{"id":14048,"date":"2020-09-18T15:49:32","date_gmt":"2020-09-18T18:49:32","guid":{"rendered":"https:\/\/ostec.blog\/?p=14048"},"modified":"2020-10-02T11:16:42","modified_gmt":"2020-10-02T14:16:42","slug":"small-and-medium-sized-businesses-vulnerable","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/","title":{"rendered":"Are small and medium-sized businesses more vulnerable to cyber attacks?"},"content":{"rendered":"<p>The answer to the title question is yes. Small and medium-sized companies, for the most part, are more vulnerable compared to large corporations. As stated, this is not a rule, but an increasingly intense reality. Some research shows that 58% of invasions target small and medium-sized companies, which tend to have reduced resources for protection. There are several reasons, but all can be circumvented. With less financial power, they often have inadequate or insufficient solutions for protection. There is also the issue of a reduced number of employees, delegating IT tasks to employees without proper training or awareness \u2013 which can lead to work overload and possible neglects.<\/p>\n<p>Another reason for an increasing number of cyber attacks on small and medium-sized businesses is the fact that, in most cases, those responsible do not see themselves as potential targets. There is no denying the existence of the mistaken idea that crackers (malicious users) prefer to attack systems of large multinationals, seeking greater gains in a single invasion. However, the reality is not this. The famous law of least effort can be applied to cybercrime; the lower the security barriers to be overcome by invaders, the higher the assertiveness rate of the actions, so companies with these characteristics are the most targeted.<\/p>\n<h2>What can crackers do against small and medium-sized businesses?<\/h2>\n<p>There are several malicious activities that attackers invest. One of the most common is\u00a0<a href=\"https:\/\/ostec.blog\/seguranca-email\/proteger-ataques-phishing\">Phishing<\/a>. The name is an allusion to fishing. The use of\u00a0<i>Ph<\/i>\u00a0is due to an association with the word \u201cphreaking\u201d, which is the study and exploration of telecommunications systems. In phishing, the objective is to \u201ccatch\u201d important information and data through false messages. Criminals then obtain usernames, passwords, bank account details and credit cards. Fake emails with malicious links or files are used in this scam, and are increasingly similar to authentic emails. In the current era of social media, where almost everything is available, it is easy to obtain information to personalize attacks and make them more difficult to distinguish from routine activities.<\/p>\n<p>It is also important to highlight<span class=\"apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/ostec.blog\/seguranca-perimetro\/ransomware-como-se-proteger\">Ramsonware<\/a>. It is a type of malicious code that makes data stored on your computer, tablet or mobile phone inaccessible. Attackers use encryption and demand ransom payment to return access to the user. That is, a real kidnapping. For any company, a significant loss, as several sectors can be stopped due to Ransomware. In small and medium companies, the impact can be even greater. Propagation occurs through emails with infected files in the attachments, or by inducing the user to click on links \u2013 exploiting vulnerabilities in systems with poor security.<\/p>\n<p>Although less used, the attack known as DDoS is also a concern. Even though it is not exactly an invasion, it causes major headaches. After all, DDoS saturates the processing capacity of a computer or server, reducing or dropping the connection and leaving the company down. The name stands for Distributed Denial of Service, in which a master computer can manage hundreds of \u201czombie\u201d computers to assist in the attack. Everyone accesses a particular resource at the same time, until it is overloaded and inoperable. It\u2019s like gradually putting a giant load on a pickup truck until it stops walking and needs repairs. That is, your website, e-commerce or web application can go down even without being hacked \u2013 and still bring losses to your business.<\/p>\n<h2>How to be protected then?<\/h2>\n<p>Some investments will be necessary, as free solutions offer very low protection. And here are two more famous sayings: cheap is expensive and prevention is better than cure. So how about starting with a<span class=\"apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.ostec.com.br\/produto\/ostec-utm\">firewall<\/a>? In addition to protecting users, it also keeps the network protected, as it prevents threats from penetrating through a specific point and spreading.<\/p>\n<p>Even if small and medium-sized companies have more modest budgets, they should take into account investment in professionals with skills in digital security. Outsourcing is good business. There are several specialized companies that will help to provide security and agility in the administration of your business\u2019 digital assets \u2013 such as<span class=\"apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.ostec.com.br\/\">OSTEC<\/a>. Visit our website and discover the solutions that will help keep your company\u2019s results safe.<\/p>\n<p>As much as technology can help, we must not forget that it is made of people. It is necessary to train employees so that they have an attitude that prioritizes digital security. Many of the successful attacks rely on distraction or the lack of care of employees to gain access to private data. Employees should then be guided on the best practices, also creating procedures manuals, so that the security strategy is complete in the organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The answer to the title question is yes. Small and medium-sized companies, for the most part, are more vulnerable compared to large corporations. As stated, this is not a rule, but an increasingly intense reality. Some research shows that 58% of invasions target small and medium-sized companies, which tend to have reduced resources for protection. [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":14052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984],"tags":[],"class_list":["post-14048","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are small and medium-sized businesses more vulnerable to cyber attacks? - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are small and medium-sized businesses more vulnerable to cyber attacks? - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"The answer to the title question is yes. Small and medium-sized companies, for the most part, are more vulnerable compared to large corporations. As stated, this is not a rule, but an increasingly intense reality. Some research shows that 58% of invasions target small and medium-sized companies, which tend to have reduced resources for protection. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T18:49:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T14:16:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"Are small and medium-sized businesses more vulnerable to cyber attacks?\",\"datePublished\":\"2020-09-18T18:49:32+00:00\",\"dateModified\":\"2020-10-02T14:16:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\"},\"wordCount\":774,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\",\"url\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\",\"name\":\"Are small and medium-sized businesses more vulnerable to cyber attacks? - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg\",\"datePublished\":\"2020-09-18T18:49:32+00:00\",\"dateModified\":\"2020-10-02T14:16:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg\",\"width\":928,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are small and medium-sized businesses more vulnerable to cyber attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are small and medium-sized businesses more vulnerable to cyber attacks? - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/","og_locale":"en_US","og_type":"article","og_title":"Are small and medium-sized businesses more vulnerable to cyber attacks? - OSTEC | Seguran\u00e7a digital de resultados","og_description":"The answer to the title question is yes. Small and medium-sized companies, for the most part, are more vulnerable compared to large corporations. As stated, this is not a rule, but an increasingly intense reality. Some research shows that 58% of invasions target small and medium-sized companies, which tend to have reduced resources for protection. [&hellip;]","og_url":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-09-18T18:49:32+00:00","article_modified_time":"2020-10-02T14:16:42+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"Are small and medium-sized businesses more vulnerable to cyber attacks?","datePublished":"2020-09-18T18:49:32+00:00","dateModified":"2020-10-02T14:16:42+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/"},"wordCount":774,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg","articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/","url":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/","name":"Are small and medium-sized businesses more vulnerable to cyber attacks? - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg","datePublished":"2020-09-18T18:49:32+00:00","dateModified":"2020-10-02T14:16:42+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2019\/10\/dois-laptops.jpg","width":928,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/general\/small-and-medium-sized-businesses-vulnerable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Are small and medium-sized businesses more vulnerable to cyber attacks?"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=14048"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/14048\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/14052"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=14048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=14048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=14048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}