{"id":3078,"date":"2021-12-08T13:13:35","date_gmt":"2021-12-08T19:13:35","guid":{"rendered":"https:\/\/www.dmsi.com\/?p=3078"},"modified":"2022-10-21T12:33:17","modified_gmt":"2022-10-21T17:33:17","slug":"3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business","status":"publish","type":"post","link":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/","title":{"rendered":"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business)"},"content":{"rendered":"<p>At its core, cyber security is a people issue. Viruses don\u2019t magically appear in your company\u2019s system. They get there because of things employees do (or don\u2019t do), frequently without realizing it.<\/p>\n<p>Most people know the basic rules of cybersecurity: don\u2019t open suspicious attachments, don\u2019t click on suspicious links, don\u2019t give your bank account to anyone claiming to be a Nigerian prince, etc. But there are other ways people expose their businesses to risk, many of which are routine, seemingly harmless actions.<\/p>\n<p><strong>Risk 1: Traveling Devices<\/strong><br \/>\nComputer viruses spread kind of like human viruses. A cold virus spreads when a sick person comes into contact with a healthy person. When a computer virus gets into a network, it spreads into devices that connect to that network. If an infected device connects to other networks, the virus spreads again. This is why traveling devices such as laptops and USB thumb drives can be security risks.<\/p>\n<p>Laptops and thumb drives are routinely used outside your company\u2019s secure network. Sales reps take their laptops on sales trips and customer visits. Managers save files on thumb drives, so they can continue working at home. And while most businesses have decent firewalls, the average home network has expired anti-virus software, weak passwords, and kids who download things they shouldn\u2019t. In short, home networks are pretty vulnerable to malware. If a laptop or thumb drive picks up a virus and then goes back to the office, that virus can spread into the company network.<\/p>\n<p><strong>Risk 2: Mobile Apps<\/strong><br \/>\nMobile apps can legitimately improve productivity at work. With so many free options to choose from, people are building personal libraries of apps to track expenses, streamline their inboxes, and manage their passwords \u2013 all from their phones. While these apps are highly convenient, they can also make company information more vulnerable.<\/p>\n<p>Using outside apps for company business is like handing your wallet to a stranger. You have no control over how your information is used, stored, or protected. If anything happens to the app\u2019s publisher, your information is up for grabs. For example, in June 2017, the password management app OneLogin was hacked, giving the criminals access to thousands of people\u2019s user IDs and logins. When employees give third-parties access to their company email, financial data, and passwords, that information is less secure.<\/p>\n<p><strong>Risk 3: Outdated Software<\/strong><br \/>\nNew software isn\u2019t always a huge priority for businesses. \u201cI know the program is 10 years old,\u201d the thinking goes, \u201cbut it still works. Why should we pay for something new?\u201d The current generation of software programs aren\u2019t just faster and better, they\u2019re also more secure. Older software is often full of well-known security holes, which makes businesses running these programs attractive targets for hackers. For example, the WannaCry virus exploited a weakness in Microsoft Windows 7, an old operating system from 2009. Computers with the most current version of Windows were not vulnerable to the virus.<\/p>\n<p>To be fair, newer software also has security flaws. New products, however, are routinely updated with security patches to repair the holes. Here\u2019s the catch: in order for the security patches to work, end users have to install them. And end users, it turns out, aren\u2019t great about installing updates. The Equifax hack was traced to a known security flaw in a common web program. Even though Equifax was alerted to the issue, they waited months before taking action, giving hackers plenty of time to work. Had the company been more proactive, they may have been able to prevent the entire fiasco.<\/p>\n<p><strong>TWO WAYS TO IMPROVE SECURITY<\/strong><br \/>\nViruses, hackers, and software patches are all technology issues. But taking a laptop home, using outside apps, and ignoring security updates are all people issues. If you really want to improve cybersecurity, you need to address human behavior. (And, because humans aren\u2019t perfect, you need a contingency plan.)<\/p>\n<p><strong>Create a Cybersecurity Policy<\/strong><br \/>\nA cybersecurity policy is more than telling employees they can\u2019t look at Facebook. It\u2019s a proactive plan for how the business will protect its network and respond to security breaches. Some things the policy might include are:<\/p>\n<ul>\n<li>security programs the business will use<\/li>\n<li>processes for updating and maintaining those programs<\/li>\n<li>roles and ownership of these processes<\/li>\n<li>policies regarding user access and permissions<\/li>\n<li>policies for sharing information with third-parties (e.g. payment processors)<\/li>\n<li>employee training programs<\/li>\n<li>communication plans for security issues<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>The policy should also include an employee-specific section that explains how the policy affects them. This might include rules regarding the following:<\/p>\n<ul>\n<li>use of outside devices and web apps<\/li>\n<li>managing and updating passwords<\/li>\n<li>handling sensitive information (e.g. customer credit cards)<\/li>\n<li>appropriate internet usage<\/li>\n<li>reporting security incidents<\/li>\n<li>consequences for violating the policies<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>While documenting your policy is important, documentation alone won\u2019t lead to change. You need to actively engage with employees around this subject. Have educational sessions about cybersecurity. Explain the different ways hackers may attempt to attack your business, and teach employees to identify suspicious messages. (This is useful knowledge for their personal lives as well!) Describe the changes the company is making to improve security and their role in these changes.<\/p>\n<p><strong>Change Your Infrastructure<\/strong><br \/>\nChanging employee behavior is important, but there\u2019s no way to make any system 100% human-proof. People will make mistakes. This is why the second course of action is changing your infrastructure. More specifically, stop using an in-house server and move your data to the cloud. Using the cloud won\u2019t stop employees from opening a corrupt file, but it does protect your data in the event a breach happens.<\/p>\n<p>A lot of businesses don\u2019t trust the cloud. They want to have physical control over their technology because it feels safer. But private servers are actually the riskier option (unless you also have a full-time cybersecurity team). Keeping your data on a private server is like keeping your money in a shoebox. It\u2019s physically in your possession, but if a criminal breaks into your home, the shoebox is easy to steal. Using the cloud, on the other hand, is like keeping your money in a bank. You still have access to the money, but if a thief breaks into your home, there\u2019s nothing for him to steal.<\/p>\n<p>So, what\u2019s to keep viruses from getting into the \u201cbank\u201d? In a word, resources. Cybersecurity is expensive, which is why most businesses only have the basics. Data centers, however, invest heavily in sophisticated security tools and anti-virus software. They also provide 24-7 monitoring by cyber-security experts who constantly walk the (virtual) perimeter, checking for weaknesses and suspicious activity. Let\u2019s go back to the shoebox vs. bank analogy. Your only way of protecting that shoebox is to lock your front door. The bank, on the other hand, has locks on the door, cameras in the ceiling, and German Shepherds patrolling the lobby.<\/p>\n<p>Cybersecurity can seem overwhelming, especially if you don\u2019t have a technology background. But when you approach it as a people issue, it\u2019s a feasible project for any business to tackle.<\/p>\n<p><em>This article originally appeared in Building Products Digest.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At its core, cyber security is a people issue. Viruses don\u2019t magically appear in your company\u2019s system. They get there because of things employees do (or don\u2019t do), frequently without realizing it. Most people know the basic rules of cybersecurity: don\u2019t open suspicious attachments, don\u2019t click on suspicious links, don\u2019t give your bank account to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[97],"tags":[],"class_list":["post-3078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business) - DMSi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business) - DMSi\" \/>\n<meta property=\"og:description\" content=\"At its core, cyber security is a people issue. Viruses don\u2019t magically appear in your company\u2019s system. They get there because of things employees do (or don\u2019t do), frequently without realizing it. Most people know the basic rules of cybersecurity: don\u2019t open suspicious attachments, don\u2019t click on suspicious links, don\u2019t give your bank account to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"DMSi\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-08T19:13:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-21T17:33:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"882\" \/>\n\t<meta property=\"og:image:height\" content=\"605\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"jarant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jarant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/\",\"url\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/\",\"name\":\"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business) - DMSi\",\"isPartOf\":{\"@id\":\"https:\/\/www.dmsi.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg\",\"datePublished\":\"2021-12-08T19:13:35+00:00\",\"dateModified\":\"2022-10-21T17:33:17+00:00\",\"author\":{\"@id\":\"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#primaryimage\",\"url\":\"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg\",\"contentUrl\":\"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg\",\"width\":882,\"height\":605},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dmsi.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dmsi.com\/#website\",\"url\":\"https:\/\/www.dmsi.com\/\",\"name\":\"DMSi\",\"description\":\"Lumber Yard Inventory &amp; Accounting Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dmsi.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9\",\"name\":\"jarant\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dmsi.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g\",\"caption\":\"jarant\"},\"url\":\"https:\/\/www.dmsi.com\/resources\/author\/jarant\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business) - DMSi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/","og_locale":"en_US","og_type":"article","og_title":"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business) - DMSi","og_description":"At its core, cyber security is a people issue. Viruses don\u2019t magically appear in your company\u2019s system. They get there because of things employees do (or don\u2019t do), frequently without realizing it. Most people know the basic rules of cybersecurity: don\u2019t open suspicious attachments, don\u2019t click on suspicious links, don\u2019t give your bank account to [&hellip;]","og_url":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/","og_site_name":"DMSi","article_published_time":"2021-12-08T19:13:35+00:00","article_modified_time":"2022-10-21T17:33:17+00:00","og_image":[{"width":882,"height":605,"url":"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg","type":"image\/jpeg"}],"author":"jarant","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jarant","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/","url":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/","name":"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business) - DMSi","isPartOf":{"@id":"https:\/\/www.dmsi.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#primaryimage"},"image":{"@id":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg","datePublished":"2021-12-08T19:13:35+00:00","dateModified":"2022-10-21T17:33:17+00:00","author":{"@id":"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9"},"breadcrumb":{"@id":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#primaryimage","url":"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg","contentUrl":"https:\/\/www.dmsi.com\/wp-content\/uploads\/2021\/12\/hackers_web.jpg","width":882,"height":605},{"@type":"BreadcrumbList","@id":"https:\/\/www.dmsi.com\/resources\/3-surprising-ways-hackers-steal-your-data-and-2-strategies-to-protect-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dmsi.com\/"},{"@type":"ListItem","position":2,"name":"3 Surprising Ways Hackers Steal Your Data (And 2 Strategies to Protect Your Business)"}]},{"@type":"WebSite","@id":"https:\/\/www.dmsi.com\/#website","url":"https:\/\/www.dmsi.com\/","name":"DMSi","description":"Lumber Yard Inventory &amp; Accounting Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dmsi.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dmsi.com\/#\/schema\/person\/7bc7da501284b130770d91d1854f65d9","name":"jarant","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dmsi.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c3f154401c6e5c52b1ea271e6d93f2092f57305853df24423b91e308a3a78e8e?s=96&d=mm&r=g","caption":"jarant"},"url":"https:\/\/www.dmsi.com\/resources\/author\/jarant\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts\/3078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/comments?post=3078"}],"version-history":[{"count":4,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts\/3078\/revisions"}],"predecessor-version":[{"id":7034,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/posts\/3078\/revisions\/7034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/media\/3161"}],"wp:attachment":[{"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/media?parent=3078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/categories?post=3078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dmsi.com\/wp-json\/wp\/v2\/tags?post=3078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}