• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Protected Documents

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

What Threats are We Seeing on Small Business Networks?

It’s no secret that cyber criminals are increasingly targeting small and medium sized businesses, but what do those generic “threats” look like? Our threat detection and blocking partner recently looked in detail at some of the traffic they’re blocking on SMB networks all over the world, and here are some examples of what they’re seeing (and blocking):

● A known phishing site in Germany connecting to the network of a State Regulatory Agency office in the southern US

● A host – located in the US – associated with brute force SSH attacks (the objective of which is to use the SSH protocol to execute commands on a remote computer) was blocked by Dark Cubed on the network of the offices of a small municipality in the southwest US

● An Iranian Telecom company’s address, identified for exploiting SQL server vulnerabilities was connecting to a K-12 school district in the southwest US

● A host located in China and associated with brute force attacks (automated attempts to identify weak passwords) was blocked on that same K-12 school district’s website

● A German-located device launching a Telnet open port scan and potential SNMP (Simple Network Management Protocol) attack against an Animal Hospital in the midwest

These examples were collected randomly, so there’s every reason to believe they are indicative of the kinds of threats facing our customers every day.

As we’ve discussed previously, we’ve added a service to our offering designed specifically to counter these common threats, and we’re excited to offer it to you and all of our customers.

Let me know when might be a good time to talk more about how we can expand our service to materially reduce your cyber risk with this compelling new technology.

Andy Fruechtnicht

Singlesource IT

We’re here to help!

Get in touch today to find out why Singlesource IT should be your partner in IT.

You May Also Be Interested In:

Free antivirus security privacy illustration

LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams

Free cyber security digital cyber illustration

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

Free list notes icon illustration

The Essential Checklist for Securing Company Laptops at Home

Free cloud computer backup illustration

The 2026 Guide to Uncovering Unsanctioned Cloud Apps

A combination lock rests on a computer keyboard.

Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan

Old Router Around the House? The NSA & The FBI Agree: Reboot or Replace Now!

A piece of cardboard with a keyboard appearing through it

How to Run a “Shadow AI” Audit Without Slowing Down Your Team

Free cyber security technology network illustration

A Small Business Roadmap for Implementing Zero-Trust Architecture

Download free HD stock image of Technology Light

5 Security Layers Your MSP Is Likely Missing (and How to Add Them)

Previous Post: « Monthly Threat Reports from Singlesource IT
Next Post: Microsoft Announces Windows 11 Windows 11 Coming Soon»

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

Free antivirus security privacy illustration

LinkedIn “Social Engineering”: Protecting Your Staff from Fake Recruitment Scams

A fake recruiter message is one of the cleanest social engineering tricks around because it doesn’t …

Free cyber security digital cyber illustration

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive stuff, lock …

Free list notes icon illustration

The Essential Checklist for Securing Company Laptops at Home

At home, security incidents don’t look like dramatic movie hacks. They look like stepping away from …

Free cloud computer backup illustration

The 2026 Guide to Uncovering Unsanctioned Cloud Apps

If you want to uncover unsanctioned cloud apps, don’t begin with a policy. Start with your browser …

A combination lock rests on a computer keyboard.

Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan

Ransomware isn’t a jump scare. It’s a slow build.In many cases, it begins days, or even weeks, …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2026 · Singlesource IT