Page 4 - MIADA-Q2 2020-Draft 061420_Neat
P. 4

Digital Security




            in 3 Easy Steps




            By Maurice Hamilton





            Data breaches are on the rise across all industries. So, what can you do

              to be prepared? Start with education and staying up to date with the

              most common methods used to gain access to a company’s systems.


        On any given day, the typical retail au-  targeted. According to a 2018 report by  •  Malware: A program that is covertly
        tomotive F&I office receives upwards of  tech firm Cisco Systems - the number one   placed onto a computer or electronic
        1,000 pieces of sensitive customer data,  provider of servers worldwide - 53% of   device, with the intent to compromise
        including bank account numbers, credit or  midmarket businesses say that they have   the confidentiality, integrity or avail-
        other financial records, mortgage records,  suffered a cyber breach, at a cost of $1 -   ability of data.
        tax documents, wire transfer receipts, So-  $2.5 million. The Ponemon Institute, a  •  Phishing: A technique that attempts to
        cial Security numbers and photos of driv-  Michigan-based research group, found   acquire sensitive data with the perpe-
        er's licenses. But one little gap in the deal-  that in 2018, 67% of small to medium   trator posing as a legitimate business or
        ership’s IT security system can put those  sized businesses had suffered an attack.   person.
        valuable records at risk, exposing the com-  The  FBI’s Internet  Crime Report  found  •  Ransomware: A type of malware that
        pany to a data breach.               that more than 350,000 cyberattacks had   attempts to deny access to a user’s data
                                             occurred in 2018, costing over $2.7 bil-  and encrypts that data until a ransom
           Understanding your risks,         lion. More recently, 3,800 publicly dis-  is paid.
           and putting the necessary         closed data breaches occurred in the first  •  Distributed Denial of Service (DDoS)
                                             six months of 2019, exposing up to 4.1
                                                                                    Attack: A high-volume of unwanted
            prevention and response          billion records.                       traffic  that  ends  up  exhausting  the
           processes in place will be                                               bandwidth as well as the resources
             key to protecting your          So, what can you do to be prepared? Start   of a company’s systems, rendering
                                             with education and staying up to date
                                                                                    them unable  to respond to any  more
            business going forward.          with the most common methods used to   requests.
                                             gain access to a company’s systems.  •  SQL Injection Attack: By injecting a
        You may be asking yourself, “How perva-                                     malicious inquiry, the attacker can see
        sive are data breaches?”                         EDUCATION                  into the database as well as modify the
                                                                                    data, run any administrative command
        The answer is, “Very pervasive.”     According to cybersecurity firm Proof-  and even wipe out the entire database.
                                             point, more than 99% of cyber attacks rely  •  Man in the Middle (MITM) Attack: At-
        The fact is, data breaches are on the rise  on human interaction, such as opening a   tackers compromise a network and in-
        across all industries, and as we’ve seen  file, following a link, or opening a docu-  sert themselves between a client and a
        from  breaches  like  Experian  and  Target,  ment. The most common types of attacks   server, such as a WiFi network and the
        all companies, regardless of  size, can be  include:                        attached devices.


        2  |  MIADA MISSISSIPPI DEALER Q2 2020
   1   2   3   4   5   6   7   8   9