Top pick: CoverWallet
- Personal advisors
- Wide commercial coverage
- Industry-specific quotes
Finder is committed to editorial independence. While we receive compensation when you click links to partners, they do not influence our opinions or reviews. Learn how we make money.
Nearly every business faces cyber risk because the business, its service providers and employees all connect to the Internet. Risk can come from outside hackers or from internal errors or attacks. Understand the types of cyberattacks to watch out for and know the possible outcomes so your business can prepare ahead of time.
Cyber risk is an organization’s potential for loss or damage through its technical systems or through the use of technology inside the organization. This loss takes many forms, from a hacker draining a bank account to an employee accidentally exposing private information to website visitors.
To protect against those risks, businesses should watch out for internal and external attacks, including:
Attackers use a variety of methods to access the information they want. While nearly all kinds of cyber attacks are on the rise, some of the most common ones include:
Ransomware is software planted in a company’s system to block employees from accessing important information. Attackers then demand a ransom to restore access, often requesting payment in cryptocurrency. However, the attackers may or may not restore access, and any information restored is still compromised.
This threat is growing, especially since some cybercriminals sell ransomware kits for people with less computer skill to use.
Hacking refers to any attempt to access or compromise electronic systems, including the company’s website, customer information databases, employee computers or even smartphones. This type of attack may refer to the more manual process of an individual hacker breaching a system.
A shortened term for malicious software, malware is installed on a computer system and used to access data or sensitive information without the company’s knowledge.
Malicious code is a code or link that contains harmful files or programs. The code infects through downloadable or attachment files, while visiting infected websites or in links sent through email, social media or text messages.
Phishing refers to an attack in which the criminal poses as a credible company to gain personal information. Attackers may use official letterhead in emails, sophisticated websites or phone calls to make the inquiry seem official. In some cases, the attacker may pose as a trusted individual from the company, so it’s important to investigate any cases of coworkers asking for sensitive information online.
This type of attack happens when employees can’t access normal computer systems because of a system overload caused by cybercriminals. Attackers flood the company’s system with traffic until it can no longer handle the load, leading to financial loss for your company. Attackers may use the opportunity to access information from this system or to draw attention away from the actual system being attacked.
Companies that use outsourced services may increase cyber risk by giving these companies access to networks and data. If cybercriminals can compromise the service provider, they may find a back door into a main company’s system and sensitive information.
While protecting employees’ computers may stand at the top of the company’s security list, other devices may not have the same level of protection. For example, hackers may target an employee’s smartphone in hopes of accessing their email or finding sensitive information accidentally left unprotected. Stolen employee computers and devices can also compromise information.
A botnet refers to multiple computers or systems that coordinate a task together. While botnets can be used for website maintenance or other nonharmful purposes, attackers use them to coordinate a cyberattack like a denial of service, email spamming or malicious popup ads.
Cyberattacks can result in many different outcomes, depending on the attacker’s goal. Some of the consequences include:
Companies give much of the cyber responsibility to IT staff and heads of the business. However, staff members outside of technology departments can influence cyber risk too. Staff members may need training to spot and shy away from suspicious inquiries and to safeguard the company’s password protection.
Some of the people directly responsible for cybersecurity may include:
Your business may face a variety of cyber risks from outside and inside your company. If a cyberattack happens, you could suffer lost data or customer information, financial losses and negative media. While prevention may be your first defense, many business insurance policies do cover cyber liability to help you recover when a cyberattack happens.
What to know before investing in this young but rapidly growing industry that protects against cybercrimes.
The HEALS Act would let some businesses apply for a second loan and make it easier to qualify for forgiveness.
See costs, learn about local deals and weigh the pros and cons of this neighborhood-specific platform.
Take steps to keep you and your business safe amid violent demonstrations and minimize damage.
Your business insurance policy should pay for vandalism and looting — but you’ll need to document the damage.
Finder asked 11 experts to share their advice on whether it’s a good idea to buy a life insurance policy with your stimulus check.
This federal loan alternative offers up to $100,000 to businesses, nonprofits and landlords as the state reopens.
Glean from others’ experience what it will take to safely reopen the doors of your business once shelter-at-home orders are lifted.
Learn how your cyber risks might change during the coronavirus and how insurance covers you.
Find out which types of business insurance are most likely to pay out for coronavirus claims.
finder.com is an independent comparison platform and information service that aims to provide you with the tools you need to make better decisions. While we are independent, the offers that appear on this site are from companies from which finder.com receives compensation. We may receive compensation from our partners for placement of their products or services. We may also receive compensation if you click on certain links posted on our site. While compensation arrangements may affect the order, position or placement of product information, it doesn't influence our assessment of those products. Please don't interpret the order in which products appear on our Site as any endorsement or recommendation from us. finder.com compares a wide range of products, providers and services but we don't provide information on all available products, providers or services. Please appreciate that there may be other options available to you than the products, providers or services covered by our service.