All Articles Finance Combating cybersecurity threats

Sponsored

Combating cybersecurity threats

Find out how your business can combat cyber crime

4 min read

Finance

cyber security

Pixaby

With about half of cyber attacks occurring at businesses with revenue of $50 million to $1 billion, it’s not just a problem for the largest firms.[1] Tackling these issues is imperative, with cyber crime costing U.S. companies $17.4 million in 2016, according to a study by the Ponemon Institute.[2]

The majority of breaches occur from computer hacks (34%) and stolen credit card information (31%).[3] Companies also reported attacks including website hacks (17%), network breaches (13%), bank account hacks (10%) and third-party hacks (7%).

But cyber attacks are constantly shifting, so understanding some of the most common ways fraudsters steal information is critical for protecting your company and customers.

Other types of security breaches include:

  • Phishing or email scams: One  of the most common security breaches, these emails asking for proprietary information, account numbers and other personal data increased 55% in 2015, according to Symantec[4]
  • Ransomware: This is where a cybercriminal encrypts a company’s files and demands payment for their return. These types of attacks are on the rise, increasing 35% in 2015.[5]
  • Server attacks: These attacks overload servers with requests, with the aim of shutting down systems such as websites or networks.[6]

But there are steps that executives can take to protect their companies from these online threats. Ways to thwart cyber attacks include:

  • Update software and protection programs. Running the latest programs and keeping your protection software up-to-date is a critical first step to protecting your company and valuable data.[7]
  • Train your employees. Make sure your employees understand the importance of having complex passwords and changing them every 60 to 90 days. Staff should also be able to recognize suspicious emails and other requests for information that should be flagged, such as those asking for account numbers or personal information, or ones containing suspicious attachments or suspect links.[8]
  • Develop a response plan and practice it. This written plan should be tailored to your company and identify attack scenarios and responses. The plan should address: who is on the response team, reporting, initial steps to take, investigation procedures, recovery, follow-up, public relations and working with law enforcement. It’s also critical that everyone on the team understands and practices responses before attacks occur.[9]

Your financial institution can also be an important partner in helping spot and prevent cyber attacks. Working with your bank to securely process payments, implement best practices for bill pay and payroll, and safeguard access to financial accounts can help strengthen your defenses against online attacks.

The good news is that we’re always here for you. The SunTrust OneTeam Approach brings an integrated team with the right expertise to help you achieve smart growth. Your team members work collaboratively to help you pursue your goals and solve issues.

For more information, please visit our website.

 


[1] http://chiefexecutive.net/4-common-misconceptions-mid-market-firms-cyber-risk/

[2] http://tinyurl.com/h3hzeke

[3] http://www.nsba.biz/wp-content/uploads/2016/02/Year-End-Economic-Report-2015.pdf

[4] https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf?aid=elq_&om_sem_kw=elq_16709675&om_ext_cid=biz_email_elq_&elqTrackId=3f9e79f4cbf14b9a9d39e52f9e438f5f&elqaid=2902&elqat=2

[5] https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf?aid=elq_&om_sem_kw=elq_16709675&om_ext_cid=biz_email_elq_&elqTrackId=3f9e79f4cbf14b9a9d39e52f9e438f5f&elqaid=2902&elqat=2

[6] http://www.businessnewsdaily.com/8231-small-business-cybersecurity-guide.html#solutions

[7] http://www.forbes.com/sites/franksorrentino/2015/10/26/cyber-attacks-5-ways-small-businesses-can-protect-themselves/#41bd229c2ae2

[8] https://www.entrepreneur.com/article/245102

[9] https://www.hklaw.com/files/Publication/bd9553c5-284f-4175-87d2-849aa07920d3/Presentation/PublicationAttachment/1880b6d6-eae2-4b57-8a97-9f4fb1f58b36/CyberAttacksPreventionandProactiveResponses.pdf