Security & Risk Management

Evaluating, analyzing, and managing the risk and security

Hackers hit firms large and small

Hackers make headlines when they strike huge pipelines and major meat processors, but they also can target small and medium businesses.

Ransomware, unfortunately, is a growing problem – an estimated $350 million was paid last year, three times the amount paid in 2019. Although law enforcement recommends against paying the ransom, many businesses choose to pay the money and regain their computers as quickly and quietly as possible.

How they get away with it

Sophisticated hackers know how to set their price, demanding an amount that is substantial but not too substantial for the victim to pay. 

And ransomware is made possible because crypto-currencies like Bitcoin are hard to track, although a U.S. task force recently was able to recover almost half the $4.4 million ransom paid by Colonial Pipeline. 

Criminal hackers often set up shops in Russia and other countries that don’t allow the United States to extradite criminals. Criminal hacking was among the topics President Joe Biden discussed in June with Russia’s leader, Vladimir Putin.

Meanwhile, an organization’s best protection is to maintain tight security for its computer system.

Mark Wiener

CEO

Mark Wiener, CEO, BizCom Global has spent 30 years in the digital transformation industry even before it was a term.  Focusing on bringing together Operational productivity needs, Financial compatibility and IT standards and integration including security.  He works with companies from the halls of the fortune 500 down to the local mom and pop business focusing on how companies looking through the lens of a cloud first strategy can help achieve improved operational performance with planned and proper implementation of technology which include appropriate cybersecurity controls.

Mark prides himself on his ability to really listen to the customer, honestly assess their needs, and work relentlessly to assure the final solution exceeds the customer’s expectations.

Other Posts you might like...

Rating your cyber resilience
Preparation, detection, response, and recovery are the pillars of a successful cyber resilience program. These steps can keep your organization...
How cyber resilience works
Cyber resilience and cyber security may sound similar, but there’s a difference. Think of cyber security as the all-around approach...
People overlook easy protection
More people need to take preventive action to avoid hackers and other bad actors. Twitter’s revelation that only 2.3% of...
First, you’re hacked. Then you’re sued.
As if getting hacked isn’t bad enough, customers and employees can sue your organization for not providing better computer security....