- Posted by Alliance Technologies
Are you aware that a recent study indicated that 90% of all U.S.-based cyber attacks have happened to small businesses? You may think that large businesses are really the target, or maybe financial institutions. But, you’ve got to know that if you don’t keep your systems protected, your business looks no different to an attacker on the Internet. In fact, they go for those folks that are less likely to protect themselves. With the average cost of $36,000 per incident—equivalent to an annual salary—it not only does affects your bottom line, it can easily damage your reputation.
Unfortunately, there is this myth that small businesses are invincible. The owner that says, “I just own a pizza shop. Who’s going to want to hack me? I have nothing of value.” If you’re connected to the internet, you absolutely have value to a hacker. The reason you have value is that first, hackers love free computing power. They don’t want to have to pay for it. Second, they like to hide themselves. Your IT systems offer tremendous value, from the single PC to multiple many servers.
You also create value on those IT systems. All of your information is there. Hackers can see all that you do throughout the day. If you go to financial websites, if you go to other accounts, they can harvest that information. They can sell it for their own benefit or use it themselves. As small business owners, we’ve got to know if our Antivirus is working and is up-to-date. We have to know that our anti-spam is working and our anti-malware. There are many tools out there that guard against attackers. It’s important to gain knowledge about your systems, your risks, and have a solid plan of action.
For many, this can seem overwhelming, and this is where an IT provider can help. Three main IT systems that are critical for small businesses are email access, file access and Internet access. Missing any one of these means immediate lost of production. At Alliance Technologies LLC, we help our small business clients make good decisions, and create preventative maintenance plans.
Just recently, we got an alert at Friday at 8:00 PM that somebody might be breaking in to a client’s system. Within 15 minutes, we got into it and prevented any damage. We further researched and worked throughout the weekend. By Monday, the client arrived and was able to operate without any negative impact.
What is your plan, and who will you call on to help you?