Think you’re not a target? See how many of these items you
have that hackers want
Checklist for Small and Mid sized Businesses
Have a business website? hackers can:
Compromise your website to host malware, then
get other businesses and your users to download
it
Host copyrighted material on your website, like
illegal movies, music, books or other digital
content
Host child pornography, you get the blame and
they remain anonymous
Send spam, you get the blame and they remain
anonymous
Create a phishing site, a site that looks like
another site designed to steal your information
Have an email account? Hackers can:
Send scam emails from your account
Harvest your address book and attack all your
friends
Look through your email history to harvest
additional account information and credentials
you use on other sites
Access to company email resources and
proprietary or even protected information
Have social media accounts? Hackers can:
Ruin your reputation by posting links to malware,
ads for enhancement medications or other
general spam
Friend other hackers and expose all your
information and attack your friends
Have a computer on-line? Hackers can:
Install Ransomware
Perform webcam image extortion, take pictures
of you through your webcam and threaten to
post them on the internet if you don’t pay money
Add your computer to a bot net, an network of
computers who’s owners don’t know that their
systems are on the Internet performing various
tasks.
Spam Zombie, similar to a bot but sending large
amounts of emails to lists all over the world
DDoS Extortion Zombie, a type of bot that sends
large amounts of data to a single target system
in coordination with thousands of other system
by order of the hacker
Use your computer as a click Fraud Zombie,
creating fake clicks on ads to run up advertising
rates and charges
Anonymization Proxy, hackers can hide
themselves behind your computer so that their
actions look like your actions
CAPTCHA solving Zombie, hackers can use your
computer’s resources to solve CAPTCHA’s in
order to automate the signup process for other
social media accounts
Have access to an online resource? Hackers
can:
Use your eBay/PayPal accounts to make
fake transactions or steal your money
Sell illegal or virtual goods
Steal your online currency
Sell stolen software license keys
Steal your online gaming credentials, to
stack their deck or steal your money
Guess your website credentials, because
you used a poor password,
Skype/VoIP Credentials, to spam others or
entice them to download malware
Get into your bank account data to steal
your money
Get into your credit card data to steal your
money
Get into your stock trading account to steal
your money
Get into your mutual fund/401k Account to
steal your money
Get into your tax account with an
accountant to steal your money
Store data? Hackers can:
Steal and sell or use personal identifiable
information to commit fraud or ruin credit
Steal personal health information to commit
insurance fraud, drug fraud or purchase
medication to then resell on the black
market
Steal credit card data to get money and
make unauthorized purchases
Steal names, birth dates, and policy
numbers to create fake IDs and buy
medical equipment to resell
Steal data to do other things like:
Refinance your own home and take
out a home equity loan on the
house you live in
File tax returns using your
information
File for bankruptcy and use your
information
Serve jail time with your identity
Collect government benefits that
you should be getting
Get a house, apartment or car with
your information
Empty your bank account