Essential Cybersecurity for Small Businesses

Essential Cybersecurity for Small Businesses

Cyberattacks (or cyber attacks) do not discriminate. Cybercriminals are as likely to target a small to medium-sized business (SMB) as a large enterprise. A recent VikingCloud report into cyberattacks on SMBs found that 1 in 3 small businesses were victims of a cyberattack. However, unlike their larger enterprise counterparts, SMBs are not financially resilient and do not typically have skilled security professionals on staff. Cyberattacks are becoming more sophisticated and increasing in volume. As such, the results of cyberattacks on SMBs can be disastrous.

Common Cyber Threats to Small Businesses

Common Cyber Threats to Small Businesses

Cybersecurity is an essential part of everyday life in a small business. Like their enterprise counterparts, small businesses are targets of various cyber threats that they must prevent to remain protected. A recent survey of the landscape of cyber threats that an SMB has to navigate was carried out by Cisco. The report offers the following insight into some of the most common threats:

Types of Attacks Experienced by Companies

Malware
76%
Phishing
54%
Credential Stuffing
37%
Supply Chain and Social Engineering Attacks
32%
Cryptojacking
27%

Cisco Cyber Readiness Index Cisco's 2024 Cybersecurity Readiness Index

Some of the most likely cybersecurity challenges that a small to medium-sized business is likely to experience are as follows:

Phishing, Vishing, Smishing, and Quishing

Phishing is a generalized term to describe the use of communication media to manipulate targets into performing some task that benefits a cybercriminal, for example, to help steal login credentials.

There are many forms of phishing. Email phishing is the best-known and includes spear phishing that targets specific users. Others include voice phishing, usually via mobile phone (vishing), SMS text and messaging app phishing (smishing), and QR code-based phishing (quishing). SMBs are at risk of all forms of phishing, and credential theft is the most likely outcome of a successful phishing campaign. Once credentials are in the control of a cybercriminal, many follow-on attacks can occur, including ransomware attacks.

MediSecure, an Australian online prescription provider, suffered a massive ransomware attack that lasted nearly four years. The company lost 6.5 million terabytes of personal and health data from 12.9 million Australians. The data ended up for sale on the dark web, putting customers at risk of further attacks.

Data Breaches

Data is a valuable commodity, and cybercriminals use it to demand ransom, sell it to other cybercriminals, and commit fraud and other cybercrimes. A recent breach exposed 184 million logins for apps like Apple, Google, Microsoft 365, and other well-used corporate apps. The breach has left SMBs at risk of further data breaches and network attacks.

Social Engineering

The human element is prevalent in many cyberattacks. Scams, like Business Email Compromise (BEC), prey on human psychology to execute the scam. Fraudsters will impersonate company executives, tricking employees into performing a task for the executive, such as paying an invoice from a "new and important client," with the money ultimately going to the fraudster.

Credential Stuffing

Cyberattackers can use stolen credentials to gain unauthorized access to accounts. They use automation to try millions of stolen passwords against online accounts until they get a match. A PayPal credential stuffing attack affected 35,000 users, compromising accounts.

Malware: Keyloggers and Info Stealers

Malware infects devices and networks using various techniques, including phishing, network vulnerabilities, misconfiguration of web components, and malicious online ads. Keyloggers and info stealers are popular forms of malware that are often available to cybercriminals on an as-a-Service basis; cybercriminals rent phishing templates, spoof websites, and malware to carry out attacks.

Recently, Ducktailmalware was used to steal Facebook business accounts. This info stealer malware was used to exfiltrate data from business accounts when users logged on using infecting devices.

Cryptojacking

Cryptojacking malware is used to mine cryptocurrency on behalf of fraudsters. Cryptomining requires large amounts of electricity and computer resources. Any infected SMB will receive large utility bills, and computers will be unusable while infected. Google research found that 86% of compromised Cloud instances were used for cryptocurrency mining. Over 4000 government and public service websites were infected with cryptojacking scripts in one attack. Anyone visiting an infected website was at risk of becoming a cryptojacking victim.

Ransomware

Small businesses are at risk of ransomware attacks, leaving them highly vulnerable to the damage and cost of this insidious malware. Over half (51%) of small businesses that suffer a ransomware attack pay the ransom. Contractor E.R. Snell suffered aransomware attack. The attackers used keylogger malware to gain unauthorized administrative access. The firm's critical services were down for a week, and other services for three weeks. It took the company many months to recover data and fix damaged computers.

AI-Enabled Cyber Threats

Cyber threats are challenging, but with the aid of AI, these threats are expected to become even more dangerous. Generative AI is used to create believable and highly personalized phishing campaigns; malware is developed using AI-based vibe coding; and AI-generated deepfakes are used to create social engineering scams that are almost impossible to identify as fake, a recent spate of invoice fraud using an AI-enabled invoice swapper.

The tool uses AI to search for compromised emails that mention invoices or include attachments with payment details. The compromised email is intercepted, with the tool changing the banking information of the intended recipient to that of the fraudster.

Impact of Cybercrime on Small Businesses

Impact of Cybercrime on Small Businesses

Cybercrime, like any crime targeting a company, causes operational damage, negatively affects customer relationships, and impacts regulatory compliance. Cisco's Cyber Readiness Index found that only 2% of businesses under 250 employees were fully prepared for a cyberattack. This is concerning, as the Viking Cloud report found that 1 in 5 SMBs would go out of business if a cyberattack cost $10,000 or more in damages. Unfortunately, the costs of a cyberattack stack up quickly, as the following examples show:

Cost of a Cyberattack on Small Businesses

Ransomware Costs

Ransomware is a costly infection that damages computers and steals valuable and sensitive data. Small companies with fewer than 1000 employees were impacted over four times more than larger enterprises. Ransom costs increase year-on-year, with the latest median ransom being $1.5 million. Other costs include downtime, recovery, noncompliance fines, and reputation damage limitation.

Downtime Costs

Malware infections and data breaches require time to recover systems and close security gaps. Estimates for downtime costs per hour for SMBs are $25,620, and for enterprises, they are $540,000.

Loss of Customers and Reputation Damage

Data breaches affect customers and result in the degradation of trust and damage to relationships. Each SMB will have its own view of the cost of broken customer relations. However, the cost of reputational damage after a ransomware attack, for example, is around 20% of the overall cost of the attack.

Fraud and Identity Theft

Data breaches and account takeovers lead to identity theft and fraudulent transactions. Business Email Compromise fraud, for example, costs an average of $137,132 per incident, according to data from the FBI.

Noncompliance Fines

Cyberattacks, such as data breaches, can lead to noncompliance with various regulations, including GDPR, PCI-DSS, HIPAA, and DORA. Fines can be significant. DORA, for example, fines firms that are found to be negligent 2% of their total annual worldwide turnover or up to 1% of the average daily turnover worldwide. Critical third-party ICT service providers can be penalized up to EUR 5 million, or EUR 500,000 for individuals.

Affordable Cybersecurity Solutions for SMBs

Enterprise-grade solutions may seem out of reach of a smaller organization. However, managed service providers (MSPs) can help deliver affordable, effective cybersecurity. Typically, MSPs set up to provide security to SMBs will offer a unified package of solutions that are purchased on a monthly subscription basis. The MSP has buying power and will implement, manage, and upgrade its tech stack to ensure an SMB has the best protection against cyberattacks. Some of the measures that are recommended to help mitigate cyberattacks, which are typically offered on subscription by an MSP, are as follows:

Security Awareness Training

Cybercriminals target employees and customers, tricking them into clicking malicious links in phishing campaigns or socially engineering them into performing tasks that benefit the cybercriminal. Security awareness training attempts to redress the balance, teaching employees and customers about the tricks cybercriminals use to manipulate them. The training educates staff on safe internet and mobile use, security hygiene, and how to spot phishing attacks.

Email Security

Advanced email security solutions help prevent phishing and malicious spam from entering employees' inboxes. AI-enabled email security can identify emerging threats, QR-code phishing, and zero-day attacks that conventional email security cannot detect.

Endpoint Protection

Next-Gen anti-virus (NGAV) uses AI to identify evasive malware that can hide on computers and networks for long periods without being detected.

Robust Identity Security

Employee accounts and their identifying data offer cybercriminals a way into a network. A company should deploy identity security measures to prevent account takeover and other identity security issues, like the exploitation of stolen login credentials. These include using multi-factor authentication (MFA) or passwordless authentication and privilege governance.

Ransomware-Proof Backups

A data backup service should be designed to prevent attempts to destroy backup data, stopping any malicious editing, overwriting, or deletion.

Dark Web Monitoring

If your data is stolen, it is likely to end up on the dark web for sale to other cybercriminals and fraudsters. Also, if a cybercriminal is intent on attacking an organization, they will often use the dark web to gather intelligence for the attack.

It is recommended that an SMB use a dark web monitoring service, like Sentinex. Dark web monitoring is used to identify any instances of company information that may be used for malicious purposes.

Cyber Insurance for Small Businesses

Cyber Insurance for Small Businesses

Cyber insurance can help an SMB weather the storm of a cyberattack. Insurance covers liabilities and financial losses associated with cyberattacks like ransomware and data breaches. Unfortunately, according to a Huntress survey, 27% of SMBs don't have cyber insurance. When evaluating cyber insurance for your company, you should look for the following levels of coverage:

  • Cybercrime investigation of the attack and how it occurred. This is essential in ensuring the type of attack is not repeated.
  • Data breach recovery costs.
  • Damaged computers.
  • Reputation management.
  • Ransom payments from ransomware and data breaches.
  • Notification costs associated with data breach regulation requirements.

FAQs

What is a Cyberattack?

A cyberattack is a deliberate act that causes a breach of data or systems. Cyberattacks take many forms and often exploit human behavior; for example, cybercriminals manipulate human behavior as part of an attack. Cyberattacks result in data exposure, damage to computers, loss of customers, a breakdown in customer trust, and financial fraud.

How Do Cyberattacks Affect SMBs?

Cyberattacks are highly damaging to an SMB. Smaller organizations typically have fewer skilled IT and security staff and are therefore more prone to attacks. The lack of security resources also makes it challenging for a smaller company to handle the aftermath of a cyberattack. Many companies struggle to regain normal operations and competitive edge if they suffer a large data breach or ransomware infection.

What Motivates Someone to Carry Out a Cyber Attack?

Cyberattackers are motivated by financial gain, political motives, notoriety amongst their peers, and a desire to cause disruption. Disgruntled employees or those recruited by other cybercriminals can also initiate cyberattacks.

How can I tell if my business has been hacked?

Identifying a cyberattack can often be difficult, as many cybercriminals use evasive techniques and tactics to avoid detection. Some malware, for example, can go undetected for months. However, attack "dwell time" is decreasing, with an average time to detect an attack of around ten days. To detect a threat or that your company has been hacked, you can use various technologies that monitor network traffic and identify unusual behavior or anomalous data traffic. Intrusion Detection and Prevention (IDPS) solutions provide this capability and can also help prevent an attack.

What should I do if a cyberattack happens?

To preempt your company's response to a cyberattack, you should have a cybersecurity incident response plan and a business continuity plan. These policy documents will define the actions needed to mitigate an attack and respond to its impact. The plan should contain a list of company staff who can make decisions based on the attack type. Communication of how to handle a cyberattack must be robust and not dependent on computer systems that may be damaged in the attack.

Is cybersecurity expensive for a small business?

Enterprise-grade cybersecurity should not be expensive for an SMB. However, your company will need to source cost-effective solutions and delivery mechanisms. Many cybersecurity solutions are now available on a subscription basis and designed for purchase by an SMB. Managed service providers (MSPs) also offer SMB-focused services that price solutions with smaller budgets in mind.