Get All Access for $5/mo

3 Biggest Cybersecurity Threats Facing Small Businesses Right Now Nearly two-thirds of businesses suffered a cybercrime in the past year. There is no reason to think there will be fewer this year.

By Brendan M. Egan

Opinions expressed by Entrepreneur contributors are their own.

Bill Hinton | Getty Images

Technology has quickly engulfed the world around us. Everything we do, both at a business and personal level, seems to involve technology in one way or another. However, as that happens, small businesses continue to be a top target for hackers, with the number of organizations hit by cybercrime rising each year. According to The Ponemon Institute's 2017 State of Cybersecurity in Small & Medium-Sized Businesses report, 61 percent of businesses experienced a cyber attack in 2017, signifying a 6 percent increase from the previous year's 55 percent. Data breaches were up to 54 percent from 50 percent in 2016.

This year promises faster internet, more connectivity, and unfortunately, more cybersecurity threats. Threat Horizon 2018, from the Threat Horizon series by the non-profit association Information Security Forum (ISF), shows that with the growing connectivity, there will be an increase in the information security threat landscape.

1. Internet of Things (IoT) leaks.

As real-time data collection becomes increasingly important, the IoT is growing too. From monitoring traffic and collecting real-time patient information to optimizing the uptime of industrial equipment, organizations are massively acquiring IoT devices. However, these devices aren't always secure. This creates a potential backdoor into the organization, warns the ISF.

Related: How Smart Technology is on the Verge of Compromising Your Business Security

IoT works so great because it's comprised of dozens of devices that hide in plain sight. Be it alarm systems, GPS, web cameras, HVAC or medical devices, such as pacemakers, it'd be hard to guess which of these devices are even connected to the internet in the first place. But since IoT devices lack built-in security, they are often easy targets by hackers.

Attackers usually use automated programs to locate IoT devices. Once located, attackers attempt to connect to the device using the default admin credentials. And since most users don't change them, this is usually a success for the attacker. Once in, the hackers can easily install malware, basically taking the system under their control.

Daniel Soderberg, CEO of EyeOnPass, advises changing all passwords immediately when you acquire a new device. "I wouldn't operate any device with the default password," he warns. "Default passwords are usually printed and freely available, exposing the user to all manner of cyber dangers."

2. Opaque algorithms.

The Threat Horizon 2018 report also warns of the increasing using of algorithms. As organizations continue to fully trust algorithms with the operation and decisions concerning critical systems, the report says, they lose the visibility into the functioning and interaction of their systems.

The lack of proper and transparent interactions between algorithms poses a security risk in case unintended interactions between algorithms create incidents -- like the U.S. Treasury Bonds "flash crash" of October 2014 that saw bond yields drastically drop briefly before the algorithms corrected themselves.

"We know they're going to do some quirky stuff from time-to-time," says Steve Durbin, managing director of the ISF. "You need to understand some of the exposure you have to algorithmic systems. We're building more and more of our systems on top of algorithms -- industrial control, critical infrastructure. There's an increasing risk in this space we need to be addressing."

Related: 10 Artificial Intelligence Trends to Watch in 2018

To be able to manage these risks, organizations need to have a human monitoring the execution of operations and decisions often left to algorithms. The report advises organizations to know the risks that come with algorithm-controlled systems and know when to involve a human. Also, they must update their code maintenance policies and identify alternatives to treating algorithm-related incidents, especially when insurance isn't an option.

3. Security researchers are being silenced.

Security researchers are often the whistleblowers. They impart knowledge about digital vulnerabilities, making sure systems are secure and users' data remains in the intended hands. When they are silenced, either by the government or private companies, it's often a loss for all users.

With software replacing hardware in most major sectors, users and businesses depend on researchers to unearth vulnerabilities and make them public as part of ongoing efforts to improve security. However, lately, manufacturers have been responding to such actions by taking legal action instead of working with the research to fix those vulnerabilities. The ISF predicts that this trend will only grow; exposing customers to vulnerabilities that manufacturers have decided to hide rather than fix.

To protect themselves, the ISF advises technology buyers, which include small businesses, to insist on transparency during the procurement process. It advises manufacturers to take it more positively when vulnerabilities are found within their systems by rewarding the researchers rather than attempting to punish them.

Considering that a researcher might find a vulnerability in a tool in 2018 and not report it, it's imperative for the small business owner to take a step further in protecting themselves, even if it means working with other business in order to come up with an affordable solution.

Related: Making Your Data Unreadable to Whoever Steals It Might Be the Only Way to Keep It Safe

Transparency is key.

When it comes to security, transparency has a great role to play. But this part has long been left for the security professionals. If all users reflected some degree of transparency, security in the cyberspace would be easier to achieve. If the non-technical managers and leaders understood the impact of good and poor protection, they would use the cyber assets they have more responsibly. Employees would be more careful about the devices they introduce to the network.

As the business owner, it's your job to carefully manage the inventory of the connected IoT devices. "Some things have internet capabilities that you didn't ask for and will never use," says Leon Adato of SolarWinds adding that any devices that don't need to be connected to the internet should be disconnected.

Brendan M. Egan

Founder & CEO of Simple SEO Group

Brendan Egan is an entrepreneur involved in more than a dozen startup companies. His primary focus is running Simple SEO Group, a digital marketing and web development company he founded nearly a decade ago. He published his first book, "101 Tips From The Marketing Masters," in early 2020.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Science & Technology

5 Automation Strategies Every Small Business Should Follow

It's time we make IT automation work for us: streamline processes, boost efficiency and drive growth with the right tools and strategy.

Business News

Former Steve Jobs Intern Says This Is How He Would Have Approached AI

The former intern is now the CEO of AI and data company DataStax.

Leadership

Visionaries or Vague Promises? Why Companies Fail Without Leaders Who See Beyond the Bottom Line

Visionary leaders turn bold ideas into lasting impact by building resilience, clarity and future-ready teams.

Marketing

5 Critical Mistakes to Avoid When Giving a Presentation

Are you tired of enduring dull presentations? Over the years, I have compiled a list of common presentation mistakes and how to avoid them. Here are my top five tips.

Side Hustle

'Hustling Every Day': These Friends Started a Side Hustle With $2,500 Each — It 'Snowballed' to Over $500,000 and Became a Multimillion-Dollar Brand

Paris Emily Nicholson and Saskia Teje Jenkins had a 2020 brainstorm session that led to a lucrative business.

Green Entrepreneur®

How Global Business Leaders Can Build a Sustainable Supply Chain

Businesses can build sustainable supply chains by leveraging technology to reduce environmental impact, optimize resources and track emissions while balancing operational efficiency and sustainability goals.