{"id":21830,"date":"2012-06-27T16:34:48","date_gmt":"2012-06-27T06:34:48","guid":{"rendered":"http:\/\/power-up.space\/?p=21830"},"modified":"2012-06-27T16:34:48","modified_gmt":"2012-06-27T06:34:48","slug":"smbs-easy-targets-for-cybercriminals","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=21830","title":{"rendered":"SMBs Easy Targets for Cybercriminals"},"content":{"rendered":"<p><strong>MELBOURNE, 27 June 2012<\/strong> \u2014 <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8mh5MNno4MqTPdxazHBXgfY-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX1xtOWmFp34NONQWDqJ8hiBBpTO0cRNuVV17Br-2FkEvPAlICP4RNiBOJeW3i-2BXWZsAsWm-2FtOGkAFLhRsLqYEeqL-2FbfhvVF7c1Q1dzLYz0C3Aa3gLYd5o-2BmPap1pmjdnLgDhHnMDgis2n4HcGCkSKe7xo-3D\">AVG (AU\/NZ) Pty Ltd<\/a>, distributor of AVG Technologies\u2019 award-winning AVG Internet and mobile security software in Australia, New Zealand and South Pacific, warns that many small- to medium-size businesses (SMBs) are still easy targets for cybercriminals.<\/p>\n<p>The recent Australian Business Assessment of Computer Use Security (ABACUS) survey from the Australian Institute of Criminology confirms the high proportion of SMBs that are continuing to take unnecessary risks with their business security. For example, less than 1 in 10 SMBs were found to be automatically updating their computers.<\/p>\n<p>As the inexorable drift towards the mass use of mobile technology in the workplace becomes manifest, combined with SMBs failing to employ the most basic protections, small businesses are leaving themselves vulnerable.<\/p>\n<p>Australia\u2019s smaller organisations are embracing technologies that facilitate mobile working, and yet are not fully alert to the additional risks to business security. For example, businesses are readily adopting social networking as a promotional opportunity to engage with customers, but further precautions such as web link scanning are required to protect against associated online threats.<\/p>\n<p>Michael McKinnon, Security Advisor at AVG (AU\/NZ), said: \u201cIf you are the owner of a small or growing business, chances are you think you are too small for cybercriminals to be interested in you.\u00a0 But you are well advised to think again.\u00a0 With many cybercriminals using automated scanning tools, unless you protect yourself they\u2019ll eventually find you.\u201d<\/p>\n<p>From his perspective, McKinnon knows that SMBs remain focused on traditional IT vulnerabilities like e-mail and web viruses and tend to be more concerned about losing access to files and replacing hardware. But the dangers also lie in security breaches. These are the costlier risk in terms of lost sales and revenue opportunities. According to the AVG SMB Market Landscape Report 2011, the average cost of a security breach is US$6,370. \u201cWithout safeguarding against emerging trends such as information theft and social engineering, SMBs are leaving themselves wide open to the cybercriminals,\u201d he said.<\/p>\n<p>AVG (AU\/NZ)\u2019s guidance is to treat Internet security the same way as corporate governance and brand protection. McKinnon says: \u201cThis is a boardroom issue, not simply a technology debate.<\/p>\n<p>\u201cNo company should be operating without stringent online safety precautions in place, particularly when affordable, effective measures are readily available to them. Having full featured, automatically updated, always on <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8iFoCFLsY9eFmUPinafAE3v5g5CsfgYLsi0-2B6U9WpNdj_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX6GJw-2Fp4LrFc5TM6nDQ92apEuR-2BbDR4D1jmPYk5SwQbNxFer8CqnUpzoHtve1qMR9L7ddHw5q15mGJlt-2BKQAx7PmTIQbJxDDu6fMOe94Rs-2BuSt386t040ZziP9vlXmpssRkYcNFpZELkBBI1CXk7qDc-3D\">anti-virus and Internet security<\/a> software running across all company computers and employees\u2019 mobile devices is a must for business continuity.\u201d<\/p>\n<p>The trend is for executives and staff to access e-mail and other proprietary data from more than one device. The risks of not securing them properly are very real. If <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8o9dkjav3aFdjscTlvliwA0NQJkyIdVJTyIjd-2FlY845zLE9pPY5LhacNDoPfAwGBXg-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX81Yc7-2BPFCmUHQCMiC9xkq6UiFEf703qgfw-2FWIUdbz3bzxlm2-2Bq6b6Y37k-2BOU4wzrIkKCnJiJ1K2ZDstejcMZyDGxOVGxqzy6E-2B8lz3d7sE-2BWGeQerTe6MR4-2BKJafDk3HiWnxoREgc5w2XW16ayC7uA-3D\">malware on a mobile device<\/a> is allowed to remain undetected by users, criminals can gain access to confidential corporate data.\u00a0 The cost in terms of time and expense associated with cleaning these up is often substantial. A report by Computer Economics defines the &#8216;direct&#8217; costs of malware infections as:<\/p>\n<ul>\n<li>Labour costs involved in \u00a0\u00a0\u00a0\u00a0 analysing, repairing and cleaning infected systems<\/li>\n<li>Loss of user productivity<\/li>\n<li>Loss of revenue due to loss \u00a0\u00a0\u00a0\u00a0 or degraded performance of system<\/li>\n<li>Other costs directly \u00a0\u00a0\u00a0\u00a0 incurred as the result of a malware attack<\/li>\n<\/ul>\n<p>Just as business owners lock their doors to keep out burglars, the same should apply to the online world.\u00a0 To bring the shutters down on cybercriminals, SMBs should:<\/p>\n<p>1.\u00a0\u00a0\u00a0\u00a0\u00a0 Keep protection updated for all computers and mobile computing devices &#8211; including USB memory sticks, memory cards, portable hard drives, MP3 players, cameras, smartphones and tablets &#8211; that are brought in or taken home by staff, contractors, clients and visitors.<\/p>\n<p>2.\u00a0\u00a0\u00a0\u00a0\u00a0 Ensure backups are occurring automatically and plan for reducing disaster recovery restoration times.<\/p>\n<p>3.\u00a0\u00a0\u00a0\u00a0\u00a0 Promote strong password management, with passwords that are not easy to guess, are as long as possible, and which preferably include a combination of upper and lowercase letters, numbers and symbols.<\/p>\n<p>4.\u00a0\u00a0\u00a0\u00a0\u00a0 As a first line of defence in social networking activity, use AVG&#8217;s &#8216;scan before you click&#8217; <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8o9dkjav3aFdjscTlvliwA08XSDnZP71YneS3yb1X8O5l2KE6w09rm84xL9MJTgs3w-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXXwJ-2FENo5umo5KH9bSGkbvKayzs7sV6aa3MkgdNVwLcYUEpzUAGtTkDtKZQv-2Ffo7OXCUwwdYbkgJ0MVUfxfmnmhdFBCKGk9DXq0oqqyeVtxtpTp5mzT93oTrcvx48QYrB2KuBJa9hi8VxcQCTKy3p0fI-3D\">LinkScanner<\/a> technology, embedded in its anti-virus and Internet security solutions, to ensure shared links and files are checked and safe.<\/p>\n<p>5.\u00a0\u00a0\u00a0\u00a0\u00a0 Ensure staff always log out of every application or social networking site, and always use the highest rather than default security settings.<\/p>\n<p>6.\u00a0\u00a0\u00a0\u00a0\u00a0 Provide staff with written security guidelines to keep them and your business network safe. Don\u2019t assume that all your staff are tech savvy.<\/p>\n<p>7.\u00a0\u00a0\u00a0\u00a0\u00a0 Enforce this robust internal policy with regular <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=erTqa2DGtUZ03WqfX2NGlh68aWOEx-2BoFXG1pIBtrdmU-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXXwaALyriLvLqFV1-2Bde85f4OL7j1i9-2FBhYSJBB6JEhktWb800X-2B-2FrMY2KDYeyrSD-2F-2BLvveKIbT-2B-2F19qSSnBA-2F-2BL58Zyc8f014UAdkQeoVsAEfiQJZufI2MqdAkqI2XqqReuBSe3KhtPG-2Fc0sDz2QZVuQ-3D\">security audits<\/a>.<\/p>\n<p>8.\u00a0\u00a0\u00a0\u00a0\u00a0 If you need to provide visitors with Internet access, invest in networking equipment that provides a DMZ \u201cDe-Militarised Zone\u201d that will give your visitors restricted access so they can&#8217;t infect your systems, install software or log into your files.<\/p>\n<p><strong>References:<\/strong><\/p>\n<p><a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8p5yqoMdcOBlFXoob-2Be00tazEZnpjA2N0tk-2BclYtvq6-2Frbjp4Z9gLlLqA8LBVUy8cPUj2lhfmTLDAwnDs-2FTfSmw-2Bwg6Vr0INrC84HE4YZd7q_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXXxcxI3q3rnnEDVdBX5-2BmGbKQXgEMi7fI-2BT62S39yE2BNGkM4dgPP7EgvqFcLXE5vXCznjBRBqszbx0bm7o-2B78O1P0Mshm0r4VO4YBvAJjPLJgllvaFiu-2B86ybL4jRH5Hxb-2F-2BcUftu21GRbh9IE48Ivw-3D\">Australian Business Assessment of Computer Use Security (ABACUS)<\/a><\/p>\n<p><a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8p5yqoMdcOBlFXoob-2Be00tYZaY4UdvM64L35w4knMcUFV8TBlygK-2FF9yk4WXIYcSzRjLYvov0tAKlcfqUCSvRh1sQViFv2-2BPXJgfZi-2B0VzQ8qP-2FIXo1nJAa82-2ByqGm5E1Q-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX4Sq-2BROJym4OBcMmhFvA1FG0wJRva9HIhUh8yHVD9WLoZdrAtkCaNkrbMTN-2Bp1SvhiWLSF0AsM74N2dH-2FDWcc9MXRuS60kAx8yLRhWCMf3vP338D2F0cRJVJNDze8vblfbhrisQhl7fKDmejfxkVU04-3D\">Australian Institute of Criminology<\/a><\/p>\n<p>For the series of informative security tips, how-to and fact sheets see: <a title=\"http:\/\/www.avg.com.au\/resources\/security-tips\/\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8klQ8YoM7FoRuDbMj-2BC1saqw-2FJ1ImU3x0cFxzn20RVuOEtstHKmRbLpasjmH9tPq0g-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX6W1nJExirJgobue52ZBePqNr6tRekUjCS0Mse5oEChU4fjcVsZuP-2BkXhQ-2F5ADkLhUWoxyeHieJuTQFOQzrfpE-2Fst-2FmSPcqUY7EsBhXX1v-2B3lfK1r8Iy6QYybww3DxOImaXv6GifDWsAos-2FX3LqQ3uY-3D\">www.avg.com.au\/resources\/security-tips\/<\/a>. For video tips from AVG (AU\/NZ), see: <a title=\"http:\/\/www.youtube.com\/user\/avgaunz\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8hG5nKp8rFCmn0LAOQ8xyey77GKCZC90RZjUYBqU2Zyf_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX8olZF1cFYFRchp4XiwQl1A9Hdob1qdUfoal9SM7cbfod6ajyAVJ5BWt63oUHc30nE5LnnFgigibWaa3pjeyVksh3soX91Xqa850Bk2aPNBUov9e-2FcYhrzChLJlXl4Blx8txFh05-2FBfLcE4jkggvvJY-3D\">www.youtube.com\/user\/avgaunz<\/a><\/p>\n<p><strong>Keep in touch with AVG (AU\/NZ)<\/strong><\/p>\n<ul>\n<li>For breaking news, follow \u00a0\u00a0\u00a0\u00a0 AVG (AU\/NZ) on Twitter at <a title=\"http:\/\/twitter.com\/avgaunz\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=BukfIRbgdZajg8LOo9IGY1F3xfzReWeUtNJxgwMaFo8-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX2ZR4ZMtSGTkAfqzFBKAt-2BRbCws14YQdivVScOgtn4M4lGC8vqw6tMhA9Tgc31RJkaXC0oaaOywhBILH3OEv7PZk9tgiJoUIH-2FMtqxBj-2BSDzxAkHo60n-2BrpJP303cgT9Uf3kyMDyszxKFbK2ySVLaSA-3D\">twitter.com\/avgaunz<\/a><\/li>\n<li>Join our Facebook community \u00a0\u00a0\u00a0\u00a0 at <a title=\"http:\/\/www.facebook.com\/avgaunz\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8ilcbnIPwC1B3-2FHYNFjYcQqPgJmo4H86AvTTgN-2B0puvW_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXX8zv6tCz4kWvtD2YQV0DHYyYfJ8zHvvD2vav-2BLT4RFFwZbJ6btNIfmleynHXoxYN7CZFTi5YMiTykONnW1NR2c-2B3MloEj6IavSbtWGdsForfshx-2FwZJx5JDDwCR-2Fpkrfjm-2Fg7K3YGgNGW-2FFCU0ToaDI-3D\">www.facebook.com\/avgaunz<\/a><\/li>\n<li>For security trends, \u00a0\u00a0\u00a0\u00a0 analysis, follow the AVG (AU\/NZ) blog at <a title=\"http:\/\/resources.avg.com.au\/\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=PrUcFyTZGhQqpu4Sjwq4FS8-2BdZ4gF-2Fzrk5HIui7hsy0lYguc5RG-2B0KczQvGU3ICn_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWrVLsqkg-2FchZ6rGdGsPhTXXzQFMsIzHkGl73zqsLn9bBL31V9DiA6ENVRX7KeCt0rQrhDJjo-2BbaNIP8qOnPf-2FDUPPqDSjRWXiSdwUB38ehf3HMSKdsOB8dwDPe2XTCdvOhmCZNkS-2FkJbUVlxA3CwQHezqLa96Pwqc5-2FOdIGJUCS-2BM-3D\">resources.avg.com.au<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>MELBOURNE, 27 June 2012 \u2014 AVG (AU\/NZ) Pty Ltd, distributor of AVG Technologies\u2019 award-winning AVG Internet and mobile security software in Australia, New Zealand and South Pacific, warns that many small- to medium-size businesses (SMBs) are still easy targets for cybercriminals. The recent Australian Business Assessment of Computer Use Security (ABACUS) survey from the Australian<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=21830\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-21830","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/21830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21830"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/21830\/revisions"}],"predecessor-version":[{"id":21831,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/21830\/revisions\/21831"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}