky business

1 January 2014 Information Security

Millions of small businesses with fewer than 20 employees, ranging from dentist offices, financial advisors, independent legal counsellors, IT consulting firms, and other companies are focused on their core competency and win by that. At the same time many of them can neglect the security of their IT equipment and put their customers, and the future of their business, at risk. Verizon’s 2013 Data Breach Investigations Report, which includes data from worldwide forensic investigations, found that of the 621 data breaches analysed, 193 breaches – more than 30% – occurred at companies with 100 or fewer employees.

A survey conducted by PricewaterhouseCoopers in 2013 for the U.K. Department for Business Innovation & Skills, found a 76% increase with the number of breaches in small- and medium-size firms. Of those small businesses that were attacked in the last 12 months, 15% confirmed unauthorised access to business data was gained, and 9% admitted that intellectual property was stolen. While the amount of money earned from a successful breach of a small business might not be as large as a massive breach of a major corporation, the ease of hacking smaller companies means cybercriminals can simply increase the number of their attacks to collect massive profits.

The results of security oversights for very small businesses can be devastating, and small businesses that provide financial services and healthcare services are among the most highly targeted by cybercriminals. In both sectors, customers trust these businesses with a great deal of sensitive information – medical records, payment and bank details, or other confidential information.

For financial and healthcare service providers, the consequences of such attacks are plentiful, including damage to their business reputations and the loss of angry or worried customers, along with computer network downtime that cripples their ability to function. Small businesses in these sectors also must worry about potential legal action and costly fines if the result of the data breach violated any government and industry regulations.

Financial services industry under siege

Cyber crime has become the second most frequent type of economic crime being experienced by financial services companies, after asset misappropriation, according to PricewaterhouseCoopers. Although financial institutions benefit from regulatory requirements and industry regulations designed to safeguard customer data, very small financial service providers are hindered by limited budgets and lack of expertise when protecting their customer information. Combined with the online connectivity and convenience that most customers demand, these businesses face a challenge. These businesses are obvious targets for cybercriminals that seek to steal stored credit card information, credentials, and bank account details of customers.

For any growing company, successfully earning the account of a well-known business is a milestone in its growth. For small financial service providers, managing the taxes of a local grocery store or helping process payroll for local charities is a sign of growth, and many will list their clients on their websites. But for cybercriminals, this can be an opportunity to attack the smaller business as a way to gain access to the larger clients.

The value of healthcare providers to cybercriminals

As if financial records aren’t sensitive enough, there are few things more sensitive than the healthcare records often stored by small dentist offices, physical therapists, and other independent healthcare providers. An IT security breach in these organisations will not just compromise patient data, but will also undoubtedly damage the trust of any patients.

Cybercriminals have a clear interest in targeting healthcare organisations. A 2012 study released by the Ponemon Institute revealed that 94% of hospitals in the United States had experienced at least one data breach in the previous two years. But cybercriminals aren’t typically interested in reports on patient blood pressure or medication… they are after money. The report found that the information stolen largely consisted of patient billing and insurance records. Identity theft, again for the purposes of stealing money, was a common outcome.

While small healthcare service providers may not have to deal with the volume of patient information found in larger hospitals, the changing nature of patient health records means they aren’t immune to the threat. Healthcare records have become increasingly electronic, and these records can easily make their way onto laptops and mobile devices such as smartphones and tablets. This means that in addition to a flood of sophisticated malware targeting their computers, very small businesses must also take great care to ensure any portable computers and mobile devices containing patient medical records don’t fall victim to physical theft.

What to do

Small businesses of all types, particularly healthcare and financial service providers, must have awareness of the different types of data that include customers’ personally identifiable information (i.e name, addresses, cellphone numbers, etc.); personal health information; customer information (such as credit card numbers and verification codes, billing and shipping addresses, purchasing history, shopping behaviour, etc.).

For small healthcare and financial service providers Kaspersky Lab recommends using a limited number of mobile devices for business purposes. While smartphones and tablets may add some convenience and accessibility, they add many new layers of risk. If any mobile devices are used for business purposes, they must be equipped with anti-theft security features that enable remote locking and wiping of misplaced devices.

Also, data encryption is a vital component of maintaining the security of sensitive data. Encryption is not only a key technology for any mobile device, but it should also be used on desktop and laptop PCs, as well as any file servers. Very small businesses can find straight-forward encryption technology in security that makes it easy to render sensitive data inaccessible to cybercriminals. Also, properly encrypted data will ensure protection from accidental deletion and unauthorised employee access as well. In fact, most financial and healthcare service providers will find that data encryption is required by law.

Small businesses of all types continue to be prime target for cybercriminals, and the more valuable data these businesses hold, the bigger the target they become. A single oversight by the business owner or a bad decision by an employee can allow a breach that can drive most small businesses into ruin, and with so much valuable data to steal, it stands to reason that cybercriminals, like all predators, will continue to attack targets they believe are the weakest to withstand them.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...