Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 25 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Too small for cyber security? Think again.

by The Gurus
October 21, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

By: Chris Stoneff, VP Technical Management, Lieberman Software
The last Verizon Data Breach Investigation Report stated that 63% of data breaches involved cyber criminals using weak, default or stolen passwords to access information they shouldn’t.  With this in mind, it’s good to remember that being a small business is no excuse for poor password security.  This is especially so when it comes to the administrator passwords that protect access to the most sensitive areas of a company’s network, like file stores and corporate email.  When these credentials are compromised by bad guys, it is easier for them to move around the network and infiltrate critical systems and even gain access to your valuable customer data.
Stolen credentials are one of the easiest ways to exploit small businesses. Many Small and Medium Enterprises (SMEs) may think they don’t have the budgets or the means for effective cyber security. However, small businesses that think they are too insignificant to warrant proper cyber security efforts need to carefully consider who their customers are and how unhappy they would be if their data was compromised.  When we look back at Target, one of the biggest data breaches of all time, the breach was discovered to have come through one of Target’s small third party vendors with weak passwords that never changed.
At a bare minimum, companies need to make sure that employees rotate passwords and don’t use the standard ones they use for their personal online accounts.  Passwords should be strong – more than 8 characters and include upper and lower case characters as well as numbers.
For those that struggle with endless strings of passwords, there are also affordable Privileged Account Management products that can automate time-consuming manual password changes to ease IT administration burdens. By changing passwords faster than intruders can exploit them, these security products provide real-time containment of attacks that breach the perimeter, and prevent anonymous “nesting” on the network.
Large enterprises are taking cyber security seriously and getting harder to breach.  Hackers historically always take the path of least resistance, if that path is via a smaller business with tempting customers, you better believe they will take the easy route. Getting a few basics right, like password security, will go a long way to protecting even the smallest business.
www.liebsoft.com

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Google pays $100k to anti-malware crusader Giovanni Vigna

Next Post

Is it worth reporting ransomware?

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information