Is there a backdoor into your business?
Cybercriminals are using small businesses as a back door into larger enterprises. It’s commonly known as logistical fraud and is creating a cybersecurity blind spot in Australia. Here’s what you need to know.
With more than 2.1 million small businesses in Australia, it’s no wonder they’re perceived as the engine room of our national economy. While they have a pivotal role to play in advancing our financial future, many small business owners will freely admit that they’re not technology experts. This digital knowledge gap makes small businesses an attractive target for cybercriminals looking to use small businesses as a back door to acquire prized data from within larger enterprises. It’s commonly known as logistical fraud and is creating a cybersecurity blind spot in Australia, with many small businesses unwittingly acting as third-party providers to larger organisations.
U.S. retailer Target suffered a data breach when cybercriminals gained access to the retailer’s system by way of stolen credentials from a third-party vendor. Over 70 million customers had their data compromised. In Target’s 2016 annual financial report they stated that the total cost of the breach was USD $292 million. It’s fair to conclude that no one was knocking down the door to do business with the supplier at fault after this breach made headline news.
If you are a small business and not taking the necessary steps to secure your business, it could significantly jeopardise your relationships with existing customers. Additionally, irreversible reputational damage could mean losing important contracts with larger enterprises.
Our Canon Business Readiness Index suggests there is room for improvement when it comes to smaller businesses protecting their information security, revealing that smaller businesses are the least concerned about data security. It is possible that this stems from a general lack of awareness around the scale of cybersecurity issues, with only one in five (19%) conscious of and prepared for the national data breach notification scheme that came into effect in February.
The consensus among security professionals is that it’s now a case of ‘when’ and not ‘if’ businesses experiences a breach. The fact that half of Australian small businesses are only ‘slightly’ or ‘not at all’ concerned about potential upcoming breaches is a little concerning.
Mandatory data breach disclosure legislation increases the pressure on smaller providers to elevate their security controls in line with those of larger strategic business partners.
So what are some of the biggest threats facing businesses today?
Gone are the days of the Nigerian Prince scam. Adversaries have become more sophisticated and are wielding an array of techniques in an attempt to penetrate businesses. Which threats pose the greatest risk to small businesses and inadvertently the larger organisations they deal with?
Spear phishing – This is a social engineering technique designed to deceive users. It’s typically carried out by email spoofing. It often directs people to enter personal information into a fraudulent website. If executed by professional cybercriminals, the site will look and feel identical to the legitimate source with the only noticeable difference being the URL of the website in question. Earlier this year it was reported that real estate agents and home buyers in Victoria were being targeted. The scam asked home buyers to deposit funds into a bank account, with some losing more than $200,000.
Whaling – The term ‘whaling’ refers to the size of the targets relative to those of typical phishing attacks, specifically targets senior management such as the CEO, CFO or other executives who hold the keys to the kingdom. Whalers are likely to play a long game, watching and waiting, to really understand your people and your business. Their sophistication makes it easy to fall prey. In Austria, a CEO of an aircraft parts manufacturer was sacked after he fell victim to a whaling attack and lost his company more than $50 million AUD.
Ransomware – This is a type of malware which locks computers or files until people pay a ransom fee. Unfortunately, coughing up the pennies is no guarantee that cybercriminals will unlock files. The ransom demand usually pales in comparison to the cost of downtime these attacks cause. In May 2017, a worldwide ransomware attack dubbed WannaCry affected more than 200,000 computers across 150 countries. The estimated damage was measured in billions of dollars.
If in doubt, ask!
In a volatile and rapidly evolving threat landscape, how can you defend your business against these malicious attacks, protecting your vital business and customer data?
The Australian Signals Directorate’s Essential Eight (ASD8) is a good starting point. This is a list of practical actions that will help make your computers more secure. But security must also be part of your company culture to reduce the risk that Helen in procurement or Paul in marketing will unsuspectingly click on a malicious link. Everybody has a role to play.
When working with third-party suppliers, make sure you ask how they will protect your data. It’s essential to ensure they have adequate security controls and mechanisms in place. The rule of thumb is to ask now rather than getting a nasty surprise later. No one wants to fall victim to logistical fraud.
If you’re looking to bolster your defences, find out about Canon’s Security Solutions.
The first in a series of blogs on AI by Dr Jeroen Vendrig, from Canon Information Systems Research Australia (CISRA)
The second in a series of blogs by A.I. expert Dr Jeroen Vendrig
While email has become an everyday part of our work-life, you still might be doing it wrong.
For forward-thinking legal firms alternative legal services (ALT) an exciting opportunity to shape the future. Is ALT the next step for your practice?
Protecting your patient data is increasingly complex with threats of cyber-attacks and data breaches coming from both inside and outside your practice.
Canon’s uniFLOW print management software can connect with major practice management software
Managing your information security is a complex business. Like any device connected to your network, your printers could be jeopardising your information security if not implemented and managed carefully.
AI has shifted from being experimental technology to the mainstream. Here are six areas where AI is impacting the legal industry right now.
In this digital world, data management is a significant responsibility and a data breach is an equally significant risk. Should things go wrong, businesses must take steps to minimise the impact. With the changes to the Privacy Act coming into effect this week, Andrew Giles, Head of Public Relations and Communications for Canon Australia, shares insights on how to preserve trust and maintain strong customer relationships.
If you're on the Internet, you face security risks. You can no longer afford to assume that your business won't be a target because you're not big enough. Here are some big business takeaways that can substantially benefit your business' security.
Whether you’re leading a law firm or an alternative legal practice (ALT), blockchain is set to revolutionise the way you do business. You will soon be using it yourself or guiding your clients as they get to grips with it.