BRAND VISIBILITY 2019

The CloudTweaks brand visibility 2019 program provides a number of terrific opportunities to help leverage your brand and service bringing it to the forefront of the technology world. We provide sponsorship, lead generation services, custom content packages, blog management and promotion. Contact us for a quote!

cybersec

Ransomware, Backups and the Aging IT Specialist

Small Business Cloud

Right now, two technology trends characterize the small business ecosystem: a growing migration to the cloud, and a growing susceptibility to cybercrime, particularly in the form of ransomware.

Recently, I discovered this duality firsthand. Stranded at the local ski resort, I got a ride down from a fellow snowboarder named Dan. Dan is a salesman for a small business selling signage. According to Dan, his company’s data was hijacked by hackers and held for ransom. The ransomware was embedded in an email opened by one employee. The small business owner has a longstanding relationship with an aging IT specialist, who hadn’t backed up any of the company’s information on the cloud. It was all sitting on hard drives, and suddenly, they weren’t able to access any of it. They paid the ransom to get the data back because, really, what else could they do?

In 2015, about 50% of cyberattacks worldwide hit small businesses. Small businesses can be unsuspecting, and invest less in cybersecurity than large corporations. Hackers can attack more than one small business at a time, and increasingly, they’re doing this with ransomware. For hackers, ransomware is simple and lucrative. There’s no need to ferret out financial data and resell it, or interact with banks. All it takes is one employee to open a file containing malware. Then, thieves can potentially get a payout directly from the business whose livelihood is at stake.

This comes at a time when small businesses are increasingly seeking ways to be more competitive with cutthroat giants like Amazon and Walmart. Out of Quickbooks’ ways to increase small business profits, the top two are:

  • Go paperless
  • Switch to electronic forms and filing

As small businesses heed this advice, hackers lineup to block their access to files. In an interview with NBC, the executive security director of IBM Security Limor Kessem says, “It’s like some sort of gold rush. Cybercriminals are using ransomware to bring extortion to the masses and more criminals are now doing it because they’re interested in getting a piece of the action.” Ransomware payments reached an estimated $1 billion in 2016, up from $24 million in 2015. At the same time, small businesses were hit with eight times more attacks in 2016 than in 2015. According to a study from IBM, only 30% of small businesses offer cybersecurity training to their employees, which makes them more vulnerable.

When I talked to Dan, the salesman whose company eventually paid a data ransom, he felt that if his company’s data had been backed up to the cloud, they could have avoided paying the ransom. “The cloud is where a lot of businesses our size are going anyhow,” he said. Turns out he’s dead on the money.

Small business, the cloud, and security

About 78% of small businesses will adapt their operations to cloud by the year 2020, up from the nearly 40% that are already there. One primary reason for this is the convenience of SaaS; another is “Hives”, groups of individuals who collaborate virtually from remote locations, some freelance, others part of the core unit. The desire to compete head-to-head with big business is also driving this trend.

But is the cloud safe from ransomware? Depends. Brian Krebs details the story of an acting agency for children that fell prey to a cloud ransomware scheme. The firm had all their applications and data hosted on a private managed cloud solution. Here again, ransomware struck through email. An employee opened an attachment that looked like an invoice, and the company was no longer able to access more than 4,000 files. Fortunately, the cloud provider was also providing backup. The firm was able to get their files back, but it took nearly a week. The attack also affected other clients on the same server.

If cloud files aren’t backed up, they’re vulnerable. Cloud hosting and storage alone won’t do the trick. Eastern Kentucky University identifies attacks on cloud services as one of the looming threats in cybersecurity. EKU identifies seven components of cybersecurity which can be seen in the featured image.

Anti-malware specifically targets infections, such as ransomware. Anti-malware applications run files in an emulator, testing them for threats with a behavioral assessment in the application, and in the cloud. There are security applications for mobile phones, too–highly recommended if employees conduct any sort of business on their phones. Note that cybersecurity training is also critical. If small businesses are going to invest more of their resources in the cloud, security training will be a prerogative. In order for small businesses to compete with big businesses, they will need to compete in the training arena as well.

By Daniel Matthews

Daniel Matthews

Daniel Matthews is a freelance writer from Boise, ID. Daniel received his Bachelor's in English from Boise State University in 2006, and is currently working on a book about the 2008 financial crisis. Widely-published online, he specializes in research and analysis that sheds light on the intersection of tech, business, and current affairs. Daniel is an avid writer and technology enthusiast whose mission is to bring journalistic integrity and informed opinions to his audience in ways that make them think differently about the world. You can find him on Twitter and LinkedIn.

View Website

Battling Bandwidth: How to Make the Most of Collaboration Technology with What You’ve Got

Battling Bandwidth: How to Make the Most of Collaboration Technology with What You’ve Got

Collaboration Technology As collaboration technology adoption grows, high-definition (HD) video has become the industry standard and has replaced the traditional, ...
David

De-Archiving: What Is It and Who’s Doing It?

De-Archiving I first heard the term “De-Archiving” a few months ago on a visit to a few studios in Hollywood ...
Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! Move over chatbots - it is time for the empathetic bot. Say ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...
Technology Cloud Contributor

The Competitive Cloud Data Center

The Competitive Cloud The corporate data center was long the defacto vehicle for all application deployment across an enterprise. Whether ...
Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...

Cloud Supporters

infosec

Mind The Gap: Cybersecurity In Corporate Training

Cybersecurity In Corporate Training Over the years, I have had the opportunity to travel often for my career. Of all the cities I’ve visited, London is one of my favorites. On a recent visit, one thing became overwhelmingly clear; The city aims to build awareness in its
Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors For technology-loving millennials, robo-advisors may seem appealing. With a robo-advisor, a portfolio is managed online by using software algorithms instead of a real person. It makes sense millennials would flock to robo-advisors, but they’re not, according to a LendEDU study. The

"Top 100 Brand Influencer, Cloud”
-ONALYTICA

"Best Cloud Computing Blog"
-SYSADMIN MAGAZINE

"Top 10 Sites For Cloud Computing"
-DIGITALISTMAG SAP

"Top 10 Cloud Computing Blogs”
-MARKETING ENVY

"Top 25 Must Read Cloud Blogs"
-CLOUDENDURE