{"id":2570,"date":"2021-01-20T10:06:16","date_gmt":"2021-01-20T18:06:16","guid":{"rendered":"https:\/\/www.aiminsight.com\/blog\/?p=2570"},"modified":"2021-01-20T10:06:18","modified_gmt":"2021-01-20T18:06:18","slug":"threats-to-small-businesses-2021","status":"publish","type":"post","link":"https:\/\/www.aiminsight.com\/blog\/uncategorized\/threats-to-small-businesses-2021\/","title":{"rendered":"8 Threats to Small Businesses in 2021"},"content":{"rendered":"\n<p>We still see the same scene in horror movies: the main character runs into the house, slams the door, locks the deadbolt and sighs in relief, no threats in sight \u2014 but somehow the killer still sneaks up and attacks them from behind!<\/p>\n\n\n\n<p>If you own a small business you just might find yourself in a similar situation. Small business owners spend large amounts of time and resources physically protecting their operations. Just to let the most dangerous threats sneak in through the <em>figurative<\/em> back door.<\/p>\n\n\n\n<p>Today we\u2019re going to talk about the 8 biggest security threats to small business in 2021, in no particular order. While a few of them are new, some past risks are still very relevant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h3>\n\n\n\n<p>Not only is this the number one threat to cybersecurity, it&#8217;s also still on it\u2019s way up. Phishing attempts were reported by 48% of small businesses in 2017 \u2014 up from 42% just one year prior. All indications point to this trend rising as it requires the least amount of resources and knowhow to attempt.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Microsoft Document Scams<\/strong><\/h3>\n\n\n\n<p>There\u2019s nothing safer than opening up a Word document, right? Think again! In the past few years, scammers have gotten creative with coding that allows them to gain access to your computer. This is why Microsoft has been having to work overtime to create new patches. However, since many companies delay updating their software, this remains a prime option for criminals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h3>\n\n\n\n<p>Currently, over 1,100 different variations of ransomware are being tracked around the world. The FBI has stated that there has been a sharp uptick in these attacks recently and they advise that the practice will continue to grow rapidly the coming years. So far this year, not just businesses, but entire cities have paid ransoms to get their data back. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cryptojacking<\/strong><\/h3>\n\n\n\n<p>As cryptocurrencies such as Bitcoin have exploded on the scene, their demand and value have gone up as well. Although you can\u2019t physically mint a Bitcoin as you could a dollar bill, they are \u201ccreated\u201d in a process known as mining. This is a resource-intensive practice that requires computing power that thieves often lack. The solution? Hijack other computer systems to do the computing for them, taking a toll on bandwidth and slowing down networks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Internet of Things (IoT) Attacks<\/strong><\/h3>\n\n\n\n<p>Technology is rapidly increasing. Not just in computing devices, but in everything that\u2019s <em>become<\/em> a computing device. With IoT technology, you can connect your servers to your security system, HVAC system \u2014 even the microwave in your break room! This allows everything to be connected and consolidated in one place, but it also creates vulnerabilities. Most of these devices have very weak security protocols in place: who would want access to the toaster in the office next door? But as they are often connected to the main network, it creates a backdoor that <em>can<\/em> \u2014 and has repeatedly <em>been<\/em> \u2014 exploited.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mobile Devices<\/strong><\/h3>\n\n\n\n<p>Many small businesses feel safe doing business on their mobile devices only to have them be one of their weakest points. Most of us have been lectured about using unsecured Wifi <em>ad nauseam<\/em>. But, the most recent threat to mobile computing is our reliance on the Cloud. In the past few years, companies such as Apple, Google, and Microsoft have made cloud backups a standard part of their services. It creates a prime target for criminals to attack and gain access to your information since its all<mark> stored in one location<\/mark>. While that may not be a problem if you\u2019re just backing up family photos or text messages from your sister, any important documentation or other data for your business may have also found its way onto these mega servers without you even realizing it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Undertrained Employees<\/strong><\/h3>\n\n\n\n<p>What has been mentioned to this point is just a sample of the ever-evolving external cyber threats to your business. While an easy fix might be to hire someone who just graduated from a reputable university, truth is, that may not be enough. A recent study showed that 40% of companies surveyed said that having employees with an applicable degree has shown <em>not to be good enough <\/em>to keep their systems safe. That same survey showed that less than 25% of applicants for cybersecurity positions were deemed qualified. If that\u2019s how things look in your company, you may feel safe today, but might be in danger for what\u2019s coming. Training someone to do the job well is estimated to take over six months!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Understaffed Security<\/strong><\/h3>\n\n\n\n<p>In line with the last point, an estimated 69% of companies will have an understaffed cyber threats team. A large portion of this being companies with absolutely no one in this role at all. What does this mean for a small business? Either people with no experience will have to fill this position, or there is nothing in place to protect valuable data from hackers.<\/p>\n\n\n\n<p>The killer hiding in the back seat, sneaking in through the back door, or \u2014 even worse \u2014 <em>he\u2019s already in the house, <\/em>are all clich\u00e9s. Do you know what else is clich\u00e9? Letting your small business fall victim to cyber-attacks. Not all attacks are avoidable. However, you\u2019re much safer from attacks if you\u2019re prepared. Updated security software and regular data back-ups are invaluable in this process. Awareness of the latest threats is also key. Just like in the movies; when a killer is loose, no one should feel safe. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.aiminsight.com\/contact\/\">Contact us<\/a> today for more advice on how to keep your small business protected. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>We still see the same scene in horror movies: the main character runs into the house, slams the door, locks the deadbolt and sighs in relief, no threats in sight \u2014 but somehow the killer still sneaks up&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2570","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/posts\/2570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/comments?post=2570"}],"version-history":[{"count":5,"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/posts\/2570\/revisions"}],"predecessor-version":[{"id":2577,"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/posts\/2570\/revisions\/2577"}],"wp:attachment":[{"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/media?parent=2570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/categories?post=2570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aiminsight.com\/blog\/wp-json\/wp\/v2\/tags?post=2570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}