Some things that cybercriminals are after are obvious: social security numbers, dates of birth, customer names, credit card numbers. Others may surprise you. Criminals attempt to hack into company computer systems for any number of reasons, which is why it's important to take steps to help keep your critical data secure.
7 Things the Bad Guys Could Be After
1. Access to Other SMBs Data
If your business uses QuickBooks online, for example, it may contain EINs and receivables data for hundreds of other small and mid-sized businesses. This provides criminals with additional inroads into future targets through the back door of your business.
2. Email Addresses of Employees
These can be used for future phishing scams or sold to companies selling products.
3. Intellectual Property
SMBs hold patents, trademarks, and other forms of intellectual property that can be stolen by cyber intruders. Companies in other countries with less stringent IP laws manufacture the goods based on stolen IP, for example, threatening a business’ protection of their patent.
4. Bank Account Information
If your firm regularly handles wire transfers to pay or receives payments, thieves scoop up the data to use them to ‘rob’ bank accounts through virtual transfers.
5. File for Fraudulent Tax Returns
Data captured by criminals has been used for IRS scams and fraudulent tax returns.
6. Health insurance and Medicaid Fraud
Medical, dental, and psychiatric practices, hospitals, healthcare centers, nursing homes, and medical companies may contain vital information on health insurance and Medicaid reimbursement that criminals use to commit insurance or Medicaid fraud.
7. Corporate Espionage
Stealing secrets isn’t limited to governments. Secrets may be strategic plans, customer lists, or product development ideas that can be sold to third parties.
What Else Could Cybercriminals Want?
For these seven items thieves are after, there are probably 77 more hidden within your corporate files that can be sold, exploited, or shared to your company’s detriment.
To use an analogy, consider your home. Inside your home are items of obvious resale value, such as televisions, electronics, computers, and jewelry. But you may not remember the nearly-empty bottle of prescription painkillers in the medicine cabinet from when your son had his wisdom teeth extracted. A thief can sell five pills on the street for money. You may have power tools in the basement that you use rarely, but these can also be sold. And the keys to your backyard shed hanging up in the kitchen make it easy for thieves to break into that outbuilding and steal the lawn mower.
Your company is like your home. There are obvious items of value for resale, but there are also items you might not consider valuable that thieves do. Like protecting your home with solid locks, stout doors, cameras, and alarm systems, cybersecurity protects against intrusion and guards everything within.
Cloud Solutions Can Help Protect Your Data
At Summit Hosting, we take data protection serious, and you should too. We use top tier encryption technology to provide the highest level of data protection, solid state drives for storage and house all of our equipment in data centers with multiple levels of security.