Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
November 2011

Cybersecurity threats target lack of SMB security

To the cybercriminal tapping away on his laptop in Kiev or Baton Rouge, the server your small retail shop, architectural firm, or medical office depends on is just as appealing a target as a box maintained by Wells Fargo, Twitter, or the U.S. Department of Defense. In some ways, your server is more interesting to the guy. After all, you don’t have a full-time staff charged with guarding your network. You never bothered to change the default password or update your patches. Maybe your Facebook-addicted employee clicked on another “You’ve gotta see this!” link, allowing the crook to implant a little code on his or her machine. He’ll remember that place -- or rather, the code he banged out in 15 minutes will -- and he’ll be back later when it’s time to wake up the zombie farm to carry out a DoS attack. Worse yet, he might tunnel into your network and snatch sensitive customer or business data. Organized criminals are using exploits and malware to generate revenue and they value ROI as much as SMB owners. Easy, repeatable attacks ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close