Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/wrigglesecurity/public_html/wp-includes/script-loader.php on line 706

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/wrigglesecurity/public_html/wp-includes/script-loader.php on line 706

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/wrigglesecurity/public_html/wp-includes/script-loader.php on line 707

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/wrigglesecurity/public_html/wp-includes/script-loader.php on line 707
Small And Medium Sized Businesses - Wriggle Security

Small And Medium Sized Businesses

SMALL AND MEDIUM SIZED BUSINESSES

 

16/10/17

 

Small and Medium sized businesses (SMEs) are becoming easier for hackers to target, this is due to them not having sufficient security defences put in place. Despite nearly three quarters of SMEs came under attack in the past year.

 

WHY ARE SMES A TARGET?

 

SMEs are a target due to the fact they don’t believe they are a target in the hacker’s eyes. Most SMEs believe that hackers are not bothered about small businesses and only focus on the bigger companies. However, this couldn’t be more wrong, as hackers pray on this and attack these companies.

 

SMEs tend to have less protection on their IT systems, making it easier for them to become under attack, and help the hackers gain access to their companies’ data.

 

The Federation of Small Businesses (FSB) found that only one quarter of SMEs have a strict password policy, making it easier for hackers to gain access into SMEs IT systems rather than the bigger companies who would tend to have more protection.

 

WHAT IS THE MOST COMMON TYPE OF ATTACK?

 

The FSB found that the most common types of attacks on SMEs are phishing emails, malware attracts and ransomware.

 

Phishing emails are a way of accessing your identity. An email will come through to your business email, asking you to update a piece of information. The email will look legitimate with a link enabling users to follow through onto a page which they believe is to update their information.

 

Whereas it is actually a page which the hackers have created enabling them to intake all the personal data the customer has provided. This is a simple yet effective way for the hackers to gain access to your information. Therefore, make sure you know it is a legitimate website and one which you know and trust before you start entering personal and confidential information.

 

Malware attacks occur if someone clicks on a link or downloads a file unknowingly, which will allow the hackers to gain access into the device. This is something which someone may do without even knowing, and allowing the hackers to intrude in your companies’ system to either steal information, extract money or send unwanted advertising from your companies’ brand.

 

Ransomware attacks happen when a hacker takes control of your IT system, enabling them to undertake any action they wish on the companies’ system. They will then ask for a ransom in return for the full access of the IT system back. This makes it extremely hard for SMEs to gain back the full system as they don’t have the money required.