Blog Layout

Cyberattacks on the Rise: Be Prepared!

August 7, 2024

How Small Businesses Can Protect
Themselves from Bad Actors


On June 19, 2024, software giant CDK Global was the victim of a ransomware attack that took most of its services offline. As a result, business operations were crippled at more than 15,000 U.S. car dealerships, forcing employees to revert to paper-based processes.

On February 21, 2024, cybercriminals attacked Change Healthcare, preventing electronic payments and medical claims processing, forcing patients to pay out of pocket for medications, and causing healthcare providers to lose millions in revenue while threatening small practices with insolvency. 

As cyberattacks continue to mount, small businesses across the country are scrambling to protect themselves. The statistics are sobering:

  • 82% of ransomware attacks target companies with fewer than 1,000 employees, 37% of which employ fewer than 100.
  • In 2020 alone, U.S. small businesses experienced 700,000 cyberattacks, totaling $2.8 billion in damages.
  • 51% of small businesses attacked by ransomware pay the money.
  • 75% of small-business owners and managers stated they would have to cease operations if they were hit with ransomware.

Cyberattack Prevention

Cybersecurity measures are no longer optional for small businesses – they’re a necessity. Owners and managers must evaluate areas most at risk and determine how an IT outage could affect their finances and operations.

How Do They
Do It?

Here are five of the most common hacking methods cybercriminals use against small businesses:

Phishing—Phishing emails appear to originate from an authentic brand. They contain a sense of urgency, persuading the user to click on a malicious website or attachment. Phishing is commonly used to hack into accounts receivable.

Clickjacking—Clickjacking also tricks the user into clicking a malicious link; doing so allows the hacker to control the user’s device.

Keylogging—Keylogging allows hackers to record every keystroke on a user’s device, providing them to access sensitive information.

Viruses—Computer viruses, worms, and Trojan horses are software programs that can be installed in IT systems. These programs lock up files and spread quickly across entire networks. Ransomware is a virus that makes data inaccessible until a ransom is paid to the hackers.

Denial of Service (DoS)—A DoS is a hacking technique that takes down a website by overwhelming the server with fake data requests. The server cannot process all the requests and crashes.

Source:  Intellicomp

Once you’ve established the high-risk areas of your organization, security experts suggest the following:

  • Implement mechanisms to establish redundancy, such as routinely backing up digital records and storing copies in separate locations. Also, maintain a secure off-site location for paper files.
  • Ensure digital files are properly encrypted, and firewall protection and antivirus software remain active at all times.
  • Restrict access to electronic records via user authentication and other controls to ensure only authorized personnel can access digital files.
  • Assess the cybersecurity protocols of vendors and other third parties. If you can’t persuade a vendor to improve its security, you may want to consider switching vendors or having a backup available.
  • Regularly audit your record-keeping systems for security and accessibility.
  • Educate your staff on appropriate documentation and record-keeping practices and make sure all employees understand their role in maintaining accurate and up-to-date records.
  • Designate a staff member, team, or third party to continually monitor and evaluate your cybersecurity systems.

Back to (Old) School

While prevention is the best way to prepare for a cyberbreach, small businesses must also plan for potential periods when their systems are offline. That means relying on paper and manual procedures as a backup.

IT systems can be down for days or weeks in the aftermath of a cyberattack. Prudent business owners will develop a “pen and paper plan” to enable continued operations while unplugged from technology. For instance:

  • Keep paper copies of your plans for emergency operations and business continuity.
  • Maintain a supply of Post-it notes, flip charts, and construction paper. These can be handy when navigating many workflow changes.
  • Maintain a binder with paper forms needed to continue operations in the event of an IT outage.
  • Keep a hard copy of your business policies regarding payment to ransomware attackers in case a decision needs to be made.
  • Keep paper instructions for billing, ordering supplies, and collecting payments.

--Article Continues Below--

  • Establish access controls for physical records, such as locking cabinets and maintaining access logs.
  • Create protocols for the secure destruction of paper files that are no longer needed.

Two-Fisted Approach

Every small-business owner is responsible for thwarting cybercrime, and vigilant preparation requires a two-fisted approach. Utilizing the best technology your company can afford – while also maintaining paper-based backup processes – ensures fiscal resilience in the event of a cyberattack.


Recent Posts

By Brian Grimes 13 Nov, 2024
Bone up on your Turkey Day trivia while testing your knowledge of this uniquely American holiday with our Thanksgiving quiz.
By Brian Grimes 16 Oct, 2024
In the spirit of Halloween, we share with you some genuinely horrifying tales from the Federal Trade Commission (FTC) archives.
By Brian Grimes 11 Sep, 2024
For as long as humans have roamed the planet, keeping teeth healthy—indeed, keeping them at all—has presented a challenge.
By Brian Grimes 07 Aug, 2024
As cyberattacks continue to mount, small businesses across the country are scrambling to protect themselves.
By Brian Grimes 15 Jul, 2024
The particular health risks associated with summertime present some unique challenges to healthcare workers.
By Brian Grimes 08 Jul, 2024
CBSI is a 2024 recipient of the Better Business Bureau (BBB) Torch Award for Ethics.
By Brian Grimes 06 Jun, 2024
June is National Men's Health Month, a time to reflect on the specific health issues men face.
By Brian Grimes 08 May, 2024
Five areas of the world have exceptionally high longevity. These areas had been dubbed "Blue Zones" by scientific explorers.
By Brian Grimes 10 Apr, 2024
In April 2017, Chase Nicholson, a young Iowa man experiencing a severe psychotic episode...
By Brian Grimes 06 Mar, 2024
Hundreds of thousands of medical claims are being automatically denied by AI. What's going on?
Show More
Share by: