{"id":30425,"date":"2022-06-27T19:22:06","date_gmt":"2022-06-27T23:22:06","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/smb-five-reasons-to-protect-yourself\/30425\/"},"modified":"2022-06-29T11:07:39","modified_gmt":"2022-06-29T09:07:39","slug":"smb-five-reasons-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/smb-five-reasons-to-protect-yourself\/30425\/","title":{"rendered":"Five reasons to protect small business from cyberthreats"},"content":{"rendered":"<p>Small business owners often believe that their companies are not all that interesting as targets for cybercriminals. Indeed, on the one hand, there is less potential benefit for the cybercriminals from an attack on such organizations. On the other, small businesses have much smaller budgets for cybersecurity, and, as a rule, have no dedicated information security specialist at all. That greatly increases the chances of a successful attack. But these are all theoretical considerations. Let\u2019s take a closer look at five real reasons why a small company can become the victim of a cyberattack.<\/p>\n<h2>The existence of an initial-access market<\/h2>\n<p>Our experts recently investigated the shadow market for initial access to corporate infrastructure. According to the <a href=\"https:\/\/securelist.com\/initial-access-data-price-on-the-dark-web\/106740\/\" target=\"_blank\" rel=\"noopener\">results of their study<\/a>, most of the ads posted on the darkweb offer access to small companies. In practice, this means that attackers won\u2019t waste time or resources on attack preparation \u2014 they\u2019ll simply purchase access from initial-access brokers, and use it to infect your computers with malware or steal confidential information.<\/p>\n<h2>Malicious mailouts<\/h2>\n<p>Phishing emails and malicious attachments are not necessarily sent directly to employees of a company. Sometimes attackers collect email addresses related to some industry, and sometimes they simply send them to a broad list of recipients. One way or another, among the recipients of such emails may be employees of any company, including SMBs.<\/p>\n<h2>Financial malware<\/h2>\n<p>Financial malware is usually used to steal credentials from online banking services or payment systems. The size of a victim-company isn\u2019t so important for attackers \u2014 even the data of individual users is of interest to them. Furthermore, according to the <a href=\"https:\/\/securelist.com\/financial-cyberthreats-in-2021\/105898\/\" target=\"_blank\" rel=\"noopener\">Financial Cyberthreats in 2021<\/a> report, small businesses make up a large percentage of those victimized by cybercriminal groups like Zbot, SpyEye, CliptoShuffler and Emotet.<\/p>\n<h2>Mass epidemics<\/h2>\n<p>The <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-and-embedded\/16604\/\" target=\"_blank\" rel=\"noopener nofollow\">WannaCry<\/a> epidemic occurred more than five years ago, but its legacy is still felt today: any vulnerability that experts call \u201cwormable\u201d (i.e., can be used for spreading malware over a local network), inevitably causes media hype. If malware has the functionality of a worm, then a single infected device (for example, a laptop that was infected at someone\u2019s home) can compromise the entire corporate network.<\/p>\n<h2>Supply-chain attacks<\/h2>\n<p>Every now and then there\u2019s <a href=\"https:\/\/threatpost.com\/malicious-npm-packages-web-apps\/178137\/\" target=\"_blank\" rel=\"noopener nofollow\">news<\/a> of new malicious packages found in various code repositories. Software developers can embed these packages into their products and unwillingly compromise their customers. The developer\u2019s infrastructure itself can also be hacked in order to implant malware into the its final product. As a result, a program that your company has been using for years can suddenly become malicious. This is called a supply-chain attack. A textbook example of one is the story of ExPetr. Attackers compromised the automatic update system of the M.E.Doc bank reporting program, and sent the ExPetr cryptor\/wiper to all its customers, both large and small.<\/p>\n<h2>How to protect a small company<\/h2>\n<p>To protect a small business from modern-day cyberthreats, it\u2019s not necessary to buy expensive security products with features you don\u2019t need. An ideal solution for protecting a company with several employees is a freshly updated Kaspersky Small Office Security.<\/p>\n<p>Kaspersky Small Office Security doesn\u2019t require an expert to configure it, which is convenient for owners of small businesses that don\u2019t have full-time IT specialists. The solution allows you to protect devices on Windows, Mac and Android platforms and also file servers. It has a modern anti-phishing engine and advanced technologies to protect against ransomware. You can learn more about it <a href=\"https:\/\/www.kaspersky.co.za\/small-business-security\/small-office-security?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_banner____ksos___\" target=\"_blank\" rel=\"noopener\"> on the solution webpage<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Five arguments in favor of installing security solutions on the endpoints of a small company.<\/p>\n","protected":false},"author":2581,"featured_media":30426,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[1616,76,420,2304,2889],"class_list":{"0":"post-30425","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-access","10":"tag-phishing","11":"tag-ransomware","12":"tag-smb","13":"tag-supply-chain"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smb-five-reasons-to-protect-yourself\/30425\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/smb-five-reasons-to-protect-yourself\/24311\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/smb-five-reasons-to-protect-yourself\/19779\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/smb-five-reasons-to-protect-yourself\/26675\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/smb-five-reasons-to-protect-yourself\/24613\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/smb-five-reasons-to-protect-yourself\/27335\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/smb-five-reasons-to-protect-yourself\/33386\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/smb-five-reasons-to-protect-yourself\/10809\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smb-five-reasons-to-protect-yourself\/44729\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/smb-five-reasons-to-protect-yourself\/19100\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/smb-five-reasons-to-protect-yourself\/19655\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/smb-five-reasons-to-protect-yourself\/28951\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/smb-five-reasons-to-protect-yourself\/25162\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smb-five-reasons-to-protect-yourself\/30676\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/smb\/","name":"SMB"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/30425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=30425"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/30425\/revisions"}],"predecessor-version":[{"id":30430,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/30425\/revisions\/30430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/30426"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=30425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=30425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=30425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}