Practically Speaking About IT Infrastructure

Choosing a New Cloud Provider? Let the Workload Be Your Guide

Improving IT efficiency, delivery, and cost structure There’s no question that customers are embracing cloud for all types of workloads. Whether the workloads are mission-critical, third-tier applications, or somewhere in between, the cloud has become the destination of choice for customers looking to improve their
/
Ronald van Loon

AI, Automation & 5G ensuring the future of Industry 4.0

AI, Automation & 5G Industry 4.0 involves interconnecting all parts of a company and giving rise to effective automation resulting in a more intelligent organization. It is considered the fourth industrial revolution to the digitization phase of the manufacturing sector that was possible due to
/
Small Business Security

Ransomware, Backups and the Aging IT Specialist

Small Business Security

Right now, two technology trends characterize the small business ecosystem: a growing migration to the cloud, and a growing susceptibility to cybercrime, particularly in the form of ransomware.

Recently, I discovered this duality firsthand. Stranded at the local ski resort, I got a ride down from a fellow snowboarder named Dan. Dan is a salesman for a small business selling signage. According to Dan, his company’s data was hijacked by hackers and held for ransom. The ransomware was embedded in an email opened by one employee. The small business owner has a longstanding relationship with an aging IT specialist, who hadn’t backed up any of the company’s information on the cloud. It was all sitting on hard drives, and suddenly, they weren’t able to access any of it. They paid the ransom to get the data back because, really, what else could they do?

In 2015, about 50% of cyberattacks worldwide hit small businesses. Small businesses can be unsuspecting, and invest less in cybersecurity than large corporations. Hackers can attack more than one small business at a time, and increasingly, they’re doing this with ransomware. For hackers, ransomware is simple and lucrative. There’s no need to ferret out financial data and resell it, or interact with banks. All it takes is one employee to open a file containing malware. Then, thieves can potentially get a payout directly from the business whose livelihood is at stake.

This comes at a time when small businesses are increasingly seeking ways to be more competitive with cutthroat giants like Amazon and Walmart. Out of Quickbooks’ ways to increase small business profits, the top two are:

  • Go paperless
  • Switch to electronic forms and filing

As small businesses heed this advice, hackers lineup to block their access to files. In an interview with NBC, the executive security director of IBM Security Limor Kessem says, “It’s like some sort of gold rush. Cybercriminals are using ransomware to bring extortion to the masses and more criminals are now doing it because they’re interested in getting a piece of the action.” Ransomware payments reached an estimated $1 billion in 2016, up from $24 million in 2015. At the same time, small businesses were hit with eight times more attacks in 2016 than in 2015. According to a study from IBM, only 30% of small businesses offer cybersecurity training to their employees, which makes them more vulnerable.

When I talked to Dan, the salesman whose company eventually paid a data ransom, he felt that if his company’s data had been backed up to the cloud, they could have avoided paying the ransom. “The cloud is where a lot of businesses our size are going anyhow,” he said. Turns out he’s dead on the money.

Small business, the cloud, and security

About 78% of small businesses will adapt their operations to cloud by the year 2020, up from the nearly 40% that are already there. One primary reason for this is the convenience of SaaS; another is “Hives”, groups of individuals who collaborate virtually from remote locations, some freelance, others part of the core unit. The desire to compete head-to-head with big business is also driving this trend.

But is the cloud safe from ransomware? Depends. Brian Krebs details the story of an acting agency for children that fell prey to a cloud ransomware scheme. The firm had all their applications and data hosted on a private managed cloud solution. Here again, ransomware struck through email. An employee opened an attachment that looked like an invoice, and the company was no longer able to access more than 4,000 files. Fortunately, the cloud provider was also providing backup. The firm was able to get their files back, but it took nearly a week. The attack also affected other clients on the same server.

If cloud files aren’t backed up, they’re vulnerable. Cloud hosting and storage alone won’t do the trick. Eastern Kentucky University identifies attacks on cloud services as one of the looming threats in cybersecurity. EKU identifies seven components of cybersecurity which can be seen in the featured image.

Anti-malware specifically targets infections, such as ransomware. Anti-malware applications run files in an emulator, testing them for threats with a behavioral assessment in the application, and in the cloud. There are security applications for mobile phones, too–highly recommended if employees conduct any sort of business on their phones. Note that cybersecurity training is also critical. If small businesses are going to invest more of their resources in the cloud, security training will be a prerogative. In order for small businesses to compete with big businesses, they will need to compete in the training arena as well.

By Daniel Matthews

  • Articles
Daniel Matthews Contributor
Technology Writer
Daniel Matthews is a freelance writer from Boise, ID. Daniel received his Bachelor’s in English from Boise State University in 2006, and is currently working on a book about the 2008 financial crisis. Widely-published online, he specializes in research and analysis that sheds light on the intersection of tech, business, and current affairs. Daniel is an avid writer and technology enthusiast whose mission is to bring journalistic integrity and informed opinions to his audience in ways that make them think differently about the world. You can find him on Twitter and LinkedIn.
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data and protect against data loss ...
The Massive Growth of the IoT Services Market

The Massive Growth of the IoT Services Market

Growth of the IoT Services While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies ...
Sean Peterson

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes and serving customers. Leading software ...
Nvidia News

Seasons of Learning: 700+ Interns Take NVIDIA by Storm

/
There are no coffee runs in sight for NVIDIA interns. Unless it involves building vehicles to make those runs autonomously. This year, more than 700 interns have joined NVIDIA across 30 ...
The Verge

Richard Stallman resigns from MIT over Epstein comments

/
Famed computer scientist Richard Stallman has resigned from his position at MIT over recent comments he made concerning Jeffrey Epstein’s victims. He has also resigned as president of the Free Software Foundation, an ...
BBC Tech

Data on almost every Ecuadorean citizen leaked

/
Personal data about almost every Ecuadorean citizen has been found exposed online. Names, financial information and civil data about 17 million people, including 6.7 million children, was found by security company ...

TRENDING | TECH NEWS