Many times when I meet with a prospect I get the same 2 responses
#1 – We are too small !
#2 – We have nothing that a cyber criminal/hacker is interested in!
The fact is these 2 things are a MYTH. In this article I will explain why those 2 things are completely false and why you should be more concerned about it.
Breach Timeline
RECON/Scanning Phases
Proof/Drill Down
Once they locate some external vulnerabilities. They focus on them to see if they can make their way into the internal network. At this point they are repeating the scanning phase but internally. They are still likely using automated processes to perform this task.
Once they get inside the network, they look at each device to determine what kind of data is on them. Is there any PII, PHI, Routing/Banking information, Drivers Licenses, and etc… Each of these has a value on the dark web.
Let’s take for instance you have a spreadsheet with 1000 clients names. Each row has Name, Address, email address, physical address and cell number. That is 1000 pieces of data they can sell.
