Contact Us Today!   314.394.3001   |   info@andersontech.com
Anderson Technologies
  • Home
  • Services
    • Overview
    • Managed IT Services
    • Cyber Security
    • System Administration
    • HIPAA Compliance Services
    • Ransomware Protection
    • Hardware & Software Consulting
    • Cloud Computing Services
    • Web Design
    • Anderson Archival
  • Industries
    • IT Support for Accountants
    • IT Support for Dental Offices
    • IT Support for Financial Services
    • IT Support for Architects and Engineers
    • IT Support for Manufacturing
    • IT Support for Nonprofits
  • Learn
    • What Are the Biggest Mobile Security Threats of 2020?
    • What Are Mobile Security Best Practices?
    • Battle of the Brands: Microsoft’s Office 365 vs. Google’s Workspace
    • What Does a Firewall Do for a Network?
    • How to Maintain Security When Employees Work Remotely
    • How to Protect Your Data from Ransomware
    • Comparing Mobile OS
    • What Is Phishing?
    • How to Identify Phishing and BEC Scam Emails
    • What Is MFA And Why Do I Need It?
    • How to Reduce Risk and Secure Your Internet of Things Devices
  • Training
  • Resources
    • Free Ebooks
    • Webinar: Cyber Security at Home: Protecting Your Business & Family
    • Newsletter Sign Up
  • About
    • About Us
    • What Our Clients Have To Say
    • Careers
  • Press
  • Blog
  • Contact
    • Contact Us
    • Free Consultation
    • HIPAA Services Inquiry
  • Help
  • Menu Menu
ZeroDayThreats

The Single Biggest Threat to Small Business Security: Zero-Day Threats

October 21, 2016/in Data Security /by Anderson Technologies

If you don’t know something exists, it’s hard to protect against it. Therein lies the challenge of zero-day threats, the technical term for cyber threats that capitalize on previously unidentified software vulnerabilities.

Developers in all industries are skilled at creating “patches” of code to correct vulnerabilities in their software once they’ve been identified, but cyber criminals are relentless in searching out new vulnerabilities and quick to pounce when they find one. The time between a hacker spotting a weakness and the software developer releasing a fix is when businesses are most susceptible to zero-day threats. During this period, cyber criminals seek to capitalize on the vulnerability by writing malware and distributing it via websites and emails that include fraudulent links or attachments. Even after cyber security firms identify an exploit and create a patch, a business could still fall victim before the software is updated.

Cyber Crime Targeting Small Businesses Is Increasing Rapidly

Zero-day threats are on the rise. In 2015, the number of identified zero-day vulnerabilities more than doubled to 54, a 125 percent increase from 2014, according to the 2016 Internet Security Threat Report by Symantec. That’s an average of more than one new threat per week.

Large enterprises are at the greatest risk, but small businesses are increasingly targeted. In 2015, 43 percent of cyber crimes targeted small businesses. The consequences of an attack can vary, but they typically include disruption in business operations, identity theft (when attackers gain access to confidential information), financial loss, and compromised or destroyed data.

Although it’s impossible to completely eliminate the threat posed by hackers, there are steps every small business should take to increase overall digital health and protect against zero-day threats.

  1. Install, maintain, and monitor an industrial-grade firewall.
  2. Use professional-grade anti-malware software on all devices attached to your network.
  3. Keep all computer systems updated with the latest security patches.
  4. Create strong passwords and change them regularly.
  5. Limit administrative rights on computers to necessary users.
  6. Educate your team about opening unknown or suspicious emails.

That last point is important. Often cyber attacks are waged by sending phishing emails to employees. Phishing tricks a recipient into downloading an attachment, clicking a fraudulent link, or sharing confidential information, such as a bank password. Phishing has evolved into spear-phishing, a more targeted and often convincing approach in which the sender pretends to be someone in the recipient’s life, such as a trusted colleague, vendor, or client. Last year, spear-phishing emails targeting employees increased by 55 percent, according to the Internet Security Threat Report.

A Key To Small Business Cybersecurity: The Thorough Backup

Backing up business-critical files regularly is a vital step in keeping your business secure, especially since ransomware attacks are on the rise. In this type of attack, perpetrators hold a business’s computer system hostage until a monetary sum is paid.

Sometimes ransomware threats can live undetected within a system for days, weeks, or even months. The longer they exist in the host environment, the more valuable they become to the perpetrator, who now has even more data to use as collateral.

However, it’s hard for cyber criminals to hold your business hostage if you have an ironclad backup system. Instead, you can work with your IT partner to wipe the system clean and start fresh from your last backup. Just be sure the backup files are severed from your network so they can’t be compromised, and routinely test your ability to effectively restore them.

Maintaining your small business’s cyber security is a full-time job, made all the more challenging by zero-day threats. By adopting cyber security best practices, you’ll decrease your business’s likelihood of falling victim to an attack. And if a determined hacker does make it into your network, you’ll have a much easier time recovering and mitigating damage costs if you have a properly configured backup system in place.

Do you have the right backup system for your business? Give Anderson Technologies a call today at 314.394.3001 to discuss backup processes and to work together to devise a plan for protecting against zero-day threats.

Contact Us

Tags: small business, zero-day threat
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail
You might also like
Internet of Things IOT Small Business Quotables: Should Small Businesses Invest in IoT? (Clutch)
Cyber security of elections If the Presidential Election Could Be Hacked, So Could Your Small Business
Busting Business Email Compromise
Website Development Small Business Build a Small Business Website That Exceeds Expectations
chaos-pixabay Network & Computer Audit for a Small Organization
Human Behavior Impacts Cyber Security [Updated for 2020] – “The Russians Have Hacked into Our Computer…” – Human Behavior and Cyber Security

Newsletter Signup



Recent Posts

  • Byte-Size Tech: Insure Against Tech Disaster
  • Work From Home – Who’s Flipping to Hybrid?
  • Byte-Size Tech: Don’t Get Zoom-Bombed!
  • 5 Tips for Security-Conscious Zooming
  • Byte-Size Tech: Employee Training Can Make Or Break Your Cybersecurity

Seeking IT support and managed services?
Get a free consultation today.

Contact Us

  • Home
  • Services
  • Resources
  • About
  • Blog
  • Contact
  • Help
  • Privacy Policy
ATI Logo
Phone: 314.394.3001
Email: info@andersontech.com

13523 Barrett Parkway Dr
Suite 120
St. Louis, MO 63021



© - Anderson Technologies
  • Home
  • Services
  • Resources
  • About
  • Blog
  • Contact
  • Help
  • Privacy Policy
Thinking About Skipping a Software Update? Think Again! SoftwareUpdates Inc-Magazine-Logo Quotables: Surviving a Ransomware Attack (Inc. Magazine)
Scroll to top
We use cookies to understand how you use our site. Click Accept to confirm your approval of this, or learn more in our Privacy Policy. Accept Privacy Policy
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

SAVE & ACCEPT