Here’s why we sent this to you.
Transcript:
Hey, did you plug it in?
The challenge with this isn’t whether or not you plug it in. It’s how confident are you?
How safe is your business?
The worst that could happen with this is actually pretty horrible. You read about it in businesses getting destroyed all the time by cyber criminals, and stuff like this is just one way they get in. Usually it’s email.
The thing we’re really asking is:
Do you have a plan? Do you have defenses in play? Can your business survive if an employee makes a mistake? Do they even realize they shouldn’t plug in stuff like this?
If you answered “no” or “I’m not sure” to any of these, we really need to talk.
And yeah, everybody’s got a firewall and everybody’s got antivirus and everybody, most everybody, has a guy who deals with this sort of stuff or has an IT resource. But IT and cybersecurity, like a Venn diagram, they’re not exactly the same thing. So you really need somebody who’s gonna take a hard look at your plan and execute it.
So give me a call. My number is 816-533-6113. Let’s talk through where you are today and how we can make you a hard target for the bad guys.
What if the USB drive was real and I plugged it in?
With us, nothing. With a cybercriminal, it could wreck your business. That’s not hyperbole: the USB drive could launch ransomware or a backdoor for access, and that means at least 21 days of you being out of business, and/or paying a $154,000 ransom. 60% of small businesses go out of business entirely 6 months after an attack like this.
Why would I give this to an employee?
You’re cautious about it. Are they? Have they had regular cybersecurity awareness training? When presented with a USB stick like this, everyone on your team needs to take a beat to think about what bad tech could do.
I’m in the cloud so I’m safe, right?
If the USB drive gave cyber-criminals access to your computer, now they have you name and password for all your cloud services, and they lock you out until you pay to get back in: money to the criminals, or downtime spent on the phone with the cloud vendor to establish your ownership. What do you think the bad guys will do with your data while they are in there?
Doesn’t my IT person handle this?
It’s the adage: “you can’t read the label from inside the jar.” How busy are they with infrastructure, help desk, projects? Every cyberattack you hear about had an IT resource that missed something and left a vulnerability. Set up a time with us for a free evaluation: https://calendly.com/bestmacs/bsafe-intro
Or call/text 816-533-6113