Six Cyber Security Myths
Believing cyber security myths may be putting your business at risk. Due to lack of awareness of the weaknesses or vulnerabilities in your business technology. Most importantly, with an increase in ransomware and other cyber threats, separating myth from fact may just save your business from becoming another casualty of cyber attacks. The following six cyber security myths are some of the most common ones we hear from business owners.
Our business is only small, so we’re not a ransomware target
Size does not matter. The automated infection process occurs because your system defences are weak or have vulnerabilities. Once they have you on the hook, the demands start.
If we pay the ransom, then the hackers will give our data back
While some may get their data back; many, especially small businesses, don’t.
Can you really expect anonymous untraceable criminals to keep their word?
Our system is backed up; therefore our data will be protected
Infections may lie dormant for months, and are likely included in your system backup.
So while backups restore your data, they may not rid your system of ransomware.
Because we have cyber insurance we can claim for all the costs
Your insurer expects you to minimise the risk and will assess claims accordingly.
Hidden costs, i.e. loss of profit and customers, brand damage, etc. won’t be covered.
Ransomware, like lightning, doesn’t strike the same place twice
When you pay a ransom, you’re known as an easy target and added to the sucker list.
Plus copies of your details and data gets marketed for sale on the Dark Web.
If the big companies can’t stop ransomware, then how can we?
The answer to all of these cyber security myths lies in two defences.
- Better security prevention to minimise infection risks.
- Security protection that stops ransomware infections from taking hold.
Eric Donn
Share this Article:
Recent Posts
DNS Server Management | Product Brief
DNS Server Management DNS Server Management is a specialised service for managing Domain Name System (DNS) connected devices, services and resources. In short, DNS translates alphanumeric web and email addresses
Was Your Security Breach Caused by Later Thinking?
Was your Security Breach Caused by Later Thinking? Later thinking is one of the most common causes of cybersecurity breaches, because “Later” never comes. During my several decades of working
Invoice Interception Scams Putting Businesses at Risk
Invoice Interception Scams Is Your Business at Risk? SECURITY BULLETIN 10.03.03 The occurrence of business invoice interception scams is rising at a rapid rate. This involves the scammer obtaining invoices