Online Threat Alerts (OTA)
An anti-cybercrime community alerting the public.

Local Businesses in Australia Suffering Website Hacking

There’s no shortage of headlines about hackers who infiltrate managed servers to devastate small to medium businesses in numerous industries. Unfortunately, outsourcing your cybersecurity management doesn’t always guarantee safety. Online hackers have figured out a way to access the servers of managed service providers (MSPs) through covert measures that wreak havoc on their clients.

Advertisements

A favorite hat-trick of most hackers is to steal commercial secrets and sell them to the highest bidder on the dark web. This is obviously not a desirable outcome for any business. That’s why it’s advisable to practice strict cyber security measures that’ll protect your company from such attacks.

After all, you don’t want to end up like some of the companies mentioned below who now serve as cautionary tales of what could happen when a hacker strikes.

Conclusion

Australian businesses, big or small, have been faced with damaging security and data breaches carried out by internal and external operators alike. This is becoming even more common as the dark web becomes more popular among hackers and experienced IT operators, and it’s a genuine cause of concern for local businesses like iCannabis, as a security breach can cost millions to clean up.

One way to protect your company is by using a reliable Virtual Private Network or VPN for short. Good quality VPNs come with encryption software that provides iron clad protection.

It might also be a good idea to use some type of password manager that automatically generates new passwords every few days or so to protect user credentials. Also, install and update your anti-virus software regularly.

It’s also important to make sure that the passwords you use for employee access are strong and hard to crack. A good rule of thumb is to use a combination of letters, numbers and characters.

If you’re going to use an MSP of any sort, be sure to ask them if they’ve ever been compromised and what measures they have in place to prevent it from happening again.

Check the comment section for additional information, or share what you know or ask a question about this article, by clicking the 'View or Write Comment' button below.

Note: Some of the information in samples on this website may have been impersonated or spoofed.

Share this article with others.
Advertisements
Write / View Comments (1)
View on Online Threat Alerts (OTA)
Help Maintain Online Threat Alerts (OTA)