• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Protected Documents

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

What Threats are We Seeing on Small Business Networks?

It’s no secret that cyber criminals are increasingly targeting small and medium sized businesses, but what do those generic “threats” look like? Our threat detection and blocking partner recently looked in detail at some of the traffic they’re blocking on SMB networks all over the world, and here are some examples of what they’re seeing (and blocking):

● A known phishing site in Germany connecting to the network of a State Regulatory Agency office in the southern US

● A host – located in the US – associated with brute force SSH attacks (the objective of which is to use the SSH protocol to execute commands on a remote computer) was blocked by Dark Cubed on the network of the offices of a small municipality in the southwest US

● An Iranian Telecom company’s address, identified for exploiting SQL server vulnerabilities was connecting to a K-12 school district in the southwest US

● A host located in China and associated with brute force attacks (automated attempts to identify weak passwords) was blocked on that same K-12 school district’s website

● A German-located device launching a Telnet open port scan and potential SNMP (Simple Network Management Protocol) attack against an Animal Hospital in the midwest

These examples were collected randomly, so there’s every reason to believe they are indicative of the kinds of threats facing our customers every day.

As we’ve discussed previously, we’ve added a service to our offering designed specifically to counter these common threats, and we’re excited to offer it to you and all of our customers.

Let me know when might be a good time to talk more about how we can expand our service to materially reduce your cyber risk with this compelling new technology.

Andy Fruechtnicht

Singlesource IT

We’re here to help!

Get in touch today to find out why Singlesource IT should be your partner in IT.

You May Also Be Interested In:

a-close-up-of-a-keyboard-with-a-blue-button

How to Use AI for Business Productivity While Staying Cyber-Secure

Free phishing scam website vector

Cracking Down on Credential Theft: Advanced Protection for Your Business Logins

Free black friday minimalist vector

From Gaming to Productivity: How the Newest Black Friday Tech Gadgets Can Boost Your Business

Free Elegant side view of a laptop on a glossy table with natural lighting indoors. Stock Photo

What Your Small Business MUST Know About Data Regulations in 2025

Free hacker computer programming vector

Stop Account Hacks: The Advanced Guide to Protecting Your Small Business Logins

Free success investment business vector

Lost Without a Tech Plan? Create Your Small Business IT Roadmap for Explosive Growth

Free Colleagues celebrate success with a fist bump over financial charts depicting teamwork and unity. Stock Photo

How Smart IT Boosts Employee Morale and Keeps Your Best People

Free statistic survey website vector

Data Overload? Make Your Numbers Speak Volumes with Simple Data Visualization for SMBs

Free A robotic hand reaching into a digital network on a blue background, symbolizing AI technology. Stock Photo

AI Demystified: What to Know About the Current Tools on the Market in 2025

Previous Post: « Monthly Threat Reports from Singlesource IT
Next Post: Microsoft Announces Windows 11 Windows 11 Coming Soon»

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

a-close-up-of-a-keyboard-with-a-blue-button

How to Use AI for Business Productivity While Staying Cyber-Secure

Most organizations have realized that AI is not a sentient system looking to take over the world, …

Free phishing scam website vector

Cracking Down on Credential Theft: Advanced Protection for Your Business Logins

During an era of digital transformation, data and security are king. That is why, as cyber threats …

Free black friday minimalist vector

From Gaming to Productivity: How the Newest Black Friday Tech Gadgets Can Boost Your Business

Images of Black Friday no longer merely conjure up visions of bargain-hunting shoppers bullrushing …

Free Elegant side view of a laptop on a glossy table with natural lighting indoors. Stock Photo

What Your Small Business MUST Know About Data Regulations in 2025

You come into work on Monday, coffee still hot, only to find your email full of urgent messages. An …

Free hacker computer programming vector

Stop Account Hacks: The Advanced Guide to Protecting Your Small Business Logins

Sometimes the first step in a cyberattack isn’t code. It’s a click. A single login involving one …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2025 · Singlesource IT