Protect Your Small Business from Future Threats

Protect Your Small Business

The well-known ransomware called Wannacry hit hundreds of computers in May 2017. As a business leader, it is important to understand what happened, to ensure that proper security measures are being taken to protect my business from future threats.

Computer systems will always be prone to attacks; from the largest enterprise to the smallest home business, many of these attacks start with email. The most recent example being the highly publicized WannaCry ransomware attack. E-mail attacks typically start with an innocent-looking phishing e-mail in your inbox, and end with losing access to all your data. One of the main problems with these types of attacks is that they are always evolving, sometimes within hours or days of each other, and they’re becoming harder to detect.

For example, in the recent Google Docs and DocuSign phishing e-mail attacks, attackers changed servers within hours after spam filters started to pick up on the breach; and then bypassed them. This allowed even more e-mails to go through, and more data was compromised. Once a user clicked on a link and entered information, or downloaded an attachment, data was compromised. In some cases, beyond recovery.

Myth: Many people feel that having a spam filter in place protects them from these threats.

It’s not always true that spam filters protect users from threats. In fact, with many of the recent attacks, the e-mails that were received were not recognized, or flagged as spam. In most cases, they are e-mails being sent from the account of a compromised party (who entered their credentials in a phishing e-mail), or through a legitimate third party.

So, what can you do to protect your business and employees from future attacks, when even a good spam filter might not catch a possible threat?

The key is having as many layers of protection between the outside world and the end user, as possible. The first layer of protection would be your spam filter, and the second would be your Anti-Virus / Anti-Malware software. The Anti-Virus / Anti-Malware software on your PC should be the last line of defense, and ideally never used.

What are some other layers of protection?

The most critical layer of protection has nothing to do with technology at all, but everything to do with the end user. Ensuring that you and your end users are diligent and attentive when reviewing e-mails, is important. It’s essential to always be on the lookout for suspicious emails with links or attachments. For example, if you receive a random e-mail from someone you may or may not know, it could be that their account has been compromised.

Were you expecting to receive a signed DocuSign document? Were you waiting for someone to share a document with you?

If the answer is no, don’t assume that because you know the name on the e-mail, that it’s safe. This is true even if it’s from someone within your own company. It doesn’t take much time to pick up the phone and call/text that person and ask. In this modern world, attackers prey on the fact that we have become so dependent on e-mail, and will not find other means to provide checks and balances. Do not e-mail back and ask if this is real, as the attacker could be sitting and monitoring that person’s e-mail account, waiting to reply, just to get you to enter in your information.

Another layer of protection is using office 365 Exchange Online for your e-mail. Microsoft also offers Office 265 Advanced Threat Protection, which helps monitor your e-mail in real-time, against new, more sophisticated attacks, by screening malicious attachments and links. This is done by working with the security features already included in Microsoft 365’s Exchange Online Protection spam filter. Overall, this provides better defenses against zero-day attacks. Since zero-day attacks are generally unknown to the public, it is more difficult to defend against them (as patches have not yet been released), which is why they’re often effective against “secure” networks.

Office 365 Advanced Threat Protection can be added to most Office 365 Business or Enterprise plans, and is included in the Office 365 Enterprise E5 plan. Basic configuration of Office 365 Advanced Threat Protection is relatively quick, and licensing is easily acquired.

By Matthew Cleaver

Episode 5: How the Pandemic is Changing Business and the Cloud

An Interview with Ed Dryer of Steadfast With the global pandemic wreaking havoc on business ...

Episode 2: Coronavirus Phishing Emails and Work-from-Home Meetings

Coronavirus Phishing Emails What to watch out for as scammers exploit pandemic panic, and tips ...

Episode 1: Why Small and Medium Sized Businesses Need an MSP

Small and Medium Sized Businesses Need an MSP Small and medium-sized businesses don’t enjoy the ...
Will Crump

The Key to a Successful M&A = Data

Successful M&A = Data Data is often the single point of failure for many organizations. Divestitures, privatization, leveraged buyouts, and management buyouts are all on ...
David Gevorkian

How to Apply Website Accessibility in UX and How to Achieve Better User Experience

Design Tweaks: Apply Website Accessibility in UX In this current digital age, websites have become more complex because of the introduction of various aesthetic designs ...
Or Lenchner

Seeing what consumers see: opening the internet with IPPN

Opening the internet with IPPN To remain competitive and profitable, all brands must be data-gatherers. This is part of any brand’s daily routine, but a ...
Medical

5 Realtime Coronavirus (COVID-19) Tracking Maps using Big Data

Coronavirus Realtime Tracking Maps We are living in a pandemic world. As of March 12th, 2020 the Director-General of the World Health Organization (WHO) Dr ...
Aarti Parikh

What are the Capabilities of the AWS Serverless Platform?

AWS Serverless Platform AWS serverless compute services allow to build and deploy applications on AWS cloud without having to manage the servers. AWS serverless platform ...
Bruce Guptill

How CFOs and CIOs See Finance Management Priorities

Cloud and the Finance-IT Effectiveness Gap IT leaders today tend to be much better aligned with business and operational leaders and business goals than they ...
Dan Saks 1

How to Transform to Succeed in the Digital Economy

Succeed in the Digital Economy In today’s increasingly competitive business climate, companies must put digital technologies at the core of their operations. In order to ...
Mark Kirstein

Episode 6: Cloud Migration: Why It’s More Important Than Ever

The Importance of Cloud Migration Moving fully to the cloud is still a concern for many companies, but with millions of employees working from home, ...
Kyle Bernard Author

FlightHub and JustFly on Facial Recognition Technology, Travel and Privacy

Facial Recognition Technology For years facial recognition technology only existed in science books, television and cinema. The idea was brilliant. However, real-world technology hadn’t yet ...
Sebastian Grady

Digital Transformation – Updated Metrics for the Cloud Era

Cloud Era Metrics Undertaking digital transformation means also transforming how IT success is defined, including metrics that address business in the cloud.  With up to ...