Fraudsters Target Small Businesses

You Are At Risk!

By: Stacy Dunn | Category: Financial Services | Issue: February 2019

Hackers are one step ahead in trying to steal information. Take steps to not become their next victim.

Hackers are one step ahead in trying to steal information. Take steps to not become their next victim.

Information is as good as gold.

If you think your business is too small to be a victim of data loss, think again.

Cybercriminals find small to medium-sized businesses to be more accessible targets.

While physical securities are a concern (leaving documents lying around or not shredding personal paperwork), the majority of incidents tend to be more hands off.

Hackers like to infiltrate businesses with social engineering tactics:

  • Phishing & vishing
  • Customer account     compromise
  • Vendor management intrusion 

The National Institute of Standards and Technology offers a framework to help businesses protect their work spaces.  Each business has unique risks and will require tailored security measures.

Preventive measures:

  • Limit employee access to sensitive data.
  • Use strong passwords that expire.
  • Use multi-factor authentication.
  • Train staff on information security.
  • Reduce risk with effective policies and procedures.
  • Encrypt all data, especially email and mobile devices.
  • Use reliable endpoint protection, firewall and email filtering.
  • Update and patch systems regularly.
  • Protect all facets of your business, e.g., websites and vendor access.

Your network is only as strong as your weakest user.

Hackers are one step ahead in trying to steal information. Take steps to not become their next victim.

Common Cyber Attacks:

  • Phishing Emails: Hacker persuades the user to click on a link or provide the user’s credentials, installing malware.
  • System Misconfiguration: Hacker takes advantage of outdated software, unnecessary services, incorrect configuration or factory settings to access files.
  • Injection Vulnerabilities: Hacker uses flaws in production environments that affect program coding, possibly hijacking the system.
  • Man-in-the-Middle Attacks: Hacker intercepts data between two points and alters the communication between those parties, impersonating one or both parties.

Information security training is a must-have in today’s environment. Invite RCB Bank's Information Technology and Business Services teams to speak about cybersecurity at your workplace. Call 918-342-7379 to schedule an appointment. Learn more at


About Author Stacy Dunn

Stacy Dunn is the endpoint security administrator for RCB Bank, since 2017. She manages endpoint client protection, provides support for email, troubleshoots functionality, researches security trends, and writes policies and procedures on how to anticipate possible security breaches. Before RCB Bank, she was a manager for GameStop for six years where she developed her technical skills in troubleshooting equipment, hardware, software and general information technology.

« All February 2019 Stories

RCB Bank Financially Fit

For more information, contact:

More about RCB Bank Financially Fit:

Top Stories

Operation Aware 7th Annual Art Gala

The statistics are startling. A poll of 7th graders across Tulsa County shows 11% have consumed alcohol in the past 30 days. ... Read more »

It’s All in the Name

For 10 years, Superior Overhead Door has been committed to proving their name says everything about their business.  Owners Steve and Tammy Lewis are positive they …... Read more »

Meet Shannon Smith

I’m Shannon Smith, creator of Beads And Basil, a website where I share my travel adventures, cooking experiences, jewelry creations, life stories, world travels, r…... Read more »

Helping You Sow the Seeds for Success

Whether you’re a casual gardener or regard yourself as a serious horticulturist, Stillwater Milling in Claremore wants to help you get ready for the coming planting season. ... Read more »

Fill Your Hearts with Empty Bowls

Hope is like a flame for those who struggle, fueled by the kindness and compassion of those willing to serve to assist people in need.  Since 2013, a collaboration …... Read more »

For Free!