Millions of emails like this are sent on an hourly basis. What’s even worse? Scammers and phishers are becoming more creative every day. When these threats are successful, they can cost your business thousands of dollars. Many companies underestimate the impact of a cyber-attack. Cyber-attacks are often compared to icebergs, seemingly small on the top but danger lurking just beneath the surface. An attack can result in; direct, indirect, and induced losses for the business. A direct loss is the loss that occurs directly from the breach and the immediate after effects. An Indirect loss describes what the breach will cost the business upfront and the costs that will accrue over time. Induced loss are the lasting negative effects from the breach such as a ruined reputation, customer loss and negative press.
To prevent a security breach and protect your business, there are few basic tasks that you can easily complete.
Educate your employees on what threats look like. Let them know they should protect their email address from potentially fraudulent sites, to avoid clicking on links from unknown sources, and to always check the website or login page before entering credentials.
A Microsoft study showed that the top four Cyber Security threats look like:
- Scams that promise free things or coupons (44 percent)
- Fake antivirus alerts that imitate real programs offering virus repair but that download malware instead (40 percent)
- Phishing scams using fake messages that mimic those of trusted businesses to trick people into revealing personal information (39 percent)
- Fraud that features a request for bank information or money upfront from someone (such as a “foreign prince”) who needs help transferring large sums of money for a cut of the total (39 percent)
Minimize the data that you do keep and where you store it. All important information should be properly saved in a secure environment and backed up. Do not store passwords and important information in multiple locations. An abundance of stored information in multiple locations can create multiple entry points for a breach.
Keep software and devices up to date. While updates can seem time consuming or unnecessary, they offer new patches and protection to your devices. Cyber attackers are always creating new tactics and methods, updates are a reactive measure to these.
Using a Multi Factor Authenticator or MFA, such as Microsoft Azure MFA is one of the strongest steps to prevent an attack. MFA is a layered or two step approach to logging in. If a password is compromised, MFA is the second step that could prevent an unwanted visitor from accessing information
If you would like more information on how to protect company from Cyber Attacks, implementing MFA or to see if you company is at risk, contact OnPar Technologies today.