How Breaches Happen: The Unseen Risks in Cybersecurity

Picture of Carmine J. Corridore

Carmine J. Corridore

Carmine Corridore is a seasoned professional in the I.T. industry with over 30 years of experience. He has held various positions from field tech, team lead, service manager, project manager, and Director of I.T. Currently, he serves as the Client Facing Chief Strategy Officer and President of Underdog Cyber Defense. Carmine is a Rotarian and serves on the local chamber board and several committees. Carmine believes in giving back to the community, and he accomplishes that through donations and sourcing local talent and goods. Carmine is Credentialed and Certified in Cybersecurity.

Book a 15 Minute Strategy Session

Whenever I meet with a new business prospect, the topic of How Breaches Happen always comes up. There seems to be a common misconception that cybercriminals target only specific, high-profile victims. However, the truth is far more indiscriminate. Cyber breaches often occur not through deliberate targeting but through opportunistic exploration. In this article, we’ll delve into the mechanics of these breaches and discuss how businesses, regardless of size, can fortify their defenses against these unforeseen threats.

The Unpredictable Nature of Cyber Attacks

Cyber attacks are akin to a thief testing doorknobs in a neighborhood – they’re looking for the most accessible entry, not necessarily the most valuable. Techniques like phishing, malware, and exploiting network vulnerabilities are standard tools in their arsenal. These methods don’t discriminate by the size or importance of the target; they exploit any vulnerability available. 

Once they find a possible target, they begin to do their own “due diligence” to determine the best time to breach. Cybercriminals don’t want to get caught. So it’s in their best interest to learn everything before entry.

 Dispelling the ‘Not a Target’ Myth is Important in Understanding How Breaches Happen.

It’s a dangerous fallacy to believe that being small or ‘insignificant’ in the vast digital universe makes you safe. In reality, smaller businesses often become inadvertent victims. The most common reason is small to medium-sized enterprises (SMEs) don’t invest enough money in cybersecurity prevention. Another reason is they may not have access to the proper staff to help keep them protected. A final reason is they need to invest in staff awareness training. Statistics reveal that many cyber attacks target small to medium-sized enterprises (SMEs). Without the proper protections, staff, and training, breaches happen. 

 The Domino Effect: How breaches happen.

Let’s talk about how breaches happen. Going back to our earlier example, A thief goes into a neighborhood wiggling door knobs to see what doors open. Once he finds one, he carefully watches the house and surrounding houses. He observes the neighborhood patterns. Is there a neighborhood watch? How busy is your neighborhood? Is there a lot of coming and going? When would be the best time to strike? All this is a compromise, the due diligence I spoke of earlier. 

Let’s take it a step further. During the criminal’s due diligence, he notices a different neighbor’s house that is either equally as vulnerable or more appealing. We call this a Supply Chain Attack.

Supply Chain attacks are a continuation of how breaches happen.

When a business is attacked, the cybercriminal will look to maximize their return. They do that by attacking the business partners, vendors, and customers. As the business, you are already a trusted source, so when people in your supply chain get an email asking them to take action, they may not hesitate. This action might be downloading the same malware that attacked your organization unsuspectingly. The attack on their business begins, and a new cycle of breaches happens. 

Recognizing Your Vulnerability

Cybersecurity protection is about layers of security. Cybercrime is a business, and the harder you make it for the criminal to achieve their goal, they might just pass your business up. What do you do? How do you know if your business is at risk? Warning signs include:

  • Outdated security software.
  • Lack of regular cybersecurity risk assessments.
  • Insufficient employee training on cybersecurity.

You can have the best protections in place, but these oversights can open the door for cybercriminals.

 Building Your Cyber Defense

Protecting your business starts with understanding and action. Regularly update your security protocols, conduct thorough network assessments, and invest in employee training. Developing a robust incident response plan is also crucial. These steps are not just preventative measures; they are essential investments in the longevity and safety of your business.

Conclusion:

Cybersecurity breaches can happen to anyone, and the consequences are often far-reaching. Understanding the indiscriminate nature of cyber attacks is the first step in protecting your business. But understanding alone isn’t enough – action is critical.

Don’t wait until it’s too late. Take the first step towards safeguarding your business. Book a 15-minute strategy session with us today. In this session, we’ll help you assess your current cybersecurity posture and identify critical areas for improvement. It’s more than just a consultation; it’s an investment in your business’s future. Click on this Link –> https://underdog.contact

About the Author

Carmine Corridore is a seasoned professional in the I.T. industry with over 30 years of experience. He has held various positions from field tech, team lead, service manager, project manager, and Director of I.T. Currently, he serves as the Client Facing Chief Strategy Officer and President of Underdog Cyber Defense. Carmine is a Rotarian and serves on the local chamber board and several committees. Carmine believes in giving back to the community, and he accomplishes that through donations and sourcing local talent and goods. Carmine is Credentialed and Certified in Cybersecurity.

Carmine Corridore helps businesses unveil the Hidden Cybersecurity Risks
author avatar
Carmine Corridore

Monroe County, Pennsylvania (PA)

Analomink – Appenzell – Arlington Heights – Arrowhead Lake – Barton Glen – Bartonsville – Blakeslee – Blakeslee Estates – Blue Mountain Pines – Bossardsville – Brainerd Center – Briar Crest Woods – Brodheadsville – Buck Hill Falls – Camelot Forest – Canadensis – Castle Garden – Castle Rock Acres – Chestnuthill Township – Coolbaugh – Coolbaugh Township – Coveville – Craigs Meadow – Crescent Lake – Cresco – Delaware Water Gap – Dotters Corners – East Stroudsburg – East Swiftwater – Easton Anglers – Echo Lake – Effort – El-Do Lake – Eldred Township – Emerald Lakes – Fernridge – Fiddletown – Forest Glen – Foxtown Hill – Frutchey – Gilbert – Gravel Place – Hamilton Square – Hamilton Township – Henryville – Indian Mountain Lake – Jackson – Jackson Township – Jonas – Kahkhout Mountain – Kellersville – Kemmererville – Kingswood Estates – Kresgeville – Kunkletown – Lake Naomi Estates – Little Summit – Locust Lakes Village – Long Pond – Lower Tannersville – Marshalls Creek – McIlhaney – McMichael – Mechanicsville – Meisertown – Merwinsburg – Middle Smithfield Township – Minisink Hills – Monroe Lake – Monroe Township – Mount Pocono – Mount Zion – Mountain Top Estates – Mountainhome – Mushroom Farms – Neola – North Water Gap – Oak Grove – Paradise Crossing – Paradise Township – Paradise Valley – Parkside – Penn Estates – Pleasant Valley Estates – Pleasant View Lake – Pocono Country Place – Pocono Farms East – Pocono Heights – Pocono Lake – Pocono Laurel Lake – Pocono Manor – Pocono Pines – Pocono Playhouse – Pocono Summit – Pocono Summit Estates – Pocono Township – Polk Township – Poplar Bridge – Pocono Township – Price Township – Preserve – Red Ledge Manor Estates – Reeders – Resica Falls – Robin Hood Lakes – Ross Common – Ross Township – Rossland – Sandhill – Saylorsburg – Sciota – Scotrun – Shawnee on Delaware – Shoemakers – Sierra View – Ski Haven Lake Estates – Skytop – Smith Gap – Smithfield Township – Snow Hill Falls – Snydersville – Spruce Hill – Stillwater Lake Estates – Stillwater Lakes – Stormville – Stroud Township – Stroudsburg – Sun Valley – Swiftwater – Tannersville – Tobyhanna – Tobyhanna Township – Tunkhannock Township – Turn Villa – Wagners – Wagners Forest Park – Warnertown – Weir Lake – Wigwam Lake Estates – Wilderness Acres – Winona Lakes – Wiscasset – Wooddale.

Alburtis – Allen Junction – Alton Park – Allentown – Ancient Oaks – Arlington Knolls – Balliettsville – Best Station – Bethlehem – Bittners Corner – Breinigsville – Bungalow Park – Catasauqua – Cedarbrook County Home – Cementon – Center Valley – Centreville – Chapman – Chestnut Hill – Claussville – Coffeetown – Colesville – Coplay – Corning – Crackersport – Custer – DeSales University – Dewey Heights – Diebertsville – Dillingerville – Dorneyville – East Allentown – East Fogelsville – East Texas – Egypt – Emerald – Emmaus – Emmaus Junction – Evergreen Park – Farmington – Fogelsville – Fountain Hill – Friedens – Friedensville – Fullerton – Gauff Hill – Germansville – Greenawalds – Griesemersville – Guth – Guthsville – Haafsville – Haines – Hanover Acres – Hawktown – Helfrichsville – Hensingersville – Hillside – Hilltown – Hokendauqua – Home Park – Hosensack – Hynemansville – Ironton – Jacksonville – Jordan Valley – Juniper Circle – Kaywin – Kernsville – Krassdale – Krocksville – Kuhnsville – Lanark – Laurys Station – Leather Corner Post – Lehigh Furnace – Lehigh Gap – Limeport – Litzenberg – Lochland – Lockridge – Locust Valley – Lynnport – Lynnville – Lyon Valley – Macungie – Mechanicsville – Metamora Station – Meyersville – Mickleys – Mickleys Gardens – Midway Manor – Milford Park – Minesite – Mosserville – Mountainville – Neffs – New Smithville – New Tripoli – Newhard – Newside – Newtown – North Coplay – North Fogelsville – Notre Dame Hills – Old Zionsville – Orefield – Ormrod – Overlook Springs – Park Way Manor – Parkside Courts – Peters Store – Pleasant Corners – Powder Valley – Raberts Corner – Raubs Mills – Rextown – Rising Sun – Ritterville – River View – Rockdale – Rosemont Terrace – Ruchsville – Ruppsville – Saegersville – Saucon Valley – Saucon Valley Terrace – Scheidy – Scherersville – Schnecksville – Schneidersville – Seiberlingville – Seiple – Seipstown – Shankweilers – Shimerville – Sigmund – Slateville – Slatedale – Slatington – Spring Creek – Steinsville – Sterlingworth – Stetlersville – Stiles – Stines Corner – Summit Lawn – Switzer – Trexlertown – Trout Creek – Unionville – Vera Cruz – Vera Cruz Station – Walbert – Waldheim Park – Wanamakers – Weidasville – Weilersville – Weisenberg – Wellington – Welshtown – Wennersville – Werleys Corner – Wescosville – West Catasauqua – Westwood Heights – Wilbur – Williamstown – Woodlawn – Zionsville

more insights

Book a 15-Minute Strategy Session!

Are you ready to take the next step toward your business’s cyber security? Contact us today with any questions you might have or to request a no-hassle strategy session — we’re ready to fight for you!

New Look. New Name. New Focus.

Underdog Cyber Defense, formerly know as Underdog Computer and Network Solutions LLC., has rebranded to communicate that we are now focusing our exceptional IT and network capabilities on the vast challenges associated with Cyber Security.