Cybercrime (And Lightning) Have No Problem Striking Twice - HUB Blog

HUB TechMinutes

Business technology news, tips and events.

HUB Blog

Better business through better information.
4 minutes reading time (768 words)

Cybercrime (And Lightning) Have No Problem Striking Twice

Cybercrime (And Lightning) Have No Problem Striking Twice

We’ve become aware of a concerning phenomenon: the perception that a business that has already been targeted by a cyberattack, won’t be attacked again. We are here to tell you that this is not the case.

Let’s explore just how wrong this assumption is, and what you should actually do about it.

People Assume Data Breaches are “One and Done”

It really is odd; how many businesses seem to act under the assumption that a cyberattack is something that can only happen to an organization once. Like we just said, this is patently untrue.

Why Are Disasters Seen as Rare Events?

Just think about it for a moment. We talk a lot about how important business continuity planning is and the various situations that can lead to it: hardware failure, weather events, things like that. With so many routes potentially leading to business disasters, it’s odd to think that such things could be considered outliers… the exceptions to the rules of circumstance when things just happen to go wrong.

This just isn’t the reality. Let’s take a moment to examine hardware failure, for instance.

Did you know that there is a mathematical formula meant to assist manufacturers in recommending inspection frequency and hardware replacement in specialized systems, like the guidance systems found in modern aircraft? While failures in these systems are relatively (and thankfully) rare, they still need to be predictable. To accomplish this, a process is used to calculate the mean time between failures (MTBF):

  • An identical experiment is run on a sample of similar test cases for a predetermined length of time, with the length of time each case operates without fail annotated. If a test case doesn’t experience a failure, they get the entire duration of the test as their value.
  • Then, the average operational time of all the test cases is found by totalling up the amount of time each ran successfully and then dividing the total duration by the number of cases that failed.
  • This provides the average number of times the test cases failed during the experiment, which is then converted to a more meaningful and appropriate timeframe for practical application.

Of course, this MTBF isn’t a hard and fast rule. Sometimes, hardware will fail sooner, and sometimes, it will last much longer. Again, it’s an average to help guide best practices.

The Same Principle is Found Everywhere Averages Are Found

Take weather events: I know the old saying that lightning never strikes the same place twice, but the Empire State Building would have to disagree. The historic landmark is struck on average (that important word again) 25 times each year. For an even more drastic example, look at Roy “Human Lightning Rod” Sullivan, who was struck by lightning seven times between 1942 and 1977, surviving each time.

Events like these all come down to chance, with different variables inside and outside your business contributing and taking away from the potential likelihoods that various outcomes will realize. Most disasters are just these variables leading to an unpleasant outcome.

Unfortunately, that isn’t how cybercrime works.

What Makes Cybercrime So Different?

Let’s go back to Crowdstrike and the data they produced, where an initial attack had a high chance of being followed by a second attempt. Unlike the disasters we’ve already gone over, cybercriminals and the strategies they follow don’t operate randomly. Instead, they actively target the best potential victims for their preferred outcome—who better than a business that had proven to be vulnerable before?

Fortunately, the businesses that Crowdstrike was observing managed to avoid the same outcome repeating itself.

What This Should Tell You About Your Cybersecurity

The takeaway here is this: if your organization has already been targeted by a cyberattack in the past, you should fully expect another one to follow… most likely sooner than later. To help prevent this, you need to make sure your cybersecurity weaknesses are all reinforced. Obviously, this includes the vulnerability that lets in the initial threat, but you should by no means stop there.

The same can and should be said for businesses that haven’t been breached. Complacency is a dirty word in the vocabulary of cybersecurity. You should act proactively to identify your potential weaknesses and minimize the chance that an attack will be successful before it becomes a possibility.

Whichever situation applies to your business, HUB Technology Solutions is here to help. Not only can we provide you with comprehensive security solutions, but we’ll also be there to keep watch over your network infrastructure to make sure nothing slips past.

To learn more, give us a call at 1-833-847-0725 or 204-772-8822 and ask.

Be the Hero - Secure your Digital Communication
Scale Your IT to Better Manage Your Budget

Related Posts



No comments made yet. Be the first to submit a comment
Wednesday, May 12, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR-Code dieser Seite

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

12 May 2021
Small and medium-sized businesses have been playing catchup for over a decade when it comes to getting the physical security solutions that larger companies utilize. Fortunately, the gap has shrunk in recent years. Today, we thought we would outline ...
07 May 2021

Many businesses rely to some degree on Microsoft Word as their word processor of choice. Considering this, it seemed fitting to go over some of the productivity-supporting features that Word has to offer.

06 May 2021
Many businesses experience a similar scenario when dealing with their telephony—one where an extremely expensive solution limits their capabilities… unless, of course, they are willing to fork over more of their available budget. VoIP, or Voice over ...