Security Problems That Shape the Way Businesses View Cybersecurity in 2015

July 1, 2015

b2ap3_thumbnail_data_security_400.jpgSo far, 2015 has been relatively calm compared to the hack-fest that was 2014. However, we’re only halfway through the year, and there’s still plenty of time for hackers to make short work of networks. Remember, all it takes is a single mistake to expose your business’s network to a host of different threats. Understanding what these threats are and how to handle them is of the utmost importance.

Calyptix Security explains in-depth how some of these threats will react to the measures taken by even the most cautious businesses.

Phishing Emails Often Pose as Your IT Department
Hackers are thinking logically when it comes to phishing scams, and who better to impersonate than your trusted IT department? They realize that you’ll turn to them for help, and that you might willingly give away credentials to your IT department in order to access your infrastructure to perform “maintenance” or “resolve a critical issue.” If you feel your IT department shouldn’t be privy to certain information they are requesting, or if you receive suspicious emails from them concerning the integrity of your network, reach out to them via the phone number you have on record, rather than the one which might be in the email you’ve received.

Hackers Won’t Need Your Card to Scam You
Believe it or not, card-not-present (CNP) fraud is the real deal, and growing more common. According to Verizon’s 2015 PCI compliance report, payment fraud due to lost or stolen cards is decreasing, while fraud stemming from CNP situations only grows more prevalent.

security4

These statistics reflect a shift in the manner through which hackers steal information (at least, in Canada it does). This change in tactics likely reflects hackers’ adaptation to the increase in card security.

VPNs Are Being Targeted
Some VPNs can be cracked if the hacker has access to sophisticated tools. One way this happens is when you use a VPN that only requires a username and password, rather than a more secure one which also uses two-factor authentication. It’s recommended that you always use two-factor authentication, especially when accessing corporate data through a mobile device.

Retail and Financial Hacks Are Growing More Common
Many big-box stores, like Target and Home Depot, have been hacked over the past year, and this trend will only continue in 2015. In fact, not too long ago, the IRS was hacked in an event which allowed hackers to access tax information for over 100,000 taxpayers. Businesses that take advantage of POS (point-of-sale) systems like cash registers and card readers will need to emphasize security and make it a top priority. Otherwise, you could face fines for allowing financial information like credit card numbers and Social Security numbers of customers to get stolen, which nobody will be happy to find out.

If you’re not sure how to take the fight to 2015’s security threats, there’s still time to get your network security situation under control. Give CTN Solutions a call at (610) 828- 5500 to learn more.

Contact CTN

Office

610 Sentry Parkway

Suite 110

Blue Bell, Pennsylvania 19422

Call Us

(610) 828- 5500

14 + 13 =

Skip to content