How can we help you today?
Business Consultants Let our experts help you find the right solution for your unique needs.
866-227-1474 Hours: M-F 8am-9pm ET
Hours: 24/7
Product Support We're here to help with setup, technical questions, and more.
Hours: 24/7

5 Things Your Small Business Can Learn from the Yahoo Hackers

Recently, Yahoo announced a privacy breach of its systems that resulted in approximately one billion of its users exposed to criminal hackers. Surprising? It shouldn't be. It may sound like something out of a 1990's thriller, but organized cybercrime is a real threat against even the biggest corporations.  

However, according to a recent study by Symantec, attacks against large enterprises have slightly decreased while attacks geared towards small businesses have spiked. In fact, cyber attacks targeting businesses with under 250 employees or less doubled in the first six months of last year.The average loss per attack? More than $188,000. 

Unfortunately, keeping up with the constant threat of harmful online attacks is time-consuming and can require a degree in Web development. As a small business owner, your time is valuable and shouldn't be spent preventing malicious online attacks. Follow this 5 step playbook (courtesy of BBB Cybersecurity) to keep your business secure. Or, if you're a WordPress user, protect your site from hackers with this worry-free security system.


Step 1: Identify

Take inventory of key technologies you use and know what information you need to rebuild your infrastructure from scratch. Inventory the key data you use and store and keep track of likely threats.

Step 2: Protect
Assess what protective measures you need to have in place to be as prepared as possible for a cyber incident. Put protective policies in place for technologies, data and users, and ensure that your contracts with cloud and other technology service providers include the same protections.

Step 3: Detect
Put measures in place to alert you of current or imminent threats to system integrity, or loss or compromise of data. Train your users to identify and speedily report incidents.

Step 4: Respond
Make and practice an Incidence Response Plan to contain an attack or incident and maintain business operations in the short term.

Step 5: Recover
Know what to do to return to normal business operations after an incident. Protect sensitive data and your business reputation over the long term.