" keeping business safe from cybercrime Archives - LuxSci FYI Blog: Learn about HIPAA email encryption, secure email encryption, and more

Posts Tagged ‘keeping business safe from cybercrime’

The Cyber Security Struggle: Are SMEs Safe?

Tuesday, October 23rd, 2018

Smaller organizations have a lot on their plates. They face many of the same pressures and threats as enterprises, but their scale often means that they lack both the skills and resources to properly address these problems.

When it comes to cyber security, SME (Small-to-Medium Enterprise) attitudes can be all over the place. Some don’t put much thought into it, thinking that they’re too small to be a target. Cyber threats may not even be on their radar, especially if they’ve been lucky enough to avoid being attacked so far.

Other companies take the threats more seriously but don’t know how to defend themselves appropriately. This can be a significant challenge, particularly if they don’t have any security experts on their staff.


SMEs also tend to lack a Chief Information Officer (CIO) and a Chief Information Security Officer (CISO) which means that their IT teams often report to business management. Unfortunately, many management teams don’t have the relevant IT knowledge and they may not understand the cyber security issues that their company faces. This makes it a challenge to form adequate policy and to allocate the necessary funds for defenses.

If your company’s approach to security is similar to any of these situations, it faces significant risks. The chances of cyber attacks are much higher than many small businesses like to believe. According to a Ponemon Institute survey conducted on IT personnel from SMEs, 61% of the respondents reported a cyber attack against the business they worked for.

Read the rest of this post »

Best Practices for Minimizing the Impact of Social Engineering on Your Organization

Tuesday, June 26th, 2018

When many people think of cybercrime, they think of a bearded guy beating away at his keyboard in a dark room, searching for vulnerabilities in the network that can be exploited. While exploits are a big threat, the reality is that many attacks happen in smoother and more subtle ways. Why spend days slaving away to get in the backdoor, when you can just ask nicely to be let in through the front? This is the essence of social engineering.

social engineering impact


A social engineer uses a wide range of tactics to manipulate their victims into giving up whatever information they need. Imagine that someone with a police uniform knocks on your door and asks to have a word. They look authoritative, so you invite them in to sit down. They spend five minutes discussing crime in the neighborhood and on the way out, they secretly swipe the spare key. A few days later, you come back home to discover that all of your valuables are gone.

In this case, the social engineer tricked their way into the home by using the authority of the police uniform, which many people respect or even fear. Most people won’t think to turn down a police officer’s requests, or to ask for further identification. The attacker took advantage of this to gain access to the house, where they could get what they wanted, the spare key.

Read the rest of this post »