• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

What Threats are We Seeing on Small Business Networks?

It’s no secret that cyber criminals are increasingly targeting small and medium sized businesses, but what do those generic “threats” look like? Our threat detection and blocking partner recently looked in detail at some of the traffic they’re blocking on SMB networks all over the world, and here are some examples of what they’re seeing (and blocking):

● A known phishing site in Germany connecting to the network of a State Regulatory Agency office in the southern US

● A host – located in the US – associated with brute force SSH attacks (the objective of which is to use the SSH protocol to execute commands on a remote computer) was blocked by Dark Cubed on the network of the offices of a small municipality in the southwest US

● An Iranian Telecom company’s address, identified for exploiting SQL server vulnerabilities was connecting to a K-12 school district in the southwest US

● A host located in China and associated with brute force attacks (automated attempts to identify weak passwords) was blocked on that same K-12 school district’s website

● A German-located device launching a Telnet open port scan and potential SNMP (Simple Network Management Protocol) attack against an Animal Hospital in the midwest

These examples were collected randomly, so there’s every reason to believe they are indicative of the kinds of threats facing our customers every day.

As we’ve discussed previously, we’ve added a service to our offering designed specifically to counter these common threats, and we’re excited to offer it to you and all of our customers.

Let me know when might be a good time to talk more about how we can expand our service to materially reduce your cyber risk with this compelling new technology.

Andy Fruechtnicht

Singlesource IT

We’re here to help!

Get in touch today to find out why Singlesource IT should be your partner in IT.

You May Also Be Interested In:

Free to hack fraud map vector

New Gmail Threats Targeting Users in 2025 (and How to Stay Safe)

silver laptop computer on black table

8 Considerations Before Buying Used Technology

Free cybersecurity security authentication vector

All About the New U.S. Cyber Trust Mark

Free cyber security phone login vector

Top 10 Security Tips for Mobile App Users

How the 2025 Tariffs Impact MSPs and Computer Hardware

Free Aerial view of a sleek laptop keyboard on a clean, white surface, ideal for tech backgrounds. Stock Photo

Is It Time for a Device Upgrade? Check for These 7 Signs

A man sitting at a table using a laptop computer

How Much Device Storage You Need: A Comprehensive Guide

Windows 11 - EOS

Heads up! End of Support for Windows 10 is Approaching!

MDR

Managed Detection and Response: The Next Step in Protection

Previous Post: « Monthly Threat Reports from Singlesource IT
Next Post: Microsoft Announces Windows 11 Windows 11 Coming Soon»

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

Free to hack fraud map vector

New Gmail Threats Targeting Users in 2025 (and How to Stay Safe)

Cybercriminals target Gmail a lot because it’s very popular. It also integrates with many other …

silver laptop computer on black table

8 Considerations Before Buying Used Technology

We use our devices every day, so they need to work well for our needs. A device that’s slow or …

Free cybersecurity security authentication vector

All About the New U.S. Cyber Trust Mark

The Cyber Trust Mark is a new smart device label created by the US government to prove that a device …

Free cyber security phone login vector

Top 10 Security Tips for Mobile App Users

Mobile applications have become an integral part of our lives. We use them to browse the internet, …

How the 2025 Tariffs Impact MSPs and Computer Hardware

In case you missed it, new tariffs are here and they’re already impacting the market. Here’s a quick …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2025 · Singlesource IT