What techniques are used in Small Business Hacking attempts?
Business Email Comprimise – when you email account has been attacked – this most often happens in Microsoft 365. This is why it is important to ensure that you have Multi Factor Authentication (MFA) turn on for your account.
We discuss in a fair amount of detail how a local manufacturer lost $24,500 in a compromised account error. These are very sophisticated attacks and can be very costly for businesses. We look at the procedures in our office that minimise the risk of paying invoices incorrectly. This is an incresaingly frequently small business hacking attempt.
Think about whether you need to look at Cyber insurance.
We look at how important application patching is as we discuss a cyber attack on an application. Ensure you have a monthly patching process for your IoT, Operating Systems and Applications.
Ensure your back ups are up to date and tested. You should discuss your Restore Point Objective and your Restore Time Objective – how much data you are prepared to lose and how long you are happy to wait for data to be restored. Also have a think about how far back you might want to restore back from. If an employee deleted emails 90 days ago, you may not be able to restore them.
To avoid email phishing attack, have a look at this video –
Have a look at the Australian Cyber Security Centre’s Essential 8 guidelines.
We discuss what tools and tactics hackers are using and the best ways that hackers can defend their networks.
For Small Business IT Support visit our IT Company, Extreme Networks.
For Small Business Strategy and Tactics, visit Sun Tzu 4 Small Business.