<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber criminals Archives - CEO Computers</title>
	<atom:link href="https://ceocomputers.com/tag/cyber-criminals/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Los Angeles Encino IT Services Since 1988</description>
	<lastBuildDate>Thu, 02 Apr 2026 18:41:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://ceocomputers.com/wp-content/uploads/2023/12/cropped-favicon144-32x32.png</url>
	<title>cyber criminals Archives - CEO Computers</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Cost of a Cybersecurity Attack: 14 Warning Signs Every Business Shouldn&#8217;t Ignore</title>
		<link>https://ceocomputers.com/the-cost-of-a-cybersecurity-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cost-of-a-cybersecurity-attack</link>
		
		<dc:creator><![CDATA[Jamshid Javidi]]></dc:creator>
		<pubDate>Wed, 15 Sep 2021 22:35:33 +0000</pubDate>
				<category><![CDATA[IT Blog]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security strategy]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity attack]]></category>
		<category><![CDATA[multi-layered security plan]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://ceocomputers.com/?p=9699</guid>

					<description><![CDATA[<p>The average cost of a cybersecurity attack is $200K, according to insurance carrier Hiscox. This cost can be so damaging, that 60% of businesses that fall victim to a major cyberattack have gone out of business- only six months after the attack.    But the cost of a cybersecurity attack isn’t just damaging to the  [...]</p>
<p>The post <a href="https://ceocomputers.com/the-cost-of-a-cybersecurity-attack/">The Cost of a Cybersecurity Attack: 14 Warning Signs Every Business Shouldn&#8217;t Ignore</a> appeared first on <a href="https://ceocomputers.com">CEO Computers</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="font-size: 14pt;"><span style="font-weight: 400;">The average cost of a cybersecurity attack is </span><strong><a href="https://www.cnbc.com/2019/10/13/cyberattacks-cost-small-companies-200k-putting-many-out-of-business.html" target="_blank" rel="noopener">$200K</a></strong><span style="font-weight: 400;">, according to insurance carrier Hiscox. This cost can be so damaging, that </span><span style="font-weight: 400;"><strong>60% of businesses</strong></span><span style="font-weight: 400;"> that fall victim to a major cyberattack have gone out of business- only six months after the attack. </span></span></h3>
<p>&nbsp;</p>
<h3><span style="font-weight: 400; font-size: 14pt;">But the cost of a cybersecurity attack isn’t just damaging to the balance sheet of the company, it can have a negative impact later down the road.  </span></h3>
<h3><span style="font-size: 14pt;"><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">A business owner may think they have mitigated the situation, but there be hidden issues beneath the surface of a cybersecurity attack. </span></span><span style="font-weight: 400; font-size: 14pt;">Consider these potential issues a security breach or attack can cause over time.</span></h3>
<p>&nbsp;</p>
<h2>The Hidden Cost of a Cybersecurity Attack</h2>
<p>&nbsp;</p>
<div id="attachment_9822" style="width: 610px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-9822" class="size-full wp-image-9822" title="deloitte risk beneath the surface pdf 1" src="https://ceocomputers.com/wp-content/uploads/2021/09/deloitte-risk-beneath-the-surface-pdf-1.png" alt="deloitte illustration of risks beneath the surface" width="600" height="400" srcset="https://ceocomputers.com/wp-content/uploads/2021/09/deloitte-risk-beneath-the-surface-pdf-1-300x200.png 300w, https://ceocomputers.com/wp-content/uploads/2021/09/deloitte-risk-beneath-the-surface-pdf-1-500x333.png 500w, https://ceocomputers.com/wp-content/uploads/2021/09/deloitte-risk-beneath-the-surface-pdf-1.png 600w" sizes="(max-width: 600px) 100vw, 600px" /><p id="caption-attachment-9822" class="wp-caption-text">Image via Deloitte Risk Beneath the Surface Report</p></div>
<p>&nbsp;</p>
<ul>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">A loss of trust from your clients to keep their information private and safe.</span></h3>
</li>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">Damage to your business’s reputation in the community or industry.</span></h3>
</li>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">A pending lawsuit. </span></h3>
</li>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">Ransomware payment</span></h3>
</li>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">Clients and victim compensation – The victims can ask for payment. </span></h3>
</li>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">Compliance violation fees – You may have to deal with the government regarding jeopardizing your clients’ information.</span></h3>
</li>
<li style="font-weight: 400;" aria-level="1">
<h3><span style="font-weight: 400; font-size: 14pt;">Potential loss of  talented employees</span></h3>
</li>
</ul>
<p><span style="font-size: 14pt;"><span style="font-weight: 400;">For over two decades, we have paid attention to the changing landscape of cyber security. And we have noticed how most business owners aren’t adapting to the changes—allowing the possibility of a </span><a href="https://ceocomputers.com/6-tips-to-avoid-a-security-breach/" target="_blank" rel="noopener"><span style="font-weight: 400;">security breach</span></a><span style="font-weight: 400;"> in the company’s network.  </span></span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400; font-size: 14pt;">We share 14 informational data points and warning signs to help you safeguard your organization’s most valuable assets from a cyberattack.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><b><i>Need help protecting sensitive data and information for your small business? </i></b><a href="https://ceocomputers.com/contact-us/"><b><i>Let Us Help you.</i></b></a><b><i> </i></b></span></p>
<p>&nbsp;</p>
<h2><b>Cybersecurity Attacks: 14 Warning Signs Every Business Owner Shouldn’t Ignore </b></h2>
<p>&nbsp;</p>
<h3><b>1. Your Business is Not Too Small for a Cybersecurity Attack  </b></h3>
<p><span style="font-size: 14pt;"><span style="font-weight: 400;">54% of small business owners</span><span style="font-weight: 400;"> think their business is too small for a possible security breach, but unfortunately, </span><a href="https://smallbiztrends.com/2016/04/cyber-attacks-target-small-business.html" target="_blank" rel="noopener"><span style="font-weight: 400;">43% of small businesses</span></a><span style="font-weight: 400;"> have been a target of cybercrimes. </span><span style="font-weight: 400;"> </span></span></p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter size-full wp-image-9818" title="hidden cost of a cybersecurity attack" src="https://ceocomputers.com/wp-content/uploads/2021/09/hidden-cost-of-a-cybersecurity-attack.jpg" alt="hidden cost of a cybersecurity attack" width="600" height="400" srcset="https://ceocomputers.com/wp-content/uploads/2021/09/hidden-cost-of-a-cybersecurity-attack-300x200.jpg 300w, https://ceocomputers.com/wp-content/uploads/2021/09/hidden-cost-of-a-cybersecurity-attack-500x333.jpg 500w, https://ceocomputers.com/wp-content/uploads/2021/09/hidden-cost-of-a-cybersecurity-attack.jpg 600w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p>&nbsp;</p>
<h3><b>2. Cybercrime is in the Billions  </b></h3>
<p><b></b><span style="font-size: 14pt;"><span style="font-weight: 400;">According to the FBI, in 2020, a </span><a href="https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">$4.1 billion</span></a><span style="font-weight: 400;"> loss was due to cybercrimes (IC3 2020 Report).</span></span></p>
<p>&nbsp;</p>
<h3><strong>3. <em><a href="https://static1.squarespace.com/static/5ab16578e2ccd10898976178/t/5c4675dbaa4a995fe6badb80/1548121568515/Coveware+Global+Ransomware+Marketplace+Report+-+2018+Q4.pdf" target="_blank" rel="noopener">Six Days</a></em> to Resolve a Ransomeware Incident</strong></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">6.2 days is the average time it takes to address and fix a ransomware incident, according to the Coveware Ransomeware Marketplace report. </span></h3>
<p>&nbsp;</p>
<h3><b>4. Public Wi-FI are Threats</b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">Public Wi-Fi can be an opportunity to have your network compromised by local hackers. A VPN (virtual private network) is a safe way to connect to your internal network.</span></h3>
<p>&nbsp;</p>
<h3><b>5. Cybercrime is on the Rise</b></h3>
<h3><span style="font-size: 14pt;"><strong><a href="https://www.tessian.com/blog/phishing-statistics-2020/" target="_blank" rel="noopener">75% of the world’s businesses</a></strong><span style="font-weight: 400;"> experienced some time of</span><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish"><span style="font-weight: 400;"> phishing attack in 2020</span></a><span style="font-weight: 400;">. More false emails attempting to extort information or money have risen since the beginning of the pandemic.</span></span></h3>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-9821 size-full" title="cybercrime on rise cost of cybersecurity" src="https://ceocomputers.com/wp-content/uploads/2021/09/cybercrime-on-rise-cost-of-cybersecurity.jpg" alt="cybercrime on rise cost of cybersecurity" width="600" height="400" srcset="https://ceocomputers.com/wp-content/uploads/2021/09/cybercrime-on-rise-cost-of-cybersecurity-300x200.jpg 300w, https://ceocomputers.com/wp-content/uploads/2021/09/cybercrime-on-rise-cost-of-cybersecurity-500x333.jpg 500w, https://ceocomputers.com/wp-content/uploads/2021/09/cybercrime-on-rise-cost-of-cybersecurity.jpg 600w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p>&nbsp;</p>
<h3><b>6. Cybercriminals Are Getting Sophisticated</b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">To get their malicious software installed on business computers, criminals are mixing and matching adware, spyware, keyloggers, viruses, rootkits, information “scraped” from social networks, and purchase credentials from Dark Web.</span></h3>
<p>&nbsp;</p>
<h3><b>7. Cybercriminals Run It </b><a href="https://www.cnbc.com/2019/05/05/heres-what-cybercriminals-do-during-the-workday.html"><b>Like a Business</b></a></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">Well-funded professional criminals plan, research, and organize automated attacks on individual companies and government entities.</span></h3>
<p>&nbsp;</p>
<h3><b>8. Open Access to Everyone</b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">Limit access and permission to your sensitive data. Not everyone in your office should have access to every file and folder. </span></h3>
<h3><b>9. Business Email Schemes Cost </b><b>1.8 Billion in Losses</b><b> in 2020</b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">Up to 90% of email is spam, and email is the primary tool cybercriminals use to access your employee’s computer and network.</span></h3>
<p>&nbsp;</p>
<h3><b>10. Ransomware Infections from Remote Desktops</b></h3>
<h3><span style="font-size: 14pt;"><strong><a href="https://www.ninjarmm.com/blog/small-business-cybersecurity-statistics-2019/" target="_blank" rel="noopener">84% of ransomware infections</a></strong><span style="font-weight: 400;"> were initiated by remote desktop protocols (RDP) in Q4 2018, and it’s safe to say that figure has jumped due to the shift of workers working remotely. </span></span></h3>
<p>&nbsp;</p>
<div id="attachment_9819" style="width: 610px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-9819" class="wp-image-9819 size-full" title="Coveware Ransomware Marketplace Report Q4 2018" src="https://ceocomputers.com/wp-content/uploads/2021/09/Coveware-Ransomware-Marketplace-Report-Q4-2018.png" alt="Pie chart displaying 84 percent of ransomware attack" width="600" height="400" srcset="https://ceocomputers.com/wp-content/uploads/2021/09/Coveware-Ransomware-Marketplace-Report-Q4-2018-300x200.png 300w, https://ceocomputers.com/wp-content/uploads/2021/09/Coveware-Ransomware-Marketplace-Report-Q4-2018-500x333.png 500w, https://ceocomputers.com/wp-content/uploads/2021/09/Coveware-Ransomware-Marketplace-Report-Q4-2018.png 600w" sizes="(max-width: 600px) 100vw, 600px" /><p id="caption-attachment-9819" class="wp-caption-text">Image via Coveware Ransomeware Report (Q4 2018)</p></div>
<p>&nbsp;</p>
<h3><b>11. Data is Not Encrypted </b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">Encrypt your data that travels outside of your office. In case a laptop is lost or stolen your sensitive data is safe.</span></h3>
<p><b></b></p>
<h3><b>12. Employee Errors Can Cause Damage</b></h3>
<h3><span style="font-size: 14pt;"><strong><a href="https://securityintelligence.com/20-eye-opening-cybercrime-statistics/" target="_blank" rel="noopener">48% of the breaches</a></strong><span style="font-weight: 400;"> are caused by human factors/errors. Therefore, it is best to provide regular employee awareness training.</span></span><b></b></h3>
<p>&nbsp;</p>
<h3><b>13. Weak Passwords Can Make a Network Vulnerable </b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">Take password policy seriously. The use of complex passwords and changing them on a quarterly basis is standard password practice. Using a two-factor authentication system can add another layer of security. </span></h3>
<p>
<b></b></p>
<h3><b>14. Employees Use Work Laptop Like their Personal </b></h3>
<h3><span style="font-weight: 400; font-size: 14pt;">As a result, over 80% of breaches are caused by employees. Set up training and policies for employees to understand the proper protocols of using a company laptop.</span></h3>
<p>&nbsp;</p>
<p style="text-align: center;"><span style="font-weight: 400; font-size: 14pt;"><strong>So there you have it, 14 tips and warning signs that shed some light on how to safeguard you from a cyberattack.</strong> </span></p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><span style="font-weight: 400;">But a few tips aren’t enough to protect your company. If you want to learn more about thoroughly safeguarding your business’s network, we published an article on three essential elements of building a comprehensive cyber security plan. Continue to read </span><strong><a href="https://ceocomputers.com/multi-layered-security-plan/" target="_blank" rel="noopener">“What is a Multi-layered Security Plan? And Why your Business Needs It’</a></strong><span style="font-weight: 400;">.   </span></span></p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 14pt;"><i>Want help with your cyber security strategy? Contact us for a </i><a href="https://ceocomputers.com/contact-us/" target="_blank" rel="noopener"><i>free consultation</i></a><i>.</i></span></strong></p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-9796 size-full" title="need help multi layered security plan CEO Computers" src="https://ceocomputers.com/wp-content/uploads/2021/09/need-help-multi-layered-security-plan-CEO-Computers.png" alt="need help multi layered security plan CEO Computers" width="600" height="400" srcset="https://ceocomputers.com/wp-content/uploads/2021/09/need-help-multi-layered-security-plan-CEO-Computers-300x200.png 300w, https://ceocomputers.com/wp-content/uploads/2021/09/need-help-multi-layered-security-plan-CEO-Computers-500x333.png 500w, https://ceocomputers.com/wp-content/uploads/2021/09/need-help-multi-layered-security-plan-CEO-Computers.png 600w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p>The post <a href="https://ceocomputers.com/the-cost-of-a-cybersecurity-attack/">The Cost of a Cybersecurity Attack: 14 Warning Signs Every Business Shouldn&#8217;t Ignore</a> appeared first on <a href="https://ceocomputers.com">CEO Computers</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
