Marriott, Target, Home Depot and others have made headlines in recent years for data breaches that affected millions of customers. But did you know that 43 percent of breaches hit small businesses? Limited resources and lack of expertise often leave security gaps in smaller organizations, compounded by weak passwords and other risky practices.
For instance, in the Target attack, hackers stole credentials from a much smaller company in the retailer’s supply chain. They then used the stolen credentials to access Target’s network. Sadly, similar scenarios play out over and over again. And users make the job much easier for criminals by opting for convenience over security.
No business wants hackers in their system. But unfortunately, by continuing to allow weak passwords, they leave the welcome mat out and the door unlocked. Consider whether you have seen any of these common password mistakes in your business.
For instance, do multiple techs share passwords for privileged accounts or keep a list of passwords stored in a spreadsheet? Perhaps you or other employees re-use passwords to avoid trying to remember dozens of different credentials. These password practices may save some time in the short term, but they leave your business vulnerable to attack.
According to the most recent Verizon Data Breach Investigations Report (DBIR), compromised credentials play a factor in 80 percent of hacking-related data breaches. Cyber criminals exploit weak passwords in several different ways. Some of the most common include:
In addition, leaving passwords on sticky notes or in publicly available files leaves users and businesses open for more targeted attacks. Consider the password posted next to a server or PC. Anyone with physical access to the computer can then gain access to the network.
The Ponemon Institute reports that the average cost of a data breach has risen to $3.92 million. Add to that the inevitable damage to business reputation, and the loss can prove catastrophic for a small business.
Businesses that take steps to ensure against weak passwords significantly strengthen their defense against cyber attack. The Verizon report urges the use of multi-factor authentication and password managers. In addition, password policies should emphasize and enforce good password hygiene, particularly for privileged accounts.
The data security experts at eMazzanti have helped hundreds of small businesses implement comprehensive cyber security. We keep up-to-date on the latest developments in business security so that we can customize a solution built for your needs.
As we move deeper into 2025, you are probably focusing on ways to expand your…
As we move deeper into 2025, you are probably focusing on ways to expand your…
Introducing eCare Bot: Your Intelligent IT Support Assistant In today's fast-paced world, the emergence of…
At eMazzanti Technologies, we recognize that stable, effective, and expandable servers are essential to the seamless operation of enterprises. For this reason, we collaborate with Hewlett Packard Enterprise (HPE) to offer our clients the best server solutions possible, customized to meet their unique requirements. HPE servers provide the performance and flexibility required for small and big businesses to manage data, support apps, and manage workloads with ease. Customers may choose the best HPE servers for their organization with the assistance of our team of specialists. We take the time to comprehend the particular needs of every client, including those related to processing speed, storage capacity, and security features. Whether our clients require a general-purpose ProLiant server or a…
AI writing tools have become popular for creating content quickly. But many readers can spot…
Data analytics is changing the game for businesses of all types, including old-school industries that…