Welcome, let's improve your business today!
We’ve become aware of a concerning phenomenon: the perception that a business that has already been targeted by a cyberattack, won’t be attacked again. We are here to tell you that this is not the case.
Let’s explore just how wrong this assumption is, and what you should actually do about it.
It really is odd; how many businesses seem to act under the assumption that a cyberattack is something that can only happen to an organization once. Like we just said, this is patently untrue.
Just think about it for a moment. We talk a lot about how important business continuity planning is and the various situations that can lead to it: hardware failure, weather events, things like that. With so many routes potentially leading to business disasters, it’s odd to think that such things could be considered outliers… the exceptions to the rules of circumstance when things just happen to go wrong.
This just isn’t the reality. Let’s take a moment to examine hardware failure, for instance.
Did you know that there is a mathematical formula meant to assist manufacturers in recommending inspection frequency and hardware replacement in specialized systems, like the guidance systems found in modern aircraft? While failures in these systems are relatively (and thankfully) rare, they still need to be predictable. To accomplish this, a process is used to calculate the mean time between failures (MTBF):
Of course, this MTBF isn’t a hard and fast rule. Sometimes, hardware will fail sooner, and sometimes, it will last much longer. Again, it’s an average to help guide best practices.
Take weather events: I know the old saying that lightning never strikes the same place twice, but the Empire State Building would have to disagree. The historic landmark is struck on average (that important word again) 25 times each year. For an even more drastic example, look at Roy “Human Lightning Rod” Sullivan, who was struck by lightning seven times between 1942 and 1977, surviving each time.
Events like these all come down to chance, with different variables inside and outside your business contributing and taking away from the potential likelihoods that various outcomes will realize. Most disasters are just these variables leading to an unpleasant outcome.
Unfortunately, that isn’t how cybercrime works.
Let’s go back to Crowdstrike and the data they produced, where an initial attack had a high chance of being followed by a second attempt. Unlike the disasters we’ve already gone over, cybercriminals and the strategies they follow don’t operate randomly. Instead, they actively target the best potential victims for their preferred outcome—who better than a business that had proven to be vulnerable before?
Fortunately, the businesses that Crowdstrike was observing managed to avoid the same outcome repeating itself.
The takeaway here is this: if your organization has already been targeted by a cyberattack in the past, you should fully expect another one to follow… most likely sooner than later. To help prevent this, you need to make sure your cybersecurity weaknesses are all reinforced. Obviously, this includes the vulnerability that lets in the initial threat, but you should by no means stop there.
The same can and should be said for businesses that haven’t been breached. Complacency is a dirty word in the vocabulary of cybersecurity. You should act proactively to identify your potential weaknesses and minimize the chance that an attack will be successful before it becomes a possibility.
Whichever situation applies to your business, HUB Technology Solutions is here to help. Not only can we provide you with comprehensive security solutions, but we’ll also be there to keep watch over your network infrastructure to make sure nothing slips past.
To learn more, give us a call at 1-833-847-0725 or 204-772-8822 and ask.
Troy is a life-long entrepreneur who is passionate about helping business owners solve complex business problems with technology. He enjoys sharing knowledge to help other businesses succeed.
By accepting you will be accessing a service provided by a third-party external to https://www.hub.ca/
Many businesses rely to some degree on Microsoft Word as their word processor of choice. Considering this, it seemed fitting to go over some of the productivity-supporting features that Word has to offer.