When hackers gained access to Solara email accounts, they extracted employee and patient information. Solara is a medical device provider based in Chula Vista and maintains highly sensitive personal information about patients. Although the company has taken steps to prevent future attacks, people caught up in last year’s hack are still at risk and need to carefully monitor the Dark Web to see if their information is for sale.
1. SMBs being pushed into bankruptcy by data breaches
A recent survey by Zogby Analytics confirmed what many people already knew: data breaches are wreaking havoc on SMBs. In particular, the financial implications of a data breach are overwhelming their capacity and forcing them to take drastic action.
The survey, which questioned more than 1,000 small business leaders, found that 37% of SMBs that experienced a data breach suffered financial loss and 25% filed for bankruptcy. Ultimately, 10% of SMBs went out of business following a data breach. SMBs must have a disaster response plan to deal with the high likelihood of being breached.
Some lessons are better learned by observing what happened to others, like the negative consequences of successful cyberattacks. How to protect your organization and data is knowledge you want to acquire without experiencing a breach. The scenarios below illustrate what can go wrong and how you can prevent similar situations at your organization.
It’s an old battle; one that many have almost forgotten as the enemy lies in wait, counting on inattentiveness to bolster their evil plans.
Sounds like an intergalactic war from Star Wars, huh? With the release of Star Wars: The Rise of Skywalker this December, our ongoing fight against cybercrime comes to mind. Many businesses seem to have become complacent in the fight against cybercrime as 48% of SMBs have budgeted $5,000 or less on security for the upcoming year. This is 54% less than what was spent by small- and medium-sized businesses on cybersecurity last year.
You might think this trend indicates a decrease in hacking, phishing and ransomware attacks on SMBs. Nothing is farther from the truth. Symantec reports employees of small organizations receive spam in 55% of their emails, considerably fewer than emails received by employees of larger organizations.
1. Kaiser Permanente says data breach exposed information on nearly 1,000 Sacramento-area patients
The personal information held by Kaiser on 990 Sacramento-area patients was breached in September by an unknown and unauthorized individual. The cybercriminals had access to an email account with access to data including date of birth, gender, provider name, payer name and benefits information, along with other medical-care-specific information.
Unlike credit card and other financial information, personal health histories do not change and can be used to convince individuals that a scam is actually legitimate. At DiamondIT, we have tools and systems in place to identify, analyze and proactively monitor for any compromised or stolen employee and customer data. This prevents personal information from being used against you, your customers or employees.
Californians will ring in the new year with new regulations. If you don’t want the California Consumer Privacy Act (CCPA) to spoil your holiday parties and end-of-year celebrations, now is the time to prepare. We’ve put together this quick guide to get you up to speed on what you need to do to comply with the law.
Do I Need to Pay Attention?
Are you a for-profit business operating in California and collecting consumers’ personal information? You need to follow CCPA regulations if you:
- Have annual gross revenue exceeding $25 million or
- Purchase, sell or share data from more than 50,000 consumers, households or devices or
- Derive 50% or more of your annual revenue from selling consumers’ private information
Ace Industrial Supply is the leading telemarketing company in the tool industry with offices in California, Arizona and Idaho. The 36-year-old company distributes tools and supplies in the United States and Canada. Ace needs to have a strong IT infrastructure in place to easily communicate with clients and collaborate between the company’s offices and warehouses.
Before working with DiamondIT, Ace operated its technology environment with a small internal IT staff and an outside service provider. Ace believes in old-fashioned customer service and values but does not extend this point of view to technology. Unfortunately, their former IT provider lead them down a path to outdated software and hardware.
1. 20 Texas cities attacked by ransomware
The City of Borger, along with 20 other Texas municipalities, recently suffered a ransomware attack that disabled the city’s ability to conduct business. The attack was part of a targeted effort, and it cut off access to basic city services like public records, bill payments and communications systems. The city has been able to restore several functions without paying the ransom, but several services remain unavailable.
Many public entities such as cities and counties struggle to implement adequate cyber security solutions. DiamondIT works closely with municipalities to manage their networks within restrained budgets and long planning cycles.
Cities, enterprises, nonprofits, small businesses and your organization are all united by one commonality: the threat cybercriminals pose. A successful attack harms more than your finances and will impact every facet of your business. 60% of small businesses will close after being hit with a cyberattack. The right IT investments prevent attacks and limit downtime and damage during a worst-case scenario. Below are 4 costs to consider and the solutions you can use to protect your business.
Hackers are going to town on municipalities in California and across the country.
Municipalities are popular targets for cybercriminals because most have a variety of services on their websites that requires city residents to share credit card information, addresses and other personally identifying information. Even with the prime data cities store, they often don’t have adequate security solutions in place to prevent ransomware attacks.