Proton

Small businesses are big targets for hackers, but they still aren’t prepared.

Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared.

“We lost $10,000 due to a cyberattack on our mainframe in which a hacker was able to access financial data.”

“An email was sent from a banking institution which was opened and a ransom note was given. Shut down all my computer systems and I lost all data.”

“I lost money to a cyberattack due to a corrupt employee who stole my information.”

These are just a few of the horror stories the Better Business Bureau compiled in a recent survey(nowe okno) of small businesses. Hackers disproportionately target small businesses, perhaps because small businesses are less equipped to prevent cyberattacks and manage the fallout.

Three-fourths of small businesses don’t feel “well prepared” for cyber security threats, and 17% of data breaches(nowe okno) occur because someone made a mistake (like clicking on a phishing email). Yet the consequences of an error could not be higher. Most small businesses say they could not remain profitable for a month if they lost their data, leaving them extremely vulnerable to ransomware attacks.

Infographic small businesses and data breaches

The infographic below is a warning shot for small and medium-sized businesses: The hackers are after you. Are you ready for them?

Sign up and get a free secure email account from Proton Mail.

We also provide a free VPN service(nowe okno) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan or donate. Thank you for your support.


Powiązane artykuły

A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Co nowego w obszarze ochrony prywatności
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Co nowego w obszarze ochrony prywatności
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
  • Przewodniki dot. prywatności
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
  • Przewodniki dot. prywatności
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how