Accessibility Resource Center Skip to main content
Get it fast with In-store & curbside pickup or same day delivery.

Verizon Business Markets Blog

Does your medium business have the cybersecurity basics covered?

Employee Emeritus Employee Emeritus ‎06-13-2017 12:19 PM


MB Security Pic.PNG


by Scott Lerner Director of Mid Market Sales at Verizon Business Markets

Twitter | @Coach_Lerner


You might think you can keep your head down and stay out of cybercriminals’ targets — after all, they’re more interested in the big fish, right? Wrong. Cybercriminals don’t just target large enterprises — based on our analysis, almost two-thirds of data breach victims had under 1,000 employees1.


Most cybercriminals don’t care about the size of your business or who you are — they care about money. According to our research, over 70% of breaches were financially motivated1. And they don’t mind where they get it. Many cybercriminals don’t target their attacks at all. They take a scattergun approach, hitting the organizations with the weakest defenses.


That’s the problem. You’re facing the same threats as large enterprises, but you don’t have an enterprise-level security budget to build a state-of-the-art defense.


Cybercriminals are lucky, not smart


That doesn’t mean you should throw in the towel. Cybercriminals — from the kids operating out of their parents’ homes to sophisticated state-affiliated hackers — are still using the same old tricks to compromise organizations. Mostly, they’re playing an odds game. They don’t rely on their own smarts — they spread their nets wide and wait for you to make a basic mistake. And it’s amazing how many people are still making them.


Surely people aren’t still falling for phishing? It turns out they are. They fall for it time and time again. One in 14 users fell for phishing, and a quarter of those were duped more than once1. And people still haven’t got the message about strong passwords — over 80% of hacking-related breaches leveraged either weak and/or stolen passwords1.


Teach your employees the basics


  • Use strong passwords. You should encourage employees to vary their passwords and use two-factor authentication to protect sensitive data/systems. But the strongest passwords aren’t necessarily what you’d expect — four randomly selected words unrelated to you could actually be more secure than an alphanumeric password.
  • Don’t get caught by phishing emails. Show your employees what a phishing email looks like. The poor grammar, incorrect branding and “click-bait” messages are easier to spot when you know what you’re looking for.
  • Create a culture of security. Your employees should be sending sensitive information over secure networks. And they should extend the same care to physical documents. Develop a culture where printing out sensitive information is frowned upon. If physical copies are necessary, encourage employees to shred documents when they’re finished with them.
  • Be alert. Educate your employees about the tell-tale signs of a cyberattack. Is the sudden spike in network traffic really due to increased interest in today’s lunch options? Or are you the victim of a DoS attack? Are your customers encountering problems with your e-commerce site because of a fault or because a cybercriminal has tampered with it?
  • Have a clear incident response plan. Your employees need to know who to contact and how to contact them if they suspect an attack or there’s a data breach. Because that’s when every second counts. Your people should know the best way to record a security incident and where to do this. And your IT team should know if an incident needs to be handled by a security provider or if it can be dealt with in-house.


Knowledge is the best defense


The best defense is built by thoroughly understanding your opposition. That means analyzing and learning from your own experiences of cybercrime to avoid falling for the same trick twice. It also means learning from the experience of others. The annual Data Breach Investigations Report (DBIR) is based on an analysis of over 40,000 security incidents and offers an unparalleled insight into the world of cybercrime.


You can get a clearer picture of the biggest cyber threats facing your business using the DBIR’s nine attack patterns — almost 90% of the breaches investigated in the report fall into these patterns1. Understanding them can help you prioritize your defenses and mitigate your cyber risks.


1 2017 Data Breach Investigations Report, Verizon

It’s only a smart city if it’s secure

Employee Emeritus Employee Emeritus ‎05-08-2017 10:14 AM



by Margaret Hallbach, VP of Public Sector Sales at Verizon Business Markets


When you think cyberattack, do you picture a criminal mastermind launching a carefully planned attack on the White House? Can you hear the dramatic music and feel the tension building as the good guys find themselves with only seconds to spare before the country descends into unmitigated chaos.


It’s a successful Hollywood formula. But the reality is much scarier because it’s not just central government and big businesses that are the intended victims of cybercrime — everyone is at risk. You expect that police security camera overlooking your apartment complex to be operational. But is it? What if it had been infected with malware weeks earlier and was “offline for maintenance” during an assault?


Cybercriminals are often motivated by financial gain, but you could fall foul of hacktivism and cyber-espionage. Cities and municipalities have become targets because of limited resources, insufficient expertise, and unknown vulnerabilities.


Attacks that are simply launched for fun can have a devastating impact as well. What happens if your emergency response systems are overwhelmed by a telephony denial of service attack swamping your inbound call takers at your public safety answering centers?


Manage the risk of more tech


Cities are constantly competing against each other. Do people feel safe? Are the schools good? Are companies thriving and providing jobs? To improve constituent experiences and quality of service, while driving cost efficiencies, local governments are leveraging technology. Many cities are now looking to the Internet of Things (IoT) for smart street lighting to reduce energy consumption, and for intelligent traffic systems that cut congestion — there are even systems that detect potholes. The potential benefits are huge.


But as local government becomes more reliant on digital technologies, the consequences of cyberattacks grow. You’re holding more personal data. Your critical systems depend on technology. That means security can’t be an afterthought. When you’re developing new systems, you need to think security first. Imagine your facilities organization is refurbishing a municipal building with a new HVAC system. The automated detectors for sensing employees in the building allows the system to be remotely controlled, managing energy consumption and cutting operating expense. But it could also provide a new entry point for a cybercriminal.


Understanding the threats


Many municipalities and cities are budget constrained. New sources of funding are hard to find and these funding sources are difficult to maintain. IT professionals are aware of the threats, but they don’t have the support from City Councils to earmark dollars. Cybersecurity funding should be no different than traditional public safety.


The 2017 Data Breach Investigations Report (DBIR) draws on the analysis of over 40,000 security incidents and almost 2,000 confirmed data breaches to bring you an unparalleled source of information on cybercrime. The nine attack patterns we first identified in 2014 still cover almost 90% of data breaches. Understanding them can help you gain insight on where and how to invest your limited resources. We are all trying to stay ahead of the bad guys. Ask for advice and guidance – from a colleague, from another city, from a partner, from the industry. And most importantly, take action. Don’t regret the decision that you did nothing.

Weekly Roundup - Cybercrime and Data Breaches Can Be Prevented

Employee Emeritus Employee Emeritus ‎05-16-2011 01:21 PM

VZ small_biz_info ICON.pngHappy Friday!  Next week is National Small Business Week.  I feel everyday here at Verizon, we work to help small and medium-sized businesses be productive, have the right tools and put experts at your fingertips.  So in our eyes, every week we’re celebrating small businesses! 


I hope you know that if you ever have a question about our services or if you have questions for our webinar guests or our featured authors, you can always reach out to us by posting a comment at the end of any of our blogs or send an email to 


This week, I thought John Jantsch article on the importance of listening is a good read.  He offers some great tips to leverage social media to get immense benefit.


If you missed this news report from It’s Your Biz last week, check it out -- many small- and medium-sized businesses do not protected their company from cybercrime.  Here is another video, this one from the Wall Street Journal, on small businesses and how many SMBs experience fraud like consumers.  If you don’t have security in place for your business, check out what Verizon offers.


This is a good read from Ramon Ray, what to do when you get hacked and how to prevent it. 


Sorry if this week’s articles/videos are all related to security breaches – it’s just an important topic --for the most part many of these are preventable.


As always, let me what which articles you liked or share one you read and is helpful. 


Enjoy your weekend!


Data Breach Increased While Data Loss Was at All-Time Low

Employee Emeritus Employee Emeritus ‎04-19-2011 01:26 PM

threats by categories.jpg

Cybercrime… does it affect your business or you, personally?  These series of  

Q & A from Wade Baker, director of risk intelligence at Verizon and principal author of the 2011 Data Breach Investigations Report , offers some interesting insights.  To see key findings, get access to the full DBIR report, listen to an audio podcast on this topic or to see additional graphs click this link.


Q:  For those that aren’t familiar with the report, what is the Data Breach Investigation Report?


A:  It is an annual study into the world of cybercrime that analyzes computer forensics to uncover how sensitive data is stolen from organizations, who’s doing it, why they’re doing it, and, of course, what might be done to prevent it.


And this year, we have the privilege of working with the U.S. Secret Service and the Dutch High Tech Crime Unit, which drastically increases the scope and depth of the report.


Q: What were the major findings from investigations during the past year?


A: In 2010, we analyzed more incidents than ever in which consumer data – payment cards, bank accounts, personal information, etc – was stolen. And cybercriminals appear to be changing the way they accomplish this. Rather than massive breaches against large organizations like we’ve seen in the past, we saw a huge number of lighter, faster, and more surgical strikes against smaller organizations. Since many of the criminals behind those larger thefts are in jail, this trend may represent a tactical shift toward less risky and lower-hanging fruit.


Q: It sounds as though you are suggesting that cybercriminals are pretty organized and savvy – is that true?


A:  Absolutely. What many don’t realize is that there’s a very well-organized criminal underworld build around data theft and fraud. They want your information because they can sell it for profit or drain your bank account, make fraudulent purchases, conduct identity theft and all manner of evil. It’s definitely a business for them.


Q: How do these groups steal information and who is vulnerable?


A:  Not to sound overly-dramatic, but they’ll use any tactic that works and pretty much anyone is vulnerable. We see everything from hacking into corporate networks, tricking employees, bribing insiders, and even physical theft and tampering. Some of these attacks are very sophisticated, but most of them less so than you might think. You’d be surprised at the kind of stuff used to successfully steal data from corporations and part of the value of this report is identifying what kinds of attacks occur most often and are therefore most critical to combat.


Q: Speaking of combating cybercrime – what are your top recommendations to businesses?


A:  After studying thousands of data breaches, I can say with confidence that the overwhelming majority of them are avoidable through relatively basic countermeasures – ones that the victims probably thought were in place. Therefore, the most useful thing organizations can do is to implement procedures to check and recheck and even triple check that they are actually doing what they intend to do consistently and comprehensively.


Next, organizations need to increase their visibility into what occurs in their networks, systems, and applications. It usually takes a very long time for victims to know they’ve been breached and it is usually someone else that tells them about it. This is evidence of very poor situational awareness and that really needs to improve.



Q: And in similar fashion, what would you recommend to consumers?


A: Without a doubt, the most important tip I have is to be aware.


First, be aware of what MIGHT happen. Understand the risks doing business in the online and offline worlds. A lot of people ask me if I’m afraid of buying things online and my answer is always “No – but I am definitely wary of it and act accordingly.”


Second, be aware of what HAS happened. Check your bank and credit card statements. Monitor your credit. If you see something out of place, look into it. This is very important and can save you huge headaches and expense.


Third, use a credit card rather than a debit card when possible. There’s nothing wrong with debit cards per se, but there’s typically less risk to you if your CC# is stolen than your debit card.


Fourth, be stingy with your personal information. Don’t give or store more than you need or want to. For instance, I opt out of storing my CC# when making a purchase online unless I buy from that site frequently. The way I see it, the fewer entities that have my information, the less likely it is to be compromised.


Five – When using an ATM, gas pump, or any public payment kiosk, look for signs of tampering or components that don’t belong. These are common targets for thieves trying steal your payment card info and PIN.

 data breach.jpg

Browse Categories
About Verizon Business Markets
Get news from Verizon about Business Markets services and market trends that affect your bottom line. Here, you'll find tips and commentary from the Verizon Business Markets group and other experts to help keep your business growing.


Contact the editor:

About the Authors

Tumara Jordan

Senior Manager: Verizon Business Markets

Photo of Tumara Jordan

Tumara is a contributor to the Business Markets Marketing team and she currently manages Social Media marketing campaigns.