How Much Is Your Data Worth To You?

Man wearing purple shirt pushing wooden blocks that say worth on them forward on white table

By Jennifer Adams

What is a Cyber Attack?

A cyber-attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. In this event, criminals can maliciously disable computers, steal data, or use a breached computer as a launch point for more attacks. A variety of methods are used; including, but not limited to, malware, phishing, ransomware, and denial of service. Once the system has been successfully hacked, a message is displayed with instructions on how much and where to pay a ransom fee to have the data decrypted. However, paying the ransom does not guarantee that the data will be decrypted.

Why should my company be concerned about being cyber-attacked?

According to Cybint, a global cyber education company, 43% of cyber-attacks target small businesses. A successful cyber-attack causes major damage to a business, resulting in substantial financial loss, loss of consumer trust, and potential legal consequences for the victimized business. It takes nearly six months to detect a data breach, even for large corporations. Information such as credit card details, social security numbers and passwords may already be compromised by the time you are notified. The aftermath of cyber-attacks has caused large factories to come to a grinding halt and Lysol to lower its sales forecast due to a cyber-attack on its supply chain.

How can my company protect itself against a cyber-attack?

There are a variety of ways a company can protect itself against a cyber-attack such as carefully selecting passwords, training employees on network security, and being suspicious of unexpected emails asking for money or sensitive information.

When selecting passwords, think carefully. Don’t choose passwords based on information that could be obtained from public sources or social media.  Long passwords are better than short passwords. Choose something that no one else would guess, a short phrase perhaps.

Employees are the weakest link of an organizations network security. Even the best security systems are still vulnerable due to a human error. Persistently training employees on the importance of following network security protocols as well as teaching them to identify cybercrime tactics is vital in today’s business world.  XETX Business Solutions can help you develop a training regimen for your employees and stay one step ahead of the cybercriminals.

Be naturally suspicious if you receive an unexpected email asking for money or sensitive information. Cybercriminals often send emails that appear to be from a trusted source. Check the email address.  If it doesn’t exactly match the domain name of your trusted source, don’t click on it.  If an email you weren’t expecting directs you to make a financial transaction, even if it contains the name of someone you know, take a moment to call that person to confirm the email’s validity.  Taking precautions such as this can save you from making a very expensive mistake.

Our Suggestion

Taking every possible precaution to safeguard a computer network and data from intrusion does not necessarily make one completely immune from cybercrime. In this situation, much like a natural disaster, the best protection is to implement a true back-up and disaster recovery solution. Xetx Business Solutions is here to help design and implement a custom solution to best backup your data and recover your information in the event of any disaster.  Give one of our IT professionals a call today to set up an appointment for a consultation

Subscribe To Updates

Get notified of important Xerox news and helpful articles from XETX.