Protect Your Small Business from Future Threats

Protect Your Small Business

The well-known ransomware called Wannacry hit hundreds of computers in May 2017. As a business leader, it is important to understand what happened, to ensure that proper security measures are being taken to protect my business from future threats.

Computer systems will always be prone to attacks; from the largest enterprise to the smallest home business, many of these attacks start with email. The most recent example being the highly publicized WannaCry ransomware attack. E-mail attacks typically start with an innocent-looking phishing e-mail in your inbox, and end with losing access to all your data. One of the main problems with these types of attacks is that they are always evolving, sometimes within hours or days of each other, and they’re becoming harder to detect.

For example, in the recent Google Docs and DocuSign phishing e-mail attacks, attackers changed servers within hours after spam filters started to pick up on the breach; and then bypassed them. This allowed even more e-mails to go through, and more data was compromised. Once a user clicked on a link and entered information, or downloaded an attachment, data was compromised. In some cases, beyond recovery.

Myth: Many people feel that having a spam filter in place protects them from these threats.

It’s not always true that spam filters protect users from threats. In fact, with many of the recent attacks, the e-mails that were received were not recognized, or flagged as spam. In most cases, they are e-mails being sent from the account of a compromised party (who entered their credentials in a phishing e-mail), or through a legitimate third party.

So, what can you do to protect your business and employees from future attacks, when even a good spam filter might not catch a possible threat?

The key is having as many layers of protection between the outside world and the end user, as possible. The first layer of protection would be your spam filter, and the second would be your Anti-Virus / Anti-Malware software. The Anti-Virus / Anti-Malware software on your PC should be the last line of defense, and ideally never used.

What are some other layers of protection?

The most critical layer of protection has nothing to do with technology at all, but everything to do with the end user. Ensuring that you and your end users are diligent and attentive when reviewing e-mails, is important. It’s essential to always be on the lookout for suspicious emails with links or attachments. For example, if you receive a random e-mail from someone you may or may not know, it could be that their account has been compromised.

Were you expecting to receive a signed DocuSign document? Were you waiting for someone to share a document with you?

If the answer is no, don’t assume that because you know the name on the e-mail, that it’s safe. This is true even if it’s from someone within your own company. It doesn’t take much time to pick up the phone and call/text that person and ask. In this modern world, attackers prey on the fact that we have become so dependent on e-mail, and will not find other means to provide checks and balances. Do not e-mail back and ask if this is real, as the attacker could be sitting and monitoring that person’s e-mail account, waiting to reply, just to get you to enter in your information.

Another layer of protection is using office 365 Exchange Online for your e-mail. Microsoft also offers Office 265 Advanced Threat Protection, which helps monitor your e-mail in real-time, against new, more sophisticated attacks, by screening malicious attachments and links. This is done by working with the security features already included in Microsoft 365’s Exchange Online Protection spam filter. Overall, this provides better defenses against zero-day attacks. Since zero-day attacks are generally unknown to the public, it is more difficult to defend against them (as patches have not yet been released), which is why they’re often effective against “secure” networks.

Office 365 Advanced Threat Protection can be added to most Office 365 Business or Enterprise plans, and is included in the Office 365 Enterprise E5 plan. Basic configuration of Office 365 Advanced Threat Protection is relatively quick, and licensing is easily acquired.

By Matthew Cleaver

Trading view

Notable Stock Screeners for 2021

Stock Screeners By this point, you probably already heard about everything that happened with GameStop (GME) stocks. GameStop is the largest video game retailer with 5,000 stores around the U.S. Due to the pandemic, the ...
Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021

Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021

Top 10 Tech Job Skills Predicted According to Burning Glass Technologies, the two tech job skills paying the highest salary premiums today and in 2021 are IT Automation ($24,969) and AI & Machine Learning ($14,175) ...
Rusty Chapin

Best Practices Every Company Should Adopt to Combat the Risk of Cyberattack

Cyberattack Best Practices Across the U.S. and around the globe, mitigating risks around ransomware and malicious attack has become increasingly urgent. The rise of people working from home has brought with it a growing threat ...
Ronald van Loon

The Secrets to a Successful Desktop-as-a-Service Approach

The Secrets to a Successful Desktop-as-a-Service Approach Organizations are under pressure to reinvent their business models and adopt new technologies and digital capabilities to manage challenging conditions and adapt to new remote work scenarios. By ...
Yuri Sagalov

IT Culture Clash Where Employees Use Multiple Devices To Collaborate

Employees use multiple devices to collaborate It used to be that company IT decision makers could simply dictate the software that business units would use. However, in today’s business the IT culture clash where employees ...
Sebastian Grady

Digital Transformation – Updated Metrics for the Cloud Era

Cloud Era Metrics Undertaking digital transformation means also transforming how IT success is defined, including metrics that address business in the cloud.  With up to 90% of budgets spent keeping the lights on, cost is ...