{"id":1239,"date":"2020-04-30T14:45:33","date_gmt":"2020-04-30T14:45:33","guid":{"rendered":"https:\/\/efaxstg.wpengine.com\/uk\/?p=1239"},"modified":"2022-11-29T19:16:02","modified_gmt":"2022-11-29T19:16:02","slug":"cyber-security-threats-to-businesses","status":"publish","type":"post","link":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses","title":{"rendered":"Cyber Security: Common Threats for Businesses in 2020"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1239\" class=\"elementor elementor-1239\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5cd2b1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5cd2b1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-aa37d05\" data-id=\"aa37d05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7606129 elementor-widget elementor-widget-text-editor\" data-id=\"7606129\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It&#8217;s a sad fact of modern business that cyber security continues to pose major risks to prospects. Cyber criminals are\u00a0<a href=\"https:\/\/www.getsafeonline.org\/news\/dramatic-increase-in-cyber-attacks-on-uk-business\/\" target=\"_blank\" rel=\"noopener\">more active than ever<\/a>, with around 90% of UK businesses being the victim of attempted attacks; many of which prove successful. Attacks can be absolutely devastating, with hackers sometimes causing millions of pounds in damages.<\/p><p>The methods vary, but it\u2019s almost always the same target: your communications infrastructure. The most valuable commodity in the digital hacking world these days is personal data and business information. If criminals and cyber attackers can access this through your communication channels, they can reap the rewards.<\/p><div id=\"Contentplaceholder1_C030_Col00\" class=\"sf_colsIn col-xs-12 col-sm-6\" data-sf-element=\"Column 1\" data-placeholder-label=\"Column 1\"><div><div><p>So, what are the latest developments in cyber attacks when it comes to communication? What are the new cyber security threats for businesses in 2020, and how can you put a stop to them? The guidance from our technical experts here at eFax aims to help support organisations facing cyber vulnerability.<\/p><\/div><\/div><\/div><div id=\"Contentplaceholder1_C030_Col01\" class=\"sf_colsIn col-xs-12 col-sm-6\" data-sf-element=\"Column 2\" data-placeholder-label=\"Column 2\"><div>\u00a0<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-887143a\" data-id=\"887143a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ec8d56 elementor-widget elementor-widget-image\" data-id=\"8ec8d56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"333\" src=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png\" class=\"attachment-large size-large wp-image-1181\" alt=\"security-online-work\" srcset=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png 500w, https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work-300x200.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b27aa4c elementor-align-left elementor-widget elementor-widget-button\" data-id=\"b27aa4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ww2.efax.com\/uk\/signup\/pricing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">eFax Free Trial <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e45e877 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e45e877\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-04c7341\" data-id=\"04c7341\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ac2a35 elementor-widget elementor-widget-heading\" data-id=\"6ac2a35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Emails Are Still Very Vulnerable\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4a69de elementor-widget elementor-widget-text-editor\" data-id=\"b4a69de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEmail remains one of the most popular forms of digital communication in the world. Figures suggest around 125 billion business emails are sent every single day \u2014 and that number is only rising. Far from being a comfort that communication is more free-flowing than ever, cybersecurity experts will find this notion alarming.\n\nBy definition, email is a very insecure system. The technology centres around a series of methodologies that make it very difficult to secure. From challenges protecting methods in transit to verification of senders, there are so many issues with email that it warrants its very own blog. If you think about it, everything you do online registers to your email in some way. How many opportunities are there for hackers to learn your details, crack your password and access your account?\n\nThis is something we will talk about in more detail soon. For now, though, take our words as experts in technology that emails are highly vulnerable. And if you won\u2019t take our word, listen to the data.\n\nIn 2019, Microsoft reported on over\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/growth-center\/resources\/why-a-billion-hacked-email-accounts-are-just-the-start\">a billion hacked email accounts<\/a>\u00a0known throughout the industry, belonging to private individuals and business organisations. This means that roughly one-third of all internet users have a compromised email account. What happens if your email account becomes vulnerable? All your sensitive data shared to and from the account becomes available to hackers. Financial data is discovered and personal information accessed. Company secrets become public knowledge.\n\nThis happened to Sony Pictures in what became one of\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Sony_Pictures_hack\" target=\"_blank\" rel=\"noopener\">the most infamous email hacks in history<\/a>. Masses of information was stolen and shared publicly after hackers infiltrated Sony\u2019s email systems. Dirty laundry was aired, and Sony took a massive hit in terms of reputation and financially. None of this would have happened if they had transmitted their data more securely than email.\n\nThe executives at Sony appeared to learn from this lesson. Instead of email,\u00a0<a href=\"https:\/\/www.inc.com\/chris-matyszczyk\/why-sony-ceo-went-back-to-the-fax-machine.html\" target=\"_blank\" rel=\"noopener\">they turned to fax<\/a>.\n\nThe idea was simple. Pivot away from digital technology, return to analogue routes that are considered \u201cunhackable\u201d and keep data secure. But the problem was not actually with digital technology at all. It was just with email. Emails are vulnerable to hacking, but that is not true of all technology.\n\nThe move to fax opened up several security threats that could again prove challenging for Sony. Fax hardware communications are not encrypted, which makes the transmission of data very insecure. The physical nature of documents also stops them being protected for unauthorised viewing and makes for easy dissemination.\n\nFax machines were not the answer to this problem. But what is? If you can\u2019t email and you can\u2019t fax, how do you send communication effectively without risking hacking vulnerabilities?\n\nThe answer is dedicated cloud-based technology.\n\nCloud-technology is an upgrade on email servers. Cloud systems provide much more secure data transmission through high-level encryption. The information is also transmitted internally between different contacts within the same cloud system, rather than through different servers, means it\u2019s much harder for messages to be compromised.\n\nFor example, eFax\u00a0<a href=\"https:\/\/ww2.efax.com\/uk\/\">cloud-faxing<\/a>\u00a0is a cloud-based system. If you and your recipient use eFax, the document you send stays within our servers. There is no weak link in the chain, as there is with email. Emails bounce around from server to server until they reach you, while eFax is direct. Imagine taking a flight straight from one airport to another, compared to travelling over a series of several connecting flights. On each connection, you have the chance for problems \u2014 lost luggage, missed departures, stolen goods at the airport. This analogy works to convey the differences between email vs the cloud. The connecting flights are email, while the direct flight is eFax.\n\nThe documents sent using cloud-technology also remain digital, removing the vulnerabilities of physical transmission through fax machine hardware. If you want to avoid the risks of email, it\u2019s important to move communications to cloud-based technology like eFax.\n\nBut there are other benefits to eFax, too. It\u2019s not just about protecting your business from the risks of emails.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f00d61 elementor-widget elementor-widget-heading\" data-id=\"3f00d61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Faxploit Backdoor Cyber Attack<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29f7a75 elementor-widget elementor-widget-text-editor\" data-id=\"29f7a75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It turns out you can teach an old dog new tricks. In this case, hackers can teach your old fax machine to give them access to your new IT systems.<\/p><p>Recently, a hacking method was discovered dubbed as the\u00a0<a href=\"https:\/\/blog.checkpoint.com\/2018\/08\/12\/faxploit-hp-printer-fax-exploit\/\" target=\"_blank\" rel=\"noopener\">\u201cfaxpliot\u201d<\/a>. It works very simply in practice but can cause nightmares for your business. A fax machine receives information and converts that information into a printable image. It doesn&#8217;t ask questions about what it receives \u2014 it just does what it is told if the message is compatible. Hackers have realised they can send a fax machine code the hardware believes is an image, but actually gives the hackers access to the fax machine itself.<\/p><p>We know what you are thinking: what&#8217;s the worst they can do? Print rude images on your fax machine?<\/p><p>Well, they can actually do a lot of damage. First off, they can take control of your machine, stopping other inbound and outbound fax and slowing your operation down. However, this is not the primary reason hackers attack your fax machine. The fax machine has no firewall or antivirus \u2014 basically, in terms of modern data security, it is useless. It cannot stop malicious programs from activating within the system. Once they&#8217;ve gained access to your fax machine, hackers can follow network connections from your machine into your other IT systems, such as your business computers and servers. Because the malicious code is already in the system, the network isn&#8217;t going to notice (unless your system is very advanced \u2014 we&#8217;re talking MI5 levels of technology, here).<\/p><p>The fax machine effectively becomes an unlocked backdoor through which hackers can enter. Using this form of cyber attack, hackers can compromise cyber security and get into your systems to steal data, cause damage, plant spyware, ransomware and do much, much more.<\/p><p>But how do you combat this new cyber security threat if you need to fax?<\/p><p>The problem with faxploit, as opposed to other cybersecurity threats, is it exploits old hardware. This makes it very difficult to protect against, as fax machines were not designed to be part of the digital age. They are simply not as adaptive and responsive to 21st-century threats from cyber attacks. When faxpliot was discovered, researchers managed to design a patch to stop the code they identified as a cyber threat from running. This patch, however, only provides a solution to a specific computer script and hackers simply develop new ones. The way fax machines operate means there is no real way to solve the problem.<\/p><p>Instead, you need to look at ways to send a fax without a fax machine.\u00a0<a href=\"https:\/\/ww2.efax.com\/uk\/\">eFax online fax solutions<\/a>\u00a0enable complete fax functionality using computers and phones \u2014 devices that can be protected by modern security protocols. There is no need for fax hardware at all. You can keep faxing and ditch fax machines today. With the threat of cyber attacks looming, moving to eFax can give you the confidence to carry on sending essential fax without worrying about the implications of owning an outdated fax machine.<\/p><p>Our cloud-based technology removes yet another major risk for your business security. And we\u2019re still not done.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dad1987 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dad1987\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3953176\" data-id=\"3953176\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca1ce45 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"ca1ce45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">No obligation. No set-up fees. No risk. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52ddd94 elementor-align-center elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"52ddd94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/uk\/signup\/pricing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial <i class=\"fa fa-angle-double-right fa-lg\"><\/i><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-894f1a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"894f1a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0f1997a\" data-id=\"0f1997a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10d5b7a elementor-widget elementor-widget-heading\" data-id=\"10d5b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sophisticated and Coordinated Phishing Attacks\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7f649c elementor-widget elementor-widget-text-editor\" data-id=\"c7f649c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPhishing attacks are certainly nothing new. The concept is basic in principle and has been around for many years. Hackers pretend to be legitimate organisations to obtain details like passwords or credit card information for identity theft. Most people are clued up to this and can spot a phishing attack a mile away, but now hackers are adapting to awareness and seeing an unsettlingly\u00a0<a href=\"https:\/\/www.phishingbox.com\/news\/post\/verizon-data-breach-investigations-report-dbir-2019\" target=\"_blank\" rel=\"noopener\">high success rate<\/a>\u00a0according to statistics.\n\nSo what&#8217;s new?\n\nIt is the complexity of attacks that is causing problems, as no one is really prepared for the level of commitment people are now putting into their phishing attempts. Email is often the target, and what hackers will do as part of this cyber attack are things like setting up fake accounts under the same name as a co-worker or boss. They&#8217;ll also replicate websites to look identical to tools they know your businesses use. It&#8217;s effectively a con-job where they convince you the interaction is genuine. It isn&#8217;t a thinly veiled disguise anymore \u2014 we&#8217;re talking Sherlock-Holmes level subterfuge.\n\nCloud-technology removes the ambiguity of messages. The direct contact that comes from a message sent through cloud systems like eFax means the communication is always going to be genuine. Take, for example, another cloud-based tool, Slack. Slack is a messaging tool that you access via a specific login system. Once in, you can send direct messages to other people like an SMS service. However, it\u2019s always clear who you are being messaged by. It\u2019s not a random mobile number claiming to be somebody they might not be or an email message that appears to be from your boss but isn\u2019t. People cannot fake the account sending the message. The only way to access message boards is to be part of your organisation, be assigned a defining username, and given access to conversation channels.\n\nA restricted messaging system completely removes the chance of phishing attacks taking place. You\u2019re never in a position where you don\u2019t know if the sender is actually your colleague. eFax \u2014 and many other systems \u2014 do the same thing via the cloud. You are all connected by a validated internal system. Identification becomes impossibly easy, which means getting tricked becomes impossibly difficult.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3ddace elementor-widget elementor-widget-heading\" data-id=\"e3ddace\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Power of Cloud Tech: Protecting Your Business from Cyber Security Threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d852bc4 elementor-widget elementor-widget-text-editor\" data-id=\"d852bc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What you\u2019ll notice about these three major problems is they\u2019re all targeting out-of-date systems built before the digital age exploded. They were not fundamentally designed to face the challenges of modern data security. At the time of their inception, the cybersecurity threats just didn\u2019t exist.<\/p><p>But that isn\u2019t the case for cloud technology.<\/p><p>Cloud tech is not the newest solution, but its rise to prominence only happened around 2005, making it far newer than systems like email and fax. The architecture cloud systems are built on was developed during a period when we had a much better understanding of cyber security threats, which means at the core of cloud technology is a structure designed to protect against problems.<\/p><p>To use another analogy, imagine systems like email and fax are medieval civilisations that have never been attacked. They built interlinking villages that offered flexible trading and free-flowing culture. It was easy to go from one village to the other. Then the Vikings attack and the villages had no way to defend themselves because they weren\u2019t prepared. Cloud technology is built on the history of defeats. It\u2019s the villages that built walls and fortifications to keep out invaders \u2014 the ones that stopped letting just anyone in.<\/p><p>Build a fortress around your business and stop cybersecurity invaders stealing and destroying what\u2019s yours. Introduce cloud technology and protect yourself from threats to your communication channels.<\/p><p>Cybersecurity threats will remain a risk for businesses into 2020 and far beyond. Now is the time to act to protect your company and develop cloud-based systems to fend off the most dangerous threats. eFax online fax is cloud-hosted software that features high levels of encryption and data protection solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>It&#8217;s a sad fact of modern business that cyber security continues to pose major risks to prospects. Cyber criminals are more active than ever, with around 90% of UK businesses being the victim of attempted attacks; many of which prove successful. Attacks can be absolutely devastating, with hackers sometimes causing millions of pounds in damages.<\/p>\n","protected":false},"author":1,"featured_media":1181,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Common Cyber Security Threats to Businesses in 2020 | eFax<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Cyber Security Threats to Businesses in 2020 | eFax\" \/>\n<meta property=\"og:description\" content=\"It&#039;s a sad fact of modern business that cyber security continues to pose major risks to prospects. Cyber criminals are more active than ever, with around 90% of UK businesses being the victim of attempted attacks; many of which prove successful. Attacks can be absolutely devastating, with hackers sometimes causing millions of pounds in damages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses\" \/>\n<meta property=\"og:site_name\" content=\"eFax UK\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-30T14:45:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-29T19:16:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Scott Schweigert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Schweigert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses\"},\"author\":{\"name\":\"Scott Schweigert\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/person\\\/cb3188fe7d58cc629d3a2f5ce3b4f3ec\"},\"headline\":\"Cyber Security: Common Threats for Businesses in 2020\",\"datePublished\":\"2020-04-30T14:45:33+00:00\",\"dateModified\":\"2022-11-29T19:16:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses\"},\"wordCount\":2064,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/security-online-work.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses\",\"name\":\"Common Cyber Security Threats to Businesses in 2020 | eFax\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/security-online-work.png\",\"datePublished\":\"2020-04-30T14:45:33+00:00\",\"dateModified\":\"2022-11-29T19:16:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#primaryimage\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/security-online-work.png\",\"contentUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/06\\\/security-online-work.png\",\"width\":500,\"height\":333,\"caption\":\"security-online-work\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/blog\\\/cyber-security-threats-to-businesses#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security: Common Threats for Businesses in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#website\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\",\"name\":\"eFax UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#organization\",\"name\":\"eFax UK\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/01\\\/logo-efax.png\",\"contentUrl\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/01\\\/logo-efax.png\",\"width\":2370,\"height\":749,\"caption\":\"eFax UK\"},\"image\":{\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ww2.efax.com\\\/uk\\\/#\\\/schema\\\/person\\\/cb3188fe7d58cc629d3a2f5ce3b4f3ec\",\"name\":\"Scott Schweigert\",\"sameAs\":[\"https:\\\/\\\/ww2.efax.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Cyber Security Threats to Businesses in 2020 | eFax","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses","og_locale":"en_US","og_type":"article","og_title":"Common Cyber Security Threats to Businesses in 2020 | eFax","og_description":"It's a sad fact of modern business that cyber security continues to pose major risks to prospects. Cyber criminals are more active than ever, with around 90% of UK businesses being the victim of attempted attacks; many of which prove successful. Attacks can be absolutely devastating, with hackers sometimes causing millions of pounds in damages.","og_url":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses","og_site_name":"eFax UK","article_published_time":"2020-04-30T14:45:33+00:00","article_modified_time":"2022-11-29T19:16:02+00:00","og_image":[{"width":500,"height":333,"url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png","type":"image\/png"}],"author":"Scott Schweigert","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Schweigert","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#article","isPartOf":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses"},"author":{"name":"Scott Schweigert","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/person\/cb3188fe7d58cc629d3a2f5ce3b4f3ec"},"headline":"Cyber Security: Common Threats for Businesses in 2020","datePublished":"2020-04-30T14:45:33+00:00","dateModified":"2022-11-29T19:16:02+00:00","mainEntityOfPage":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses"},"wordCount":2064,"commentCount":0,"publisher":{"@id":"https:\/\/ww2.efax.com\/uk\/#organization"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#primaryimage"},"thumbnailUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses","url":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses","name":"Common Cyber Security Threats to Businesses in 2020 | eFax","isPartOf":{"@id":"https:\/\/ww2.efax.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#primaryimage"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#primaryimage"},"thumbnailUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png","datePublished":"2020-04-30T14:45:33+00:00","dateModified":"2022-11-29T19:16:02+00:00","breadcrumb":{"@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#primaryimage","url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png","contentUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/06\/security-online-work.png","width":500,"height":333,"caption":"security-online-work"},{"@type":"BreadcrumbList","@id":"https:\/\/ww2.efax.com\/uk\/blog\/cyber-security-threats-to-businesses#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ww2.efax.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Cyber Security: Common Threats for Businesses in 2020"}]},{"@type":"WebSite","@id":"https:\/\/ww2.efax.com\/uk\/#website","url":"https:\/\/ww2.efax.com\/uk\/","name":"eFax UK","description":"","publisher":{"@id":"https:\/\/ww2.efax.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ww2.efax.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ww2.efax.com\/uk\/#organization","name":"eFax UK","url":"https:\/\/ww2.efax.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/01\/logo-efax.png","contentUrl":"https:\/\/ww2.efax.com\/uk\/wp-content\/uploads\/sites\/8\/2022\/01\/logo-efax.png","width":2370,"height":749,"caption":"eFax UK"},"image":{"@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ww2.efax.com\/uk\/#\/schema\/person\/cb3188fe7d58cc629d3a2f5ce3b4f3ec","name":"Scott Schweigert","sameAs":["https:\/\/ww2.efax.com"]}]}},"_links":{"self":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/media\/1181"}],"wp:attachment":[{"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ww2.efax.com\/uk\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}