
{"id":2342,"date":"2013-03-18T00:00:00","date_gmt":"2013-03-18T00:00:00","guid":{"rendered":"http:\/\/otava.test\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/"},"modified":"2013-03-18T00:00:00","modified_gmt":"2013-03-18T00:00:00","slug":"new-cyber-threat-recommendations-by-the-bbb-of-western-michigan","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/","title":{"rendered":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting"},"content":{"rendered":"<p>The Better Business Bureau of Western Michigan has posted an alert on new cyber threats that Michigan businesses should watch out for in 2013:<\/p>\n<ul>\n<li dir=\"ltr\"><strong>Cloud-Based Botnets<\/strong>: <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">Cloud computing<\/a> allows businesses to quickly scale computing power up or down, creating the potential for massive virtual networks to simultaneously send thousands of spam emails. A growing concern is that cloud computing resources will be purchased using credit card information obtained from phishing schemes.<\/li>\n<li dir=\"ltr\"><strong>Search History Poisoning<\/strong>: Hackers attempt to bump illegitimate websites to the top of search engine results, and now, try to manipulate individuals\u2019 search histories\u2014according to the Emerging Cyber Threats Report 2013 from Georgia Tech. Compromised search histories can follow users from computer to computer, perpetuating the inaccurate results and increasing the likelihood of visiting malicious websites.<\/li>\n<li dir=\"ltr\"><strong>Mobile Wallet Vulnerabilities<\/strong>: Near field communication, or NFC\u2014a technology which allows two devices to exchange data when in the proximity of each other\u2014is being considered by many smartphone manufacturers, retailers and airlines. With this technology, near field scanners may attempt to capture stored credit card information from passersby.<\/li>\n<li dir=\"ltr\"><strong>Malicious Mobile Apps<\/strong>: The Internet Crime Complaint Center recently issued an alert on malware in Android applications. As the market for mobile applications expands, it is likely that this problem will increase. Read more about mobile device and application security in our <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Mobile Security white paper<\/a>.<\/li>\n<li dir=\"ltr\"><strong>Counterfeit QR Codes<\/strong>: A Quick Response Code is a two-dimensional scannable barcode that directs smartphone users to websites or downloadable content. Counterfeit QR Codes\u2014often adhered over legitimate codes and unknowingly scanned\u2014can download malware or lead to unsecure websites.<\/li>\n<\/ul>\n<p>In effort to advance Michigan\u2019s cybersecurity awareness among businesses, consumers and state government, the Michigan Cyber Range was launched recently to prepare professionals to detect and prevent cyber attacks. The range puts people in real-world settings to simulate an actual threat.<\/p>\n<p>The range also showcases courses and events that allow professionals to become certified in the information security field, including titles such as Certified Information Systems Security Officer (CISSO), Certified Web Application Engineer (CSWAE), Certified Disaster Recovery Engineer (CDRE) and others. Find a full list of course descriptions on the <a href=\"https:\/\/www.merit.edu\/cyberrange\/courses.php\">Merit Michigan Cyber Range<\/a> course offerings website.<\/p>\n<p>To reduce risk of data loss and potential fraud or identity theft, Michigan businesses can turn to <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">secure Michigan hosting providers<\/a> for their data protection services, and to take advantage of the investments made in data center security and maintenance. When it comes to compliance needs for the retail or healthcare industries, Michigan businesses should seek <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI hosting<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting<\/a> providers that can provide an audit report to verify that the design of their environmental, technical and administrative controls are operating at the highest level of security.<\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\">Michigan data centers<\/a> are also an ideal location for data hosting due to the low risk of natural disaster, natural cooling, and cost-efficient services. Find out which audits and compliance reports to ask for when seeking a Michigan hosting provider in our <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/data-center-standards-cheat-sheet-from-hipaa-to-soc-2\/\">Data Center Standards Cheat Sheet &#8211; From HIPAA to SOC 2<\/a>.<\/p>\n<p><strong>About the Michigan Cyber Range<\/strong><br \/>\nThis course is presented through the facilities of the Michigan Cyber Range, and all exercises will be conducted within the Cyber Range infrastructure. Hosted by Merit Network, the Michigan Cyber Range enables individuals and organizations to develop detection and reaction skills through simulations and exercises. The program offers students and IT professionals a full curriculum of meetings and workshops as well as critical cybersecurity training and awareness tools. More information on the Michigan Cyber Range can be found at www.merit.edu\/cyberrange.<\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/westernmichigan.bbb.org\/article\/Cyberthreats-of-2013-40307\">Cyberthreats of 2013<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Better Business Bureau of Western Michigan has posted an alert on new cyber threats that Michigan businesses should watch out for in 2013: Cloud-Based Botnets: Cloud computing allows businesses to quickly scale computing power up or down, creating the potential for massive virtual networks to simultaneously send thousands of spam emails. A growing concern is that cloud computing resources will be purchased using credit card information obtained from phishing schemes. Search History Poisoning: Hackers attempt to bump illegitimate websites to the top of search engine results, and now, try to manipulate individuals\u2019 search histories\u2014according to the Emerging Cyber Threats Report 2013 from Georgia Tech. Compromised search histories can follow users from computer to computer, perpetuating the inaccurate results and increasing the likelihood of visiting malicious websites. Mobile Wallet Vulnerabilities: Near field communication, or NFC\u2014a technology which allows two devices to exchange data when in the proximity of each other\u2014is being considered by many smartphone manufacturers, retailers and airlines. With this technology, near field scanners may attempt to capture stored credit card information from passersby. Malicious Mobile Apps: The Internet Crime Complaint Center recently issued an alert on malware in Android applications. As the market for mobile applications expands, it&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2342","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting\" \/>\n<meta property=\"og:description\" content=\"The Better Business Bureau of Western Michigan has posted an alert on new cyber threats that Michigan businesses should watch out for in 2013: Cloud-Based Botnets: Cloud computing allows businesses to quickly scale computing power up or down, creating the potential for massive virtual networks to simultaneously send thousands of spam emails. A growing concern is that cloud computing resources will be purchased using credit card information obtained from phishing schemes. Search History Poisoning: Hackers attempt to bump illegitimate websites to the top of search engine results, and now, try to manipulate individuals\u2019 search histories\u2014according to the Emerging Cyber Threats Report 2013 from Georgia Tech. Compromised search histories can follow users from computer to computer, perpetuating the inaccurate results and increasing the likelihood of visiting malicious websites. Mobile Wallet Vulnerabilities: Near field communication, or NFC\u2014a technology which allows two devices to exchange data when in the proximity of each other\u2014is being considered by many smartphone manufacturers, retailers and airlines. With this technology, near field scanners may attempt to capture stored credit card information from passersby. Malicious Mobile Apps: The Internet Crime Complaint Center recently issued an alert on malware in Android applications. As the market for mobile applications expands, it...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-18T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting\",\"datePublished\":\"2013-03-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\"},\"wordCount\":602,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\",\"url\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\",\"name\":\"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-03-18T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/","og_locale":"en_US","og_type":"article","og_title":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting","og_description":"The Better Business Bureau of Western Michigan has posted an alert on new cyber threats that Michigan businesses should watch out for in 2013: Cloud-Based Botnets: Cloud computing allows businesses to quickly scale computing power up or down, creating the potential for massive virtual networks to simultaneously send thousands of spam emails. A growing concern is that cloud computing resources will be purchased using credit card information obtained from phishing schemes. Search History Poisoning: Hackers attempt to bump illegitimate websites to the top of search engine results, and now, try to manipulate individuals\u2019 search histories\u2014according to the Emerging Cyber Threats Report 2013 from Georgia Tech. Compromised search histories can follow users from computer to computer, perpetuating the inaccurate results and increasing the likelihood of visiting malicious websites. Mobile Wallet Vulnerabilities: Near field communication, or NFC\u2014a technology which allows two devices to exchange data when in the proximity of each other\u2014is being considered by many smartphone manufacturers, retailers and airlines. With this technology, near field scanners may attempt to capture stored credit card information from passersby. Malicious Mobile Apps: The Internet Crime Complaint Center recently issued an alert on malware in Android applications. As the market for mobile applications expands, it...","og_url":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/","og_site_name":"OTAVA","article_published_time":"2013-03-18T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting","datePublished":"2013-03-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/"},"wordCount":602,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/","url":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/","name":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-03-18T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/new-cyber-threat-recommendations-by-the-bbb-of-western-michigan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2342"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2342\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2342"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}