2018’s Cybersecurity Update

2018’s Cybersecurity Update

Cybersecurity has changed considerably since 2017, and any business that wants to survive in the evolving online environment needs to consider how they are protecting their assets. We want to take a look at precisely how cybersecurity has changed since 2017, including some of the notable statistics regarding the current state of online threats for today’s businesses.

The Internet of Things Continues to Grow
Connected devices are everywhere, and at this point, it’s unlikely that it will go away anytime soon. To account for this continuously growing trend, businesses have taken to optimizing security to accommodate them. It’s safe to say that it doesn’t matter which industry a business falls in; the majority of businesses utilize the Internet of Things to at least some extent, but whether or not they are protecting themselves is another story altogether. Ultimately, it boils down to risk versus reward. Is your business willing to compromise security just to use IoT devices, or are you willing to ensure that they don’t become a risk for your business?

Ransomware, While Still Dangerous, Isn’t as Common
2017 was the year of ransomware, and while it’s still a problem for many organizations, in 2018 it wasn’t nearly the problem that it was last year. As of last December, according to Malwarebytes, the rate of infection for ransomware had dropped to about 10%, which is a substantial decrease. Still, it’s best to prepare for it ahead of time if you want to make sure your organization can survive a brush with this type of malware.

Cryptomining is King
The next big thing to come from 2018 is a major increase in cryptomining malware, which can install itself on a device and remotely activate to mine bitcoin without the user’s knowledge. This can have various side-effects on the device that might manifest in different ways, such as slow device speeds and otherwise labored usage.

Security is More Proactive as a Whole
Too often businesses wait too long to address specific problems with their security measures. This can take the form of anything from failing to administer a patch or security update as soon as possible, to letting a threat remain unaddressed on your network without knowing it exists. Rather than take a reactive stance to security, businesses have been dedicating themselves to proactive security measures to offset the risk of being affected by threats.

A new survey released by IDG showcases the security priorities of all kinds of businesses. The respondents to this survey claimed that they found the following aspects important to maintain a healthy, proactive stance on network security:

  • 74%: Best practices
  • 69%: Compliance mandates
  • 36%: Responding to a security incident that occurred in their own organization
  • 33%: Mandates from the board of directors
  • 29%: Responding to a security incident that occurred in another organization

How has your business taken steps toward network security? White Mountain IT Services can help you make sure your organization’s security doesn’t hold you back from reaching your goals. To learn more, reach out to us at 603-889-0800.

Related Articles

  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
  • A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
  • Could Your Router be Infected with Malware? Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in term...
  • Can You Spot the Signs of a Malicious Link? The Internet is notorious for being a minefield of threats, many of which lurk hidden behind innocent-looking links. In order to go about business safely, you need to be able to identify which links you can click; and, which should be skipped. Unfortunately, spotting fraudulent links isn’t an exact...
  • FREE Printout: Dos and Don’ts of IT Security The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas. You work on important things. Let’s all work togeth...
  • Is Your Password Security Up to Par? Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be gues...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions