{"id":2994,"date":"2017-01-27T12:21:18","date_gmt":"2017-01-27T20:21:18","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=2994"},"modified":"2017-01-27T12:21:18","modified_gmt":"2017-01-27T20:21:18","slug":"cyber-attacks-growing-threat-small-business","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/cyber-attacks-growing-threat-small-business\/","title":{"rendered":"Cyber attacks are a growing threat to small business"},"content":{"rendered":"

\"ware_voyager_edge_rgb_screen_26jan15-s\"<\/p>\n

 <\/p>\n

Cyber criminals have set their sights on small businesses. Over the last five years, there has been a steady increase in attacks targeting businesses with less than 250 employees, reports Symantec in its \u201c2016 Internet Security Threat Report.\u201d<\/a>\u00a0 Symantec\u00a0 points out that the number of spear phishing campaigns against small businesses, in which an attacker tries to\u00a0 exploit an organization by sending an infected document attached to an email, grew each year from 18% in 2011 to 43% in 2015, although many of the attacks were directed to fewer organizations.<\/p>\n

The report concludes that 1 in 40 small businesses are at risk of being the victim of such a cyber crime. That figure still is much less than the 1 in about 2.7 large businesses that are targeted every year with multiple spear fishing attacks. However, Symantec says the numbers indicate that businesses of all sizes are vulnerable and that hackers are just playing the “long game” with larger companies.<\/p>\n

In part, because they have smaller IT budgets and so spend less on cyber security; small businesses may be more vulnerable to the growing risk of cyber crime. In 2015 Symantec discovered more than 430 new unique pieces of malware, up 36% from the year before. Still, the increase in spear fishing attacks directed at small businesses clearly shows that these attacks are intentionally directed at smaller organizations, Symantec points out.<\/p>\n

Since all businesses are vulnerable to attacks, being aware of the potential threat is critical. To minimize risks, every small business team member needs to do their part to protect company and customer data. Security measures should include:<\/p>\n

Create strong passwords:<\/strong> A strong password should be at least eight characters and include a combination of upper and lower case letters, numbers and symbols. Also passwords should be changed every 90 days at a minimum.<\/p>\n

Put up a firewall:<\/strong> Firewalls protect network traffic and can stop hackers from getting data by blocking certain websites. Small businesses also can program a firewall to restrict what company data and emails can be sent.<\/p>\n

Install antivirus software:\u00a0 <\/strong>Antivirus and anti-malware software programs should be installed and kept\u00a0 to date with the latest versions that include protection against new malicious programs.<\/p>\n

Encrypt data:<\/strong> Encryption software can be used to alter information into unreadable code to protect financial information and customer data.<\/p>\n

Protect mobile devices<\/strong>: Users should be required to password protect their mobile devices, encrypt their data, and never access proprietary company data over public Wi-Fi. Company cyber security guidelines also should include instructions for reporting lost or stolen equipment. Installing remote wipe apps that delete data from a mobile device after a pre-specified number of failed log-in attempts or moves outside of a defined geography is another precaution to prevent data compromise.<\/p>\n

Update browsers<\/strong>: The latest browser versions should be installed to avoid watering holes, which is malicious code installed on trusted websites. .<\/p>\n

Secure the Wi-Fi network:<\/strong> A strong admin password should be set on the router and periodically changed along with a strong passphrase to encrypt the network.<\/p>\n

Train employees on security:<\/strong> A written security polity\u00a0 should be in place to protect data, which everyone on the small business team must read and be sure to understand.<\/p>\n

Secure calls with DECT compliant headsets<\/h4>\n

As small businesses establish procedures to protect confidential information, they should also consider protecting calls against eavesdropping. To this end, many headsets are based on the Digital Enhanced Cordless Telecommunications (DECT) standard. Originally used to connect cordless phones (handsets) to a base station, DECT nowadays also is used to establish a wireless communication link between a headset and desk phone, mobile phone or computer to make and receive calls.<\/p>\n

Security is one of the strong points of DECT technology. It uses a layered system, which includes subscription, encryption and authentication to ensure a very high level of protection against eavesdropping. Certain industries, such as healthcare and finance, require DECT-based wireless communications for maximum security and confidentiality.<\/p>\n

To learn about Plantronics DECT Security Certified Products, download Plantronics white paper<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

  Cyber criminals have set their sights on small businesses. […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[510],"tags":[979,1301,1356,1357],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/2994"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=2994"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/2994\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=2994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=2994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=2994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}