Is My Business a Target for Hackers

Unfortunately, the answer is never going to be no. This article will help explain what makes businesses a more likely target and other’s not.

What are hackers looking for?

  • Customer Lists
  • Price Lists
  • Proprietary Information
  • Schedules
  • Personal Information
  • Blackmail Opportunities
  • Schematics/Plans
  • Policies & Procedures
  • Credentials
  • Opportunities to Deploy Ransomware
  • Payment Information

If your in business you have data that has value.

Who are they?

In the majority of cyber crimes the hackers are:

  • Current Employees
  • Ex-Employees
  • Cyber Criminals
  • Friends
  • Neighbors
  • Family

When asked to explain replacing the janitorial staff with robots:

“What I’m saying is that the human element of human resources is our biggest point of vulnerability. We should start phasing it out immediately.” Happy Hogan “Forehead of Security” – Happy Hogan: Iron Man 3

Robot vacuum cleaner on the floor

The list above isn’t meant to make you paranoid or fuel any existing paranoia. Please don’t fire all of your employees and do not stop talking to your friends and family. We just want to make you aware that cyber crimes statistically come from those closest to the data. The reason for this is quite simple. Most criminals are lazy and cyber crime can be very challenging. When detectives start looking for suspects in any crime, it’s always best to start with those that had access in the first place.

Is My Business a Target?

The vast majority of hackers are lazy. In fact, I would argue they aren’t very smart. In the Matrix, anytime you needed expert knowledge it would just be downloaded directly into your brain. It’s not much different today. If you need to pick a lock, hot-wire a car, or hack into a company’s enterprise server it’s extremely likely that there is a video on YouTube.

“A while back, we were taking over IT operations for a business and the previous IT company was anything but friendly. They gave us a very long password for the server that did not work. After a quick search we found a video on YouTube that showed us how to exploit the system and gain access with nothing more than a laptop connected to the office WiFi.”

The vast majority of hackers that pose a threat to your organization will be looking for easy targets.

Don’t Make Your Business A Target?

The common thief may be stopped by a those cute little security signs, but they don’t work so well when it comes to cyber crime. You’ll have to work a little harder to deter most of the hackers that are coming for your data. The goal here is to make it difficult for them. You’ll want to make sure you organization, at the least, has:

  • Effective Awareness Training
  • Proper Policies & Procedures
  • A Secure Website
  • Top-Notch Email Security
  • Enterprise Endpoint Security
  • A Virtual CISO is a must for larger organizations

It’s Time to Get Secure

You’re ready to take the next step and start taking information security seriously. Let’s get you started with a free evaluation of your current setup and go from there.


Subscribe to Our Newsletter

We send out new articles every week. They'll help keep you informed about important information security topics and news.