top of page
Search
  • rbenack4

Keeping Your Small Business Secure in Cyberspace - Part I



The devastation of an attack on a small or medium sized company can shut down all operations and result in massive losses.


Small to Medium sized businesses are highly susceptible to hackers and cyberthreats because they often lack the resources many larger companies have to fight cybercrime


Social Engineering

Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems.


Phishing = Fake Email

Phishing: an apparent ‘trustworthy organization or person’ asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords. Its the most common way to hack a company

Example of Phishing email



Pharming = fake web pages


An email link provided in an e-mail leads to a fake webpage which collects important information and sends it to a criminal.

  1. The fake web page looks like the real thing (e.g. your bank webpage)

  2. Its goal is to collect business bank account information and then send it to criminals who can then drain your bank account.



Example of Pharming email



The Fraud Problem

  1. Organizations lose 5-6% of revenue annually due to internal fraud. This = $652 Billion in U.S. (2006)

  2. Average fraud scheme lasts 18 months, costs an organization$159,000

  3. 25% of all fraud costs exceed $1M

  4. Smaller companies often suffer greater average financial losses than large companies because they often lack the resource to discover it.

  5. The fraud threat can come from both inside (employees) & outside (customers, hackers) of the company



If your organization has concerns or questions about protecting itself from cyberthreats, you can contact us at: Contact | HiPerformance Security and Investigations (hiperformanceinvestigations.com

„

„Most common way to hack a company




5 views0 comments

Comments


bottom of page