2,495,297 unique IP addresses from 170 countries 

The “Thud Factor”

The term “thud factor” often comes up in discussions about cybercriminal activity, referring to the weighty numbers that are frequently cited. This term dates back to when term papers were typed and physically handed in, with the ‘thud’ of the paper hitting the desk being a measure of its heft, not necessarily its quality.

Substance over Volume

In a similar vein, many reports on cybercrime focus heavily on technical data, often inherently providing a correlating “thud factor” yet they fail to adequately address the broader implications beyond cybersecurity. For instance, cybercrime can significantly impact global crises, leading to spikes in malicious online activities. These activities are not just a threat to cybersecurity but pose a wider economic and social danger, undermining trust in digital platforms, exploiting human empathy, and diverting funds from legitimate causes, thereby affecting global stability and prosperity. Moreover, cybercrime has profound consequences for individuals and companies, including financial loss, erosion of trust, and reputational damage. So, what is to be done?

A $7 bar…

The figures mentioned reflect the efforts of researchers dedicated to deepening their comprehension of a malware threat initially identified by a different vendor. By purchasing the unique address of the command-and-control server for a mere $7.00, they could observe the volume of systems checking in. These significant figures ultimately denote the unique computers now accessible to cybercriminals or anyone with $7.00, highlighting the formidable challenge before us.

A Zero Trust Framework

At Lead I.T. Consulting, we strive to fortify our systems by adopting and integrating the Zero Trust Framework to the fullest extent possible. We extend our own internal efforts to our customers and clients so they enjoy the same levels of protection. A larger challenge, and part of the overarching challenge dealing with cyber criminals and their industry, is the customers of our clients. As an example, consider this: while visiting a website a pop-up appears and states that the computer is infected with a virus and to call a number immediately. The message appears legitimate as it shows a Microsoft logo, and the number begins with 866. Upon calling the number the caller says they are a Microsoft contractor and to fix the problem they need a credit card. We know how this story ends, and we know that Microsoft is not responsible.  What happens if the person answering the phone says they are from your company? What happens when there is an invoice sent to one of our customers that appears to be from us yet is not?  For many of our clients, the best protections are a combination of procedures and additional protective measures like DMARC, SPF, DKIM, MFA, ZTA, and TBA are all we have.

Vulnerable Industries

But for our customers such as accounting firms, and tax services, who manage sensitive data, regulators specify penalties for security breaches without detailing the protective measures. This raises a question: how challenging is it to safeguard these customers from their own vulnerabilities? The good news is that the American Institute of CPAs (AICPA) has taken the step to establish a top-level domain (TLD) for CPA’s. The business value of having a TLP cannot be overstated as this enables even the least tech-savvy client to easily understand where they are when on the website of their CPA or accountant.

Outpacing Shifting Threats

Protecting customers and clients often relies on global efforts to enhance the safety and security of the internet. Experts are constantly crafting new standards and protocols that not only build trust but also become part of legal requirements or service prerequisites. Even unregulated industries aren’t immune to these shifts; businesses that fail to keep pace may find themselves at a competitive loss. Imagine the consequences if your company’s emails were mistakenly marked as spam, causing them to be deleted automatically by client systems.

Meeting the Challenge

The frequency of such challenges is on the rise, necessitating agility and adaptability. At Lead IT Consulting, we address these issues by striking a delicate balance between risk and safety, tailored to the unique needs of your business. Each business is different which makes our customized approach to supporting each client business uniquely valuable. If you are concerned about navigating the rising tide of shifting internet security breaches, we’d love to consult with you to determine how we might be able to help YOUR business.  Lead I.T. Consulting always starts with the business and customizes technology solutions to fit your business goals while minimizing risk. Book a meeting to discuss or complete a contact form and let us know how we might help. 

Scroll to Top