- Phish & Tell
- Posts
- PHISH & TELL 010
PHISH & TELL 010
The Cybersecurity Brief for Women Who Mean Business
š WELCOME to Phish & Tellā¢ļø, from Security Done Easyā¢ļø
Youāre not just building a business. | ![]() |
š£ TOP CYBERSECURITY NEWS STORIES OF THE WEEK
Here are the top cybersecurity stories from this week that are most relevant to small businessesāalong with why they matter and what you can do about them. I could have included 20 different stories.
Critical Infrastructure: A Cyber Weak Spot
Essential services like power, water, and emergency response systems are being targeted by hackersāand many have almost no cybersecurity protections.
ā Why it matters: Your small business depends on these services. If your local power grid or water system is hit, your business could be disruptedāeven if you're not directly attacked.
š What to do: Look up your utility providersā cyber plans. Support community efforts like Cyber Resilience Corps, which helps protect critical systems at the local level.
š Source
Manhattan Parking Breach
A parking company had a data breach that exposed customer information like names, emails, phone numbers, and car details.
ā Why it matters: If you store any customer or employee information, a similar breach could happen to you.
š What to do: Check how your business stores personal data. Make sure files are protected, software is updated, and only trusted people have access. Ask vendors how they protect your info, too.
š Source
Hawaiian Airlines Hit by CyberattackāSome IT Systems Disrupted
Hawaiian Airlines, part of Alaska Air Group, reported a cybersecurity event that disrupted some of its internal systemsābut flights continued as scheduled.
ā Why it matters: Even if your business isnāt in aviation, this highlights how attackers are targeting large service providersāif their systems go down, the ripple effects could affect travel, shipments, or events tied to your business.
š What to do:
Confirm your partners' security resilienceāask airlines, logistics, or event vendors what protections theyāve put in place.
Plan for disruptionsāif a vendor faces an IT outage, how will that impact your operations? Maintain alternative processes.
Use multi-source strategiesāfor shipping, travel, and IT, consider having backup options if one provider goes offline.
š Source
Ransomware Up 132%āBackup Matters More Than Ever
Ransomware attacks (where hackers lock your files and demand money) have gone up by more than 130% this year.
ā Why it matters: Without a good backup, you might lose all your filesāor be forced to pay a ransom.
š What to do: Use the 3-2-1 backup rule:
Keep 3 copies of your important files.
Store them on 2 different types of storage (like your computer and an external hard drive).
Keep 1 copy offsite, like in a cloud service or secure external drive not connected to your network.
Test your backups to make sure they work!(If that seems overwhelming and you have nothing in place now, start simple and get 1 backup in the cloud to start.)
š Source
New State Privacy Laws Could Trip Up SMBs
More U.S. states are passing their own online privacy laws, each with different requirements for how businesses collect and store customer information.
ā Why it matters: If your business sells online or collects names and emailsāeven just for newslettersāyou might be subject to these laws, even if youāre not in those states.
š What to do: Make sure your website has a clear privacy policy, ask permission before collecting personal info, and look into tools that help with data compliance.
š Source
š In Case You Missed It (ICYMI)
𫵠Last weekās Security Done Easy blog post: Top Ten Priorities for Securing a Work-at-Home Environment (for Women-Owned Small Businesses) Ā»
Follow us on Facebook or Instagram to get timely important news, such as The National Cybersecurity Allianceās tips for safe vacation travel.
Iāve mentioned this before, but I want to say it again, a different way. 1 in 4 businesses will fail because of a cyber attack. 1 in 2 will experience an attack. 1 in 2 of those wonāt be able to continue because of the recovery costs. Think of this ā of you and three of your business friends ā whoās it going to be? (Hope none of you, but you need to take action. I can help.)
SMBs Hit Hard by Cybercrime CostsNew data confirms half of all small businesses will be targeted by cybercriminalsāand if hit, half of those could go out of business due to recovery costs.
ā Why it matters: The average cost of recovery is $500,000 (legal fees, recovery costs, downtime, etc.) Thatās enough to shut down many small businesses.
š What to do: Donāt wait until after an attack. Train your team on cybersecurity basics, set up daily or weekly data backups, and read the fine print on your policy. If you are looking for monitoring and prevention services rather than trying to piece it together yourself, or insurance, let me know. Email [email protected].
š Source
š¤ The LOL-gorithm
I feel this ;-)

š§· THE SAFETY SNAP
š”ļø Personal Cyber Safety Tip: Lock Down Your Phoneās Location SettingsāHereās Why and How
Your smartphone constantly shares your location with appsāand sometimes with people you didnāt expect. If left unchecked, this can expose your movements, routines, and even private business meetings. Use your business know-how along with the following tips to find the right balance for you of visibility vs. privacy.
How-To:
š± Review app permissions: Go to your phoneās settings and check which apps have access to your location. Set most to āOnly While Usingā or āNever.ā
š Turn off location history: On both Android and iPhone, turn off location tracking features like Google Location History or Significant Locations. These often track you silently in the background.
š Limit social media geotagging: Donāt post where you are in real-timeāwait until youāve left, especially if youāre traveling solo or working from a remote site.
ā Why it matters: As a woman business owner, activist, or consultant, your schedule and whereabouts can be valuable to stalkers, competitors, or bad actors. Protecting your location is protecting your power and peace of mind.
Bonus Tip: Periodically audit shared locationsāespecially in Google Maps, Apple Find My, and messaging apps. Make sure you know and trust who can see you.
š¬ A PERSONAL NOTE
This was a catch-up week. No travel. I needed a quieter week. I also laid off the caffeine a bit š¬
I did find that my foster kitties are content stuffed in my overalls while I work, much like my kids snuggled in their slings while I worked when they were babies. Keeps them (kittens, not babies) from clawing their way up my legs and romping across my desk. Right now they are galloping all over the house while I pack up my laptop to relo to the ice rink for my kidās lessons. Saturday sports š

This is Petunia. I do not use her name in any of my passwords ;-)
š TELL ME
Are you finding this newsletter helpful? Do you have questions or topics youād like addressed? Hit reply and let me know :-)

Youāre subscribed to Phish & Tellā¢ļø because your business is worth protecting.
š©·
