Small- or medium-sized business (SMB) owners may think they’re unimportant enough to be targeted by hackers. But the truth is that SMBs are prime targets for hackers since they see these organizations — which have less security and fewer resources compared to enterprises — as easy marks.
The five types of hackers targeting SMBs
The 5 types of hackers who want to harm your business

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won’t be talking about white hat hackers in this blog. Instead, we’ll take a close look at five types of […]
Distributed spam distraction hides illegal activities
4 types of hackers that may target SMBs
When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection.
Government agency finds way to unlock iPhones
Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they’ve found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it’s also a potential privacy issue for Apple customers.
Browsers leak sensitive info to hackers
The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill.
Ransomware adopting self-replication
Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible […]
Different types of hackers defined
Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of […]
How is BYOD a security risk?
Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If […]
Cloud myths debunked
From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among businesses. In fact, it is almost impossible to find a company’s data center that does not employ cloud-based services of some kind. However, reported incidents of cloud hacks and server failures can lead some […]
- 1
- 2