{"id":4604,"date":"2013-07-26T15:38:00","date_gmt":"2013-07-26T15:38:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/cyber-attacks-still-threaten-small-and-mid-sized-companies\/"},"modified":"2013-07-26T15:38:00","modified_gmt":"2013-07-26T15:38:00","slug":"cyber-attacks-still-threaten-small-and-mid-sized-companies","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/cyber-attacks-still-threaten-small-and-mid-sized-companies\/","title":{"rendered":"Cyber Attacks Still Threaten Small and Mid-Sized Companies"},"content":{"rendered":"<p>Amidst the recent news about Apples very own Developer<br \/>\nWebsite being the victim of a hacking<br \/>\nattack, it should become clear how problematic malicious cyber behavior has<br \/>\nbecome. News of cyber attacks are frequent in occurrence and broad in impact,<br \/>\nspanning industries as varied as micro-computing and oil-exploration. As long<br \/>\nas you are online, you are a possible subject.<br class=\"k-br\"><\/p>\n<p><!--StartFragment--><\/p>\n<p>The National Cyber Security Alliance has extended this<br \/>\nwarning to smaller and medium sized businesses as well, not just the Apples<br \/>\nand Microsofts of the world. The organization reports that <a href=\"http:\/\/www.business2community.com\/small-business\/beating-the-hacker-game-how-to-protect-your-small-business-from-cyber-attacks-0554385\" style=\"cursor: text;\">cyber<br \/>\nattacks on smaller business entities<\/a> generally end up costing those<br \/>\ncompanies an average of about $180,000. More alarmingly the data also reflects<br \/>\na devastating trend where 2\/3 of these businesses also end up being forced out<br \/>\nof business within the first 6 months following such attacks. Yet the most<br \/>\nrecent study by the NCSA still identifies a large amount of complacency<br \/>\nregarding the seriousness of the situation. Almost a full 50% of the polled<br \/>\nbusinesses stated that hacking incidents were isolated and would not impact<br \/>\ntheir own operations.<br class=\"k-br\"><\/p>\n<p>Your business network, customer information, and operational<br \/>\ndata your business depends on can be compromised with poor WiFi security.<br \/>\nThats really it. Hackers are by definition opportunistic in the nature of<br \/>\ntheir criminal endeavors. This means that they will compromise a network not<br \/>\nbecause it was part of the plan but simply because they happened to stumble<br \/>\nacross a poorly protected IT infrastructure. Strong passwords, firewall<br \/>\napplications and some antivirus programs offer one layer of protection, but a<br \/>\nsolid security strategy requires a multipronged approach that spans both<br \/>\nhardware as well as software.<br class=\"k-br\"><\/p>\n<p>However, just as it has become easier for hackers to<br \/>\nidentify potential victims it has also become easier for businesses to protect<br \/>\nthemselves. Security companies offer protection packages that are tailored to<br \/>\nsmall and medium sized operations, as opposed to the elaborate and very<br \/>\nexpensive systems implemented at large corporations. EVS understands the need<br \/>\nto scale your own security and <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/\" style=\"cursor: text;\">fraud prevention<br \/>\nsystem<\/a> in order to fit the size and scope of your companys operations.<br \/>\nSolutions such <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identiflo-management-platform\/\" style=\"cursor: text;\">IdentiFlo<\/a><br \/>\nand <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identifraud\/\" style=\"cursor: text;\">IdentiFraud<\/a><br \/>\nID verification and authentication platforms ensure only those people<br \/>\nauthorized to access your systems will and more crucially, those people<br \/>\nactually are who they tell your network they are!<br class=\"k-br\"><\/p>\n<p>[Contributed by EVS Marketing]<br class=\"k-br\"><\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amidst the recent news about Apples very own Developer Website being the victim of a hacking attack, it should become clear how problematic malicious cyber behavior has become. News of cyber attacks are frequent in occurrence and broad in impact,<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[],"class_list":["post-4604","post","type-post","status-publish","format-standard","hentry","category-fraud-prevention"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4604"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4604\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}