Threatucation Logo
CALL US
302-537-4198
Creating a Culture of Cyber Security in small- to mid-sized organizations
  • Home
  • Services
    • Risk Assessment
    • Security Policies
    • Security Awareness Training
    • Scam Support
    • Cyber Security Solutions
    • Backups
  • Security Awareness Training
  • Testimonials
  • About
  • Blog
  • Reports
  • Contact

You’re Still Not too Small

May 13, 2021 by Eric Magill

A Ransomware attack on your small business might not cause oil and gas shortages over a wide swath of the country, but rest assured cyber criminals want to exploit the files and data you have worked so hard to develop and maintain for their own profit.

In fact, reported Homeland Security Secretary Alejandro Mayorkas on May 13, small businesses now account for 50 percent to 75 percent of Ransomware attacks.

Ransomware attacks increased 300 percent in the past year as Ransomware gangs extorted and blackmailed $350 million from businesses through encryption of their data and then stealing that data and threatening to expose it to the public.

The plague has become particularly acute in industries that rely on their data to operate and are considered to be “one-stop shopping” for most if not all of the data hackers need to commit a wide variety of crimes ranging from financial to medical fraud.

Think data-intensive companies like accountants, law firms, and healthcare practices. If you run a small business in those industries, you should:

  • Layer multiple defenses on your network including anti-virus, firewalls, third-party threat hunters
  • Provide Cyber Security Awareness Training to you and your employees
  • Obtain cyber insurance to cover potential damages.

Understand that criminals don’t need to be computer geniuses or even know how to write a virus to commit their crimes. Dark Side, the group believed behind the Colonial Pipeline attack, sells Ransomware as a Service to make the job easier for other criminals. That makes for a lot of potential criminals and a lot of potential victims.

If you need help fortifying defenses or Cyber Security Awareness Training for you and your employees, call 302-537-4198 or email me personally at ericm@flexitechs.com.

Filed Under: cyber security, Security Awareness Training, Social Engineering Tagged With: #cybersecurity, accounting, healthcarepractice, lawfirms, medicaloffice, ransomware, securityawarenesstraining, socialengineering

Share:

Cyber Security Tips for Protecting Law Firms

March 31, 2021 by Eric Magill

We’ve just produced another eBooklet, this one designed specifically for law firms but with a couple tidbits that also apply to other types of businesses that handle sensitive data.

This one, “Five Strategies for Lawyers to Mitigate Cyber Security Risks”, highlights the following five tips that you may not have thought about to prevent cyber criminals from profiting off of your hard work:

  1. Securing Your Mobile Devices
  2. Always Being on Guard
  3. Exercising Care with Autocomplete
  4. Insufficient Network Protection for the types of sensitive data lawyers handle
  5. Making Hackers’ Jobs Harder

To secure your FREE copy of this booklet, click the link below:

https://lp.constantcontactpages.com/su/DPjZTx9

For more information about Threatucation’s Cyber Security Awareness Training services, give us a call at 302-537-4198 or email us at info@threatucation.com or fill out the Contact form on this page.

Filed Under: cyber security, Security Awareness Training, Social Engineering

Share:

Security Awareness not Just for Employees

March 1, 2021 by Eric Magill

An article I read this morning on one of my security web sites reminded me of the need for small business executives to understand that when it comes to cyber security awareness, they are also employees — but with a twist — they hold the keys to the kingdom.

While a higher percentage of CEOs and business owners now recognize the threats small organizations face from hackers than they used to, it is likewise true that cyber criminals have recognized the value of attacking them directly because they have access to the most sensitive information a company handles.

The article I read pointed to a discovery by researchers at the security software developer Trend Micro that found that 45 percent of the phishing attacks they studied directly targeted the CEO’s email address rather than everyone in the organization (anecdotally, I have seen an increase in direct attacks on CEOs, as well).

Also known as “whaling” because the CEO is considered the big fish in a company, that’s almost as many attacks against the CEO as everyone else in those organizations combined. Managing Directors and Chief Financial Officers are also frequently targeted at 9.7% and 4.8%, respectively.

What makes this important is that I encounter executives who at times consider themselves to be almost immune to the attacks their employees face.

From the article, quoting Ryan Flores of Trend Micro, CEOs and other top executives sometimes view email security mechanisms or policies as “an inconvenience to them” and because of that, they behave like they are “an exception to the rule.”

I offer this blog less as an admonishment of SMB executives as a reminder that they, too, are as susceptible to Social Engineering attacks like phishing and whaling emails as their employees. Executives need to be even more vigilant, though, as these attacks increasingly focus on them specifically and the sensitive nature of what they know and have access to.

To create a culture of Cyber Security that starts from the top down in the hierarchy of your organization, contact me personally at ericm@threatucation.com or 302-537-4198 to discuss a Cyber Security Awareness Training program tailored to you and your employees.

Filed Under: cyber security, Security Awareness Training, Social Engineering Tagged With: #cybersecurity, security awareness training, securityawareness, social engineering

Share:

Cautionary Tales for SMBs from Hacked Water System

February 17, 2021 by Eric Magill

As you probably read or heard last week, the small city of Oldsmar, Florida, population 13,500, narrowly escaped a disaster from a cyber attack.

A hacker manipulated the Lye ratio in the water system of the city near Tampa using the remote access tools the city’s water department deploys to remotely manage the chemicals that make the city’s water safe to drink.

The story doesn’t tell us as much about the vulnerability of our nation’s critical utilities, however, as it does about what can happen when municipalities and businesses cut corners on the technology they use.

Oldsmar turned out to be fortunate in this case.

First, the hacker chose to access the system during working hours in full view of on-site staff, who immediately alerted their superiors to the attempts to drastically change the lye content in the water. Had the hacker attempted to do this after hours, the problem might not have been caught until the next morning.

Second, the water plant still remotely accesses the system with Windows 7 32-bit computers a year after Microsoft retired that operating system and declared it unsafe, but that was the least of the plant’s security transgressions.

The computers used to access the plant’s treatment control system shared the same password for remote access. In addition, all appeared to be directly connected to the Internet without a firewall.

Budget concerns justifiably come into play with cyber security measures at small municipalities, just as they do for small businesses.

But using different passwords, changing them from time to time, installing a firewall, and implementing multi-factor authentication offer low-cost protection that any organization can afford.

Another cost-effective measure would be cyber security awareness training for employees and management.

For information on what a security awareness training program can do for your business, visit https://threatucation.com, call me at 302-537-4198, or email me at ericm@threatucation.com.

Filed Under: cyber security, Risk Assessments, Security Policies Tagged With: #cyberattack, #cybersecurity, municipality, remoteaccess

Share:

Five Tips to Strengthen Security in Your Law Firm

February 3, 2021 by Eric Magill

No profession depends more on the confidentiality, integrity and availability of its data than law firms.

The information they collect forms the basis of all of their cases. Without it, they can’t represent their clients.

Because of the nature of that data, which includes PII, PHI, confidential and proprietary information, not to mention potentially embarrassing revelations, attorneys will be in the crosshairs of cyber criminals for the foreseeable future.

In fact, an analysis of public records by Law360 found that nearly 50 law firms reported data breaches in 2020 and that most were small and boutique firms. And that’s not all …

“There are probably many more attacks than what you’ve listed here. They just have not been documented in any official way,” said Claudia Rast, co-chair of the American Bar Association’s cyber security legal task force, to Law360.

The overwhelming majority of the 50 breaches (80%) was caused by human error or insider incidents.

To strengthen your firm’s security, consider the following five tips:

  • Secure Your Mobile Devices with Passcodes, Biometric fingerprint access, and Encryption
  • Create a culture of cyber security in your firm with policy-based Security Awareness Training
  • Watch Autocomplete in Emails to avoid inadvertently sending an email to the wrong person
  • Ensure remote devices and computers get the same protection at home and on the road as in the office
  • Consider multi-factor authentication on critical entry points to your network, such as computer logins, to prevent criminals from accessing it with a stolen user name and password caught up in a data breach that had nothing to do with your firm

Filed Under: cyber security, Security Awareness Training, Security Policies, Social Engineering Tagged With: #cybersecurity, databreach, lawfirms, securityawareness

Share:

Test Your Backups Regularly

January 31, 2021 by Eric Magill

Most businesses back up their data frequently. Some even back up to multiple locations in the event of a fire, hard drive failure, natural disaster, or theft.

But few realize the cyber security implications of TESTING your backups to ensure they work if you need to recover critical files or data after a Ransomware attack.

Backups fail anywhere between 5% to 25% of the time depending on the backup service used according to the research firm Gartner. Backups fail either in the backup process or in the recovery process.

If you have a Managed IT Services Provider, your backups should not only be monitored for failures but also tested regularly to ensure that files restore successfully when needed. The last thing you want is to end up in negotiations with the hackers after learning your backups won’t restore your files.

If testing your backups was not discussed when you signed up for an automated backup plan, or you simply don’t know if they are tested, ask your backup provider or backup software company if they are and if not, how to do this.

Backups should be tested on a regular schedule like this:

  • At least once a month, pick a random backup version date and restore a handful of files to see if they restore successfully (be careful not to restore over the current version of those files)
  • At least once a quarter, perform a deeper restore operation of numerous files from different backup dates, again being careful not to overwrite the current versions of your files
  • At least once a quarter, check all files in the most recent backup to be sure that you are backing up all files that you would need to restore
  • On a daily basis monitor your backups for failures. Any good backup software will let you know whether the backup succeeded or failed with an email or within the software itself
  • If you see errors at any stage of the backup or restore processes, resolve those issues or have your IT or backup service resolve them for you.

Keep in mind that if your data is critical to the operation of your business, you should perform the steps above more frequently to minimize the risk of partial or complete data loss when you need to restore from your backups.

For help implementing a backup testing program or an automated backup program if you don’t have one, call 302-537-4198 or email me personally at ericm@flexitechs.com.

Filed Under: Backups, cyber security Tagged With: #cybersecurity, backups, ransomware

Share:

Meet With Us!

Schedule an Online Meeting with Threatucation to start developing a Culture of Cyber Security in your organization.

Latest News

  • You’re Still Not too Small May 13, 2021
  • Cyber Security Tips for Protecting Law Firms March 31, 2021
  • Security Awareness not Just for Employees March 1, 2021
  • Cautionary Tales for SMBs from Hacked Water System February 17, 2021

FOLLOW US

Contact Us

Form for requesting a free cyber security risk assessment.

Copyright © 2022 · Threatucation