Our world lives, works, and plays on the internet.  

And while the internet increases our connectivity and efficiency, it also brings numerous threats:

Cyber hacking, online attacks, and the need for cybersecurity.

According to Norton Security, nearly 60 million Americans have been affected by identity theft.  In 2023, it is estimated cybercriminals will be stealing 33 billion records per year.  

These cyberattacks target everyone, but trends show small businesses are one of the most common targets. In fact, approximately 43% of cyberattacks target small businesses!  

Thankfully, there are software and online security measures available to help protect your business from cybercriminals.

approximatley 43% of cyberattacks target small businesses

To help your business be prepared and secure for the coming year, Straight Edge Technology has identified 7 of the top cybersecurity threats for 2021 and what your team can do to prevent them.  

We’ll also look at a brief history of cybersecurity and the four most common online attacks.

Keep reading to equip your business with proper cybersecurity for 2021 and beyond!

*Feel free to read through the whole article, or simply click a section in the Table of Contents to go directly to that topic*

Table of Contents

  • 1. A Brief History of Cybersecurity
  • 2. Malware
  • 3. Ransomware
  • 4. Social Engineering
  • 5. Phishing

7 Top cybersecurity threats in 2021 & Their Solutions

  • 1

    Phishing

  • 2

    SMS-Based Phishing

  • 3

    PDF Scams

  • 4

    Malware & Ransomware

  • 5

    Database Exposure

  • 6

    Credential Stuffing

  • 7

    Accidental Sharing

A Brief history of cybersecurity

Before we jump into the common online threats and attacks, let’s briefly look at what cybersecurity is and how it has evolved during the technology era.

 

What is Cybersecurity?

Cybersecurity is a bit of a buzzword, and people have different definitions in mind when discussing it.

In its most basic form, cybersecurity is “the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.”

While this definition is a mouthful, it highlights two aspects of cybersecurity not often considered.

First, very few people think of the hardware or physical computer components when they think of cybersecurity.

Why not?

Because in today’s world, cybersecurity is usually associated with internet and software attacks and not physical computer hardware.

Second, cybersecurity was a threat before the internet.  

Since the first computers started storing data, thieves have been trying to steal it!  And while this was more difficult before the internet, it did occur.

a brief history of cyberattacks

First Cyberattacks

When did the first cyberattack occur?

Believe it or not, one of the first cyberattacks was more of a game than an attack!

In 1971, Bob Thomas developed a computer program able to travel between connected computers.

Unlike most of today’s attacks, his program did no damage.  Instead, it simply displayed a message stating, “I’m the creeper: catch me if you can.”

As the internet became more widespread, many people didn’t understand the risks of having connected data and computers with little cyber protection. It was not a significant concern since few malicious programs existed.

When did this begin to change?

In 1989, Joseph Popp created one of the first malicious computer attacks.  He made a malware program called the “AIDS Trojan.”  

Initially passed by a floppy disk, the program was poorly designed and did not disable the computer.  The main thing it did was scramble the names of the files.  

Thankfully, programmers combated the virus quickly with the proper computer software.

Later in 1989, a second cyberattack started circulating, but this one was not programmed to be malicious.  

Instead, the creator wanted to raise awareness.

Robert Morris was concerned about how much data was easily accessible on the internet.  He saw how much of the data was poorly protected by inadequate security and weak (or nonexistent) passwords.  

To show people how vulnerable the current security was, Morris developed a computer worm that significantly slowed down the internet.  

While the worm was programmed to prove a point and do no actual damage, estimates say it cost between $100,000 and $10,000,000 from lost productivity, unstable internet, and restarting IT systems.  

Whether Morris expected this kind of damage or not, his point was made - even before the internet was widely available, cyberattacks were both real and dangerous.

cybersecurity has never been more critical with virtually everything connected online

Cybersecurity today

In today’s world, cybersecurity is a part of life.

With virtually everything connected online, cybersecurity has never been more critical.

Sadly, it is still common to hear stories of data breaches.  

It is not uncommon to read stories of banks, credit card companies, online retailers, phone companies, and other companies having their systems breached and customer’s data stolen.

Thankfully, there are many companies actively developing better cybersecurity programs.  Microsoft, Apple, and Google are constantly updating the software used on computers, servers, tablets, phones, and other devices.

Governments are also recognizing the investment they need to make to protect their servers and classified data.

In 2019, the U.S. government expected to pay around $15 billion to protect its data.  The Department of Defense and Homeland Security use up the majority of this budget.

4 main types of cybersecurity attacks

So, what are some of the most common cyberattacks?  While many exist, let’s look at four of the most common attacks.

Malware

malware is any malicious form of software

Malware is one of the broadest terms when it comes to cyberattacks.  It is any malicious form of software designed to harm a computer system. 

When malware enters a computer, it performs a malicious function such as stealing, deleting, or encrypting data, monitoring a computer users’ activity or hijacks core computing functions. 

Common malware includes worms, viruses, Trojan horses, and spyware.

Malware is designed to steal, encrypt, or delete data, alter or hijack core computer functions, or track a computer user’s activity without their knowledge.   

Malware is commonly distributed through physical hard drives, USB external drives, or internet downloads.

Ransomware

As the name indicates, ransomware involves a hacker locking the victim’s computer or files and holding this information for ransom.  It typically requires the victim to produce a payment before the hijacked files and system are unlocked.

Ransomware spreads through phishing emails or unknowingly visiting an infected website.

Ransomware is devastating due to the difficulty in recovering affected data.  

While some victims do choose to pay the ransom, there is no guarantee the hacker will give control of the computer or files back to the victim. 

ransomware is a hacker locking a victim's computer or files for a ransom

Social Engineering Attacks

Social engineering attacks rely on human or social interaction, not just bots entering a computer through the internet.  

And because humans are prone to error, social engineering is the biggest security risk today.

How much of a risk?

Some reports estimate 93% of business data breaches come from employees unknowingly engaging with a social engineering attack!

Social engineering attacks occur when a hacker tricks someone to give them information or access to software or data.  Hackers try to manipulate people into breaking standard security procedures.

What makes social engineering attacks so effective?

Because it relies on human interaction, social engineering attacks usually play on a person’s emotions.  

One of the most common tactics is to have someone think they are helping someone in need.  For example, an attacker may pose as a fellow employee or a family member asking for access to a document, bank account, or sensitive data.

Think about it - a properly built IT system can prevent a malware attack, but it cannot stop an employee from giving a password to a hacker posing as a coworker.

estimates show 93% of business data breaches come from social engineering attacks

So how do companies combat social engineering attacks?

Many companies have regular training for employees on how to spot social engineering attacks and strategies.  

It is also essential for businesses to have guidelines in place when working with sensitive data.  

For example, a common rule is not allowing employees to share company usernames or passwords electronically.  If an employee forgets a password, they should call a coworker instead of emailing them.

social engineering cyberattacks rely on human interaction

Phishing

Phishing is a form of a social engineering attack, and it has become one of today’s most common and malevolent cybersecurity attacks.

In its most basic form, phishing occurs when a hacker uses a false identity to trick someone into providing sensitive information, downloading malware, or visiting a site containing malware.

 

What makes phishing so prevalent in today’s world?  

The extensive use of electronic communication, including email, text messaging, instant messaging, and social media accounts.

phishing occurs when a hacker uses a false identity to trick someone

What are some common phishing scams?

One of the most common phishing attacks targets people through email.  An attacker creates an email looking like it comes from your local bank or the government, and the email asks you to visit a website and enter your username and password.

Another common tactic is creating a fake social media account resembling a friend or family member.  The hacker then asks for money or data through messaging, and it appears it is your family member or friend asking for a favor.

 

What can be done to protect from phishing?

Like other social engineering attacks, having training and guidelines in place is a crucial first step. 

Employees should be trained to look for specific phishing patterns and tactics.  As a business owner, you should make sure your employees know several tell-tale signs of phishing.

 

What are some common signs of phishing attacks?

  • Generic language such as “Sir” or “Madam”
  • Incorrect grammar, language, or punctuation
  • An odd sense of urgency 
  • Unusual requests for sensitive information

For example, emails from fake IRS accounts asking for personal information is a common phishing tactic.  However, the IRS (and most businesses in general) makes it clear that they communicate through postal mail and NOT through email. 

If you or an employee receives a sensitive request from a business or a direct message from a social media friend, contact the company or person directly to see if the request is legitimate.

common signs of a phishing attack

7 top cybersecurity threats in 2021 [& how to protect your business]

With the background we have on what a cyberattack is and several common attacks, let’s focus on what this means for a small business.

As a small business owner or employee, you know how important your security and data are.  Even if you have a dedicated IT service provider, it is still good to know the technology threats your business faces.

Straight Edge Technology provides IT services and network security in the San Antonio and Corpus Christi areas.  As a private business ourselves, we know and understand how important your security is to you and your company.

The following are the top 7 cybersecurity threats Straight Edge Technology sees for small and mid-sized businesses in 2021.  

In each section, we also include several practical guidelines your company can implement to reduce your risk and exposure to these attacks.

These 7 cybersecurity threats and their preventions are available to download in PDF format at the end of this article.

Some of these threats and their solutions are basic, and others are complex.  

Working with a managed IT service company helps protect your business from these threats.  Even if your company has an IT department, we recommend consulting an outside IT company to ensure you have maximum security.

Are you ready to be more confident about your company’s cybersecurity entering 2021?  

Alright, let’s get started!

Threat 1 - Phishing

As mentioned before, phishing is one of the most common cyberattacks due to the high levels of interaction humans have on electronic communication.

Straight Edge Technology sees this becoming even more of a threat as email and instant messaging increase in the business world.

Why does a rise in electronic communication increase the threat of phishing?

Office employees receive hundreds of emails and electronic messages every day.  Towards the end of the workday, as minds become tired, humans are susceptible to making bad decisions when tired, and their minds feel overworked.

an online hacker can destroy a business with 1 successful attack

Attackers know this, and some choose this timeframe to bombard employees with fake emails and social media accounts.  After all, a hacker only needs one employee to make a mistake to destroy a business’s integrity.

Sadly, this happened in 2019 to the Carle Foundation Hospital.

Through a phishing scam, hackers gained access to three of the employee’s email accounts.  The ensuing investigation determined these accounts gave the hackers access to sensitive patient medical records and Social Security information.

Thankfully, the hospital did the right thing and contacted all affected patients.  It also recognized the need for more training in their employees.

 

What should your company do to protect itself from phishing?

First, watch for unusual emails and instant messages.  They may start with unusual wording such as “Dear Customer” instead of using your name, have bad grammar, or have a generic signature.

Second, be cautious in clicking links or giving sensitive information, even if it appears legitimate.  If in doubt, directly contact the source to make sure they sent the message.

And third, install anti-phishing toolbars on internet browsers.  These toolbars alert you to sites containing phishing information.

Threat 2 - SMS-based Phishing (Smishing)

At first glance, it may appear SMS-based phishing (also called “Smishing”) falls under the general “phishing” category, but there are several key differences.

While general phishing often occurs online through emails or web browsing, smishing occurs through SMS text messages on your phone.  

How does it work?

The attacker sends an SMS text message to a user’s phone.  Opening the text message itself doesn’t start the attack, but the message contains a link.  If the link is clicked, it begins the attack.

sms-based phishing is more popular because of email spam blockers

Why are more attackers turning to SMS-based phishing over traditional email phishing?

Many email programs, such as Google or Microsoft Outlook, are smart enough to detect phishing emails and label them as spam.  This means the average email user doesn’t even notice most phishing attacks.

However, anyone can still get a text message and open a bad link!

What are common smishing attacks?

  • A message from “your bank” asking you to enter your social security number.
  • A “delivery carrier” asking you to schedule a package delivery.
  • Other organizations asking you to click a link or give information.

 

What should your company do to protect itself from SMS-based phishing?

First, never open a link in a text message.  Most banks and businesses do not ask for information via SMS message - they call or mail you.

Second, watch for misspellings or generic language.  Like email phishing, smishing often contains generic language like “Dear Customer, “Sir,” or “Madam.”

And third, if you think the message is legitimate, call the business directly or go to your online account to give the information.  This ensures no valuable data falls into the wrong hands.

Threat 3 - PDF Scams

Similar to phishing, PDF scams have one goal in mind:  To get you to open an attached PDF.

They involve an email being sent with a message, often stating a security policy has been updated or an account statement is attached.

When you click the attached PDF, however, it exposes you to malware or ransomware on your computer.

What makes PDF scams effective?

Unlike many email scams, PDF scams often don’t ask you to open a link to give information.  

PDF scammers know people are wary of an email asking them to click a link.  However, people are more likely to open a PDF if they think it is a statement balance or press release.

PDF scams are dangerous because we associate PDFs with work

What makes PDF scams especially viable in the workplace? 

In the office, PDF attachments are constantly shared through email, Slack, and other messaging platforms.  Our brains associate PDFs with business, and therefore we are more likely to let down our guard and open them.

 

What should your company do to protect itself from PDF scams?

First, train your employees to watch for generic or unusual email addresses.  For example, if someone gets bank statements through email, ensure the sender’s email address is from the bank and not a generic address.

Second, watch for unusual and generic headings.  Instead of using your name, PDF scams often use generic terms like “Sir” or “Madam.”

And third, make sure you have updated and secure virus protection on your computers and network.  If someone happens to open up a PDF scam, having security in place goes a long way in protecting your business and alerting your IT department.

Threat 4 - Malware & Ransomware

We already discussed the devastating impact malware and ransomware have when they infect a computer system.  Lost data, frozen systems, and hijacked software are just a few of the problems.

Although not based on social interactions, Straight Edge Technology still views these attacks as highly prevalent in 2021, especially in small businesses.  

Why do we think non-phishing attacks are here to stay?

Hackers know every business keeps its data on servers connected to the internet.  All they need is one crack in your security, and they can perform the attack.

hackers attack small businesses with malware and ransomware

Sadly, Pitney Bowes Inc. experienced this first hand.  

Pitney Bowes Inc. helps small businesses with e-commerce, shipping logistics, and mailing services.

In early 2019, they became victims of a malware attack that encrypted information on some of their systems and affected customer’s ability to access the company’s services.

Although there was no evidence customer records had been stolen, the malware crippled the company’s servers.  Customers were not able to upload transactions, access their accounts, or refill their postage.

When they realized they had been attacked, Pitney Bowes Inc. immediately had their technical team assess and fix the situation.  They also brought in 3rd-party IT consultants to prevent future attacks.

 

What should your company do to protect itself from malware and ransomware?

First, make sure you keep all your computer software and hardware updated.  Outdated software, drivers, and other plugins are common security vulnerabilities.  If you have an IT service provider, check with them to make sure this is happening on your servers.

Second, enable click-to-play plugins to keep Flash or Java from running unless you click a link.  This reduces the risk of running malware programs with Flash or Java.

And third, removing old software, sometimes referred to as Legacy Apps, reduces risk.  For example, if your computer has Windows 10, but you run programs designed for Windows 7, these are considered Legacy Apps and may be a security risk.  Your software company should be able to give you an updated program designed for Windows 10.

Threat 5 - Database Exposure

Database exposure is what it sounds like:  A security breach exposes database information to hacking or theft.

Database exposure occurs in a variety of ways.  

Some hackers use social engineering attacks to steal login credentials, and others use malware to gain access.

Because most companies use servers to host customer information, Straight Edge Technology sees database exposure being a big concern in 2021.  Most company databases include customer contact information, financial records, or identity records such as Social Security numbers.

One of the significant issues with database exposure is the fuel it becomes for social engineering attacks.

database exposure becomes instant fuel for social engineering attacks

For example, let’s assume a company has a database exposure that releases names, email addresses, and birthdates.  

Using this information, a hacker could fake a local hospital’s identity and send each person an email with their name and birthdate.  These people are more likely to open a link in the email because it includes personal information (their name and birthdate), and therefore appears to be legitimate. 

Recently, around 250,000 American and British job seekers had personal information exposed when two recruitment sites, Authentic Jobs and Sonic Jobs, failed to set their cloud databases as private.

As a result, personal information, including phone numbers, email addresses, driver licenses, and salary expectations, were made public. 

After learning about the exposure, the two companies immediately made their databases private.

It is unknown how much of this information was harvested by hackers, but it provided a gold mine of personal data for potential social engineering cyberattacks.

 

What should your company do to protect itself from database exposure?

First, if you have a private server, keep the physical hardware in a secure and locked room.  This helps prevent theft if your building is robbed, and it keeps unauthorized personnel from accessing it with a portable hard drive.

Second, make sure you have a database firewall and web application firewall.  A locked door protects your physical server and hardware, and firewalls protect your server on the internet.  

Third, keep access to the server limited.  Each person with a login to the server is a potential leak, so the fewer logins, the better.

And fourth, encrypt the data on the server and keep a regular backup.

Threat 6 - Credential Stuffing

Credential stuffing is an attack geared toward stealing user access through login credentials.  This is most common in situations where the same login credentials are used for multiple sites or accounts.  

With most programs being online, Straight Edge Technology expects credential stuffing to be a significant threat in 2021.

Canada Post, the postal operator in Canada, recently discovered some of their users’ account information had been hacked in 2017 by credential stuffing.

Although the exact number of affected accounts was unknown, Canada Post immediately began resetting all their user’s passwords.

credential stuffing means using the same login information for multiple sites

While investigating the incident, it became clear Canada Post was not to blame.  

Instead, most of the accounts were accessed because customers used the same login credentials across multiple sites, with Canada Post being one of them.

As a result, if a user’s account was hacked on another website and the user had the same login credentials on Canada Post, the hackers could access the Canada Post account as well.

 

What should your company do to protect itself from credential stuffing?  

First, implement  2-Factor Authentication for account logins.  This requires an email or phone verification along with the standard username and password. 

Second, use different passwords for every account and program your employee’s access.  If one account is hacked, the hacker will not have access to more accounts with the same password.

And third, never share passwords with other people.  If you have a shared account for some reason, always give the password verbally, never through electronic communication.

Threat 7 - Accidental Sharing

We’ve all seen it happen, and maybe it’s happened to you:  The dreaded “Reply All” to an email when you only meant to reply to one or two people.  

Suddenly, everyone in the office knows your true feelings about the manager or boss!

Accidental sharing is a similar problem.  It occurs when information is shared or leaked accidentally.  It is usually the result of human error, not because of malware or a hacker.  

Accidental sharing includes personal or business data, and it is shared through emails, unsecured forms, messaging or social media platforms, and a host of other ways. 

accidental sharing is the result of human error

Because accidental sharing is based on human error, Straight Edge Technology sees it being a problem in 2021 and for many years to come.  It is a particular threat to companies where large numbers of employees have access to primary databases.

EA Games had an accidental sharing incident during their FIFA 20 Global Series online competition.

When players registered for the event, they entered their sign-up information on a form on EA Games’ website.  However, when new players went online to register, the registration form was pre-filled with personal information of players who had already signed up for the competition.  

Obviously, the players were upset with their information being displayed.  It was especially upsetting because it didn’t appear EA Games was hacked.  The issue was an accidental sharing issue inside EA Games, not the result of a cyberattack.

When EA Games became aware of the issue, they shut down the registration for several days until their IT team fixed the problem. 

 

What should your company do to protect itself from accidental sharing?

First, limit the number of employees who have access to data.  The more people who have access to information, the higher the chance for human error in sharing the data.

And second, implement user activity monitoring software.  This allows you to track and discover if your data is in danger.  It also provides solutions to prevent accidental sharing.

Conclusion

In a world where the internet connects everything, cybersecurity has never been more critical.

While having IT services and updated software and hardware is important, it is still critical to understand that today’s hackers target human behavior through social engineering hacks.

Thankfully there is training, software, and help available for individuals and small businesses!

Straight Edge Technology highly recommends you partner with an IT service provider if you are a small business.  Even if you have your own IT department, it is good to receive coaching and another set of eyes on your company’s security.

We offer support for a variety of industries including Healthcare IT servicesLegal IT supportOil & Gas ITManufacturing IT services, and Construction IT support.

If your business is looking for IT services in San Antonio, TX, Corpus Christi, or the surrounding cities in Texas, then contact our team at Straight Edge Technology today.  

We would love to talk with you, discuss your company’s goals, and plan how your IT can work for you in growing your business!

Read our recent blog posts on different IT services, challenges, and tips!

7 Top Cybersecurity Threats For Businesses In 2021 [& how to prevent them] 1
5 Remote Work Security Threats (And How To Protect Your Business From Them)
Over the past decade, the prevalence of remote work has spiked. In fact, remote work grew by 159% between 2015 and 2017.  When COVID-19 slammed the world in 2020, the acceleration towards remote work hit a new gear - suddenly, many business owners were forced to enable their employees to ...
Read More
7 Top Cybersecurity Threats For Businesses In 2021 [& how to prevent them] 2
VoIP Services – What It Is & 10 Reasons Your Business Needs It
As a business owner, you need a reliable phone service for your business.   Forbes estimates that companies lose 71% of their internet leads because their phone response time is too slow - your company needs the ability to talk to your customers quickly with a reliable, flexible, and efficient phone ...
Read More
7 Top Cybersecurity Threats For Businesses In 2021 [& how to prevent them] 3
Legal IT Services:
The Benefits, Challenges, and Future
When it comes to running a law firm and working with legal services, having secure and reliable IT services is critical. Not only are you working with sensitive and confidential client data, but you also need easy and safe access to all this data remotely from anywhere in the world. ...
Read More
7 Top Cybersecurity Threats For Businesses In 2021 [& how to prevent them] 4
Managed IT Services: Reduce Stress, Increase Productivity, & Choose The Right Provider
In the business world, the words 'stress' and 'technology' sadly go together a lot. Whether it is email spam, losing data, or the remote server not working correctly, technology results in a lot of lost time, energy, and even business. But what if your business could run its technology without ...
Read More
7 Top Cybersecurity Threats For Businesses In 2021 [& how to prevent them] 5
Healthcare IT:
The Benefits, Weaknesses, and Problems
When it comes to healthcare, having proper security and a reliable IT service is critical. Hackers are always trying to access healthcare records because EMR systems (Electronic Medical Records) hold a gold mine of information. These records and systems are essential for hospital networks to correctly track and analyze a ...
Read More