Placeholder Image

Subtitles section Play video

  • If you think that your business is completely protected from inbound cyber threats, think again.

  • A study released from the San Diego-based company CyberCatch reveals that more than 30% of U.S. small businesses have weaker security safeguards in place that can be exploited.

  • After scanning for vulnerabilities in more than 20,000 randomly selected U.S. small businesses, CyberCatch found that around 1/3 suffered from spoofing while 28 succumb to clickjacking.

  • Spoofing occurs when a fake IP address is used to masquerade as an authorized device, with the goal of the tapping into a company's private system.

  • A clickjacking attack is a technique used to persuade a user to click on something that looks benign in their browser, when they're actually clicking on something malicious.

  • So what can you do about it?

  • For starters, running anti-malware software on a network's computer is not enough.

  • A hacker could still break through with a phishing attack or another mechanism and access sensitive data.

  • Some of the best practices include identifying your vulnerable data.

  • Small businesses need to locate and identify their most valuable data and assets, keeping an inventory of their highest security needs.

  • Then implement prevention, detection, and response cybersecurity controls.

  • Test your security, run frequent tests of all your systems, which includes websites, software and web applications,

  • to locate any and all security vulnerabilities and patch them before cyber attacker finds them.

  • Frequent training. Train your staff and train them often.

  • According to Cyber Security Intelligence, 90% of security breaches are caused by human error.

  • With these safeguards in place, businesses can be better positioned to fend off attacks coming their way and protect their and their customers' data.

  • Have a topic that you want Inc. to explain?

  • Drop your suggestions in the comment section below and be sure to like and subscribe.

If you think that your business is completely protected from inbound cyber threats, think again.

Subtitles and vocabulary

Click the word to look it up Click the word to find further inforamtion about it