Is Your Business At Risk Of A Data Breach This Christmas?

Dec 13, 2019
Cyber Security

In the not-so-distant past, the festive season didn't just bring joy and celebration but also a surge in cyber attacks, leaving businesses, both large and small, vulnerable. The aftermath of these attacks was grim, exposing the personal details of millions of customers. A notable incident involved Marriott's Hotels, where a massive data breach laid bare the private data of 500,000 guests, including passport and credit card numbers. 1 Similarly, Quora fell victim to a system hack, compromising the data of approximately 100 million users. Even tech giant Apple wasn't immune, having to remove two malicious iOS apps that deceived users into approving TouchID payments through misleading pop-ups. 2

Closer to home, the Office of the Australian Information Commissioner (OAIC), reported 83 notifiable data breaches for December, with a large percentage attributed to malicious or criminal attacks. 3

The Holiday Cyber Threat Landscape

As we approach another holiday season, the question looms large: Is your business prepared for potential cyber threats, or does it risk falling victim to a data breach? The timing of these attacks is not coincidental; cybersecurity experts emphasise that hacking is, indeed, a seasonal business.

Why Christmas?

The seasonality of cyber attacks is strategic. Opportunistic attacks persist throughout the year, but hackers often intensify efforts during periods when they anticipate businesses' resources to be stretched thin and defences lowered. The challenge is compounded for businesses operating during Christmas, like retailers and hospitality establishments. The sheer volume of legitimate transactions makes it harder to distinguish from illegitimate ones, echoing the challenges faced by Marriott's Hotels during the previous holiday season.

Even for businesses that shut down temporarily, the risks persist. Vineet Nair, Head of IT Services at Spirit, notes that hackers are keenly aware of the holiday hustle. With reduced staff and limited monitoring, businesses are more susceptible to overlooking potential threats, presenting a vulnerability that cyber criminals are eager to exploit.

Types of Cyber Threats

Understanding the types of cyber threats your business might face is crucial. Here are some common ones:

  1. Phishing
    Phishing attacks involve deceptive emails appearing to be from a trusted source. They aim to gain personal information or influence employees to take specific actions. Despite widespread awareness, phishing attacks remain prevalent. Between October and December 2018, 43% of notifiable data breaches were attributed to phishing, according to the Office of the Australian Information Commissioner (OAIC). These attacks are becoming more sophisticated, often mimicking high-level executives' email addresses.
  2. Man-in-the-Middle (MitM) Attack
    A MitM attack occurs when a hacker inserts themselves between client-server communications, often achieved through session hijacking. A hacker can expose a company's data by gaining control of Wi-Fi or replacing it with their signal.
  3. Drive-by Attack
    In this attack, cyber criminals target insecure websites, injecting a malicious script into HTTP or PHP code. This script may install malware directly onto visitors' computers or redirect them to a site controlled by hackers. Even trusted websites can be compromised if their security is outdated, posing a significant risk to customer data.

Indicators Your Business Might Be at Risk

Recognising signs of potential threats doesn't require IT expertise. Here are common indicators:

  1. Unusually Slow Internet or Devices
    Unusual slowness, particularly if selective to certain devices, may indicate malware, viruses, or suspicious outbound traffic. Investigating promptly can prevent a data breach.
  2. Locked User Accounts
    The inability to access accounts with valid credentials could signify a compromise. Inadequate user permissions, poor password management, and the absence of two-factor authentication increase the risk.
  3. Abnormal User Activity
    Unusual logins or access to unrelated files should trigger suspicion. While it might be legitimate, it could also indicate an internal breach or a compromised account.
  4. Critical File Changes
    Cyber criminals may alter critical system files to prolong detection. Active monitoring of file changes is crucial to promptly detect and respond to unusual activities.

Securing Your Business This Christmas

As 'tis the season for both celebration and cyber threats, it's an opportune time to review your cyber security measures. If concerns about a potential data breach linger, your IT team should conduct a thorough security review. For businesses needing assistance, Spirit offers comprehensive cyber security solutions for SMBs, providing active monitoring and robust security systems. Contact one of our specialists today to fortify your business against potential threats.

Sources

  1. Massive data breach at Marriott’s hotels exposes private data of 500,000 guests
  1. 1-15 December 2018 Cyber Attacks Timeline
  1. OAIC Notifiable Data Breaches Statistics Report: 1 October to 31 December 2018
  1. Companies More Vulnerable to Cyber Breaches Around New Year

Share this article:

Contact our experts

Whether you're just starting your journey to the cloud, looking to optimise your existing infrastructure or improve your cyber security posture, we're here to help.