BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20260212T133000Z
DTEND:20260212T150000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:How Hackers Target Your Business- POSTPONED: Date TBD
DESCRIPTION:Think your small business is too insignificant for cybercriminals?\nThink again. A staggering 43% of all cyber attacks specifically target small businesses\, and the numbers reveal why: hackers see you as the easier target.\n\n\n\nThe reality is sobering:\n\n\n	Over half of small businesses operate with zero cybersecurity protection.\n	82% of ransomware victims are companies under 1\,000 employees with 37% having fewer than 100 staff.\n	6 out of 10 small businesses hit by cyber attacks permanently close within six months.\n	Small companies face malicious emails at nearly triple the rate of large corporations.\n\n\n\n\n\n\nJoin David Hunt\, a former government cybersecurity specialist and founder of a Reading-based IT security firm\, as he pulls back the curtain on how cybercriminals really operate. This eye-opening presentation will reveal:\n\n\n	Why hackers specifically hunt small businesses\n	The actual methods they use to infiltrate your systems (yes we will hack!)\n	Practical\, affordable defenses you can implement immediately\n\nYou'll walk away with actionable strategies from free tools to simple process changes that can dramatically reduce your risk and make your business a harder target. Don't become another statistic.
X-ALT-DESC;FMTTYPE=text/html:<div background-color:="" font-size:="" open="" style="box-sizing: border-box\; color: rgb(51\, 51\, 51)\; font-family: " text-align:=""><span style="box-sizing: border-box\; font-size: 20px\;"><span style="box-sizing: border-box\; font-weight: bolder\;"><img alt="" height="438" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/1685/Image/EventPhotoFull_02-12-2026howHackerstargetyourbusiness.jpeg" style="width: 350px\; height: 438px\;" width="350" /><br />\nThink your small business is too insignificant for cybercriminals?</span></span></div>\n<span background-color:="" font-size:="" open="" style="box-sizing: border-box\; color: rgb(51\, 51\, 51)\; font-family: "><span style="font-size:16px\;">Think again. A staggering 43% of all cyber attacks specifically target small businesses\, and the numbers reveal why: hackers see you as the easier target.</span><br style="box-sizing: border-box\;" />\n<br style="box-sizing: border-box\;" />\n<span style="box-sizing: border-box\; font-weight: bolder\;">The reality is sobering:</span></span>\n\n<ul background-color:="" font-size:="" margin-left:="" open="" style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; outline: 0px\; color: rgb(51\, 51\, 51)\; font-family: ">\n	<li style="box-sizing: border-box\; margin: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">Over half of small businesses operate with zero cybersecurity protection.</span></li>\n	<li style="box-sizing: border-box\; margin: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">82% of ransomware victims are companies under 1\,000 employees&mdash\;with 37% having fewer than 100 staff.</span></li>\n	<li style="box-sizing: border-box\; margin: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">6 out of 10 small businesses hit by cyber attacks permanently close within six months.</span></li>\n	<li style="box-sizing: border-box\; margin: 0px\; outline: 0px\;"><span style="box-sizing: border-box\; outline: 0px\; font-size: 16px\;">Small companies face malicious emails at nearly triple the rate of large corporations.</span></li>\n</ul>\n\n<div style="box-sizing: border-box\; margin: 0px\; outline: 0px\;">\n<div background-color:="" class="row gz-details-links" font-size:="" open="" style="box-sizing: border-box\; margin-left: -15px\; margin-right: -15px\; display: flex\; flex-flow: wrap\; outline: 0px\; -webkit-box-orient: horizontal\; -webkit-box-direction: normal\; color: rgb(51\, 51\, 51)\; font-family: ">\n<div class="col-sm-7 col-md-8 order-sm-first" style="box-sizing: border-box\; position: relative\; min-height: 1px\; padding-left: 15px\; padding-right: 15px\; float: left\; width: 579.992px\; flex: 0 0 66.6667%\; max-width: 66.6667%\; order: -1\; outline: 0px\;">\n<div class="row gz-event-description" itemprop="about" style="box-sizing: border-box\; margin-left: -15px\; margin-right: -15px\; display: flex\; flex-wrap: wrap\; outline: 0px\;">\n<div class="col" style="box-sizing: border-box\; position: relative\; width: 579.992px\; min-height: 1px\; padding-right: 15px\; padding-left: 15px\; flex-basis: 0px\; flex-grow: 1\; max-width: 100%\; outline: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">Join&nbsp\;<span style="box-sizing: border-box\; font-weight: bolder\;">David Hunt</span>\, a former government cybersecurity specialist and founder of a Reading-based IT security firm\, as he pulls back the curtain on how cybercriminals really operate. This eye-opening presentation will reveal:</span>\n\n<ul style="box-sizing: border-box\; margin-top: 0px\; margin-bottom: 1rem\; margin-left: 40px\;">\n	<li style="box-sizing: border-box\; margin: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">Why hackers specifically hunt small businesses</span></li>\n	<li style="box-sizing: border-box\; margin: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">The actual methods they use to infiltrate your systems (yes&mdash\;we will hack!)</span></li>\n	<li style="box-sizing: border-box\; margin: 0px\;"><span style="box-sizing: border-box\; font-size: 16px\;">Practical\, affordable defenses you can implement immediately</span></li>\n</ul>\n<span style="box-sizing: border-box\; outline: 0px\; font-size: 16px\;">You&#39\;ll walk away with actionable strategies&mdash\;from free tools to simple process changes&mdash\;that can dramatically reduce your risk and make your business a harder target. Don&#39\;t become another statistic.</span>\n\n<p style="box-sizing: border-box\; margin: 0px 0px 1rem\;">&nbsp\;</p>\n</div>\n</div>\n</div>\n\n<div class="col-sm-5 col-md-4 order-sm-last" style="box-sizing: border-box\; position: relative\; min-height: 1px\; padding-left: 15px\; padding-right: 15px\; float: left\; width: 289.992px\; flex: 0 0 33.3333%\; max-width: 33.3333%\; order: 13\;">\n<div class="row gz-event-facts" style="box-sizing: border-box\; margin: 1rem\; display: flex\; flex-wrap: wrap\;">\n<div class="col-sm-12 gz-event-location" itemprop="location" itemscope="" itemtype="http://schema.org/Place" style="box-sizing: border-box\; position: relative\; min-height: 1px\; padding-left: 15px\; padding-right: 15px\; float: left\; width: 227.992px\; flex: 0 0 100%\; max-width: 100%\;">\n<h5 class="gz-subtitle" style="box-sizing: border-box\; font-family: inherit\; font-weight: 500\; line-height: 1.1\; color: rgb(65\, 64\, 66)\; margin-top: 0.5rem\; margin-bottom: 0.5rem\; font-size: 16px\;">&nbsp\;</h5>\n</div>\n</div>\n</div>\n</div>\n</div>\n
LOCATION:Conference Center\, Suite 2350 500 W. Cummings Park Woburn Massachusetts 01801
UID:e.1685.4891
SEQUENCE:3
DTSTAMP:20260405T140020Z
URL:https://business.arlcc.org/events/details/how-hackers-target-your-business-postponed-date-tbd-4891
END:VEVENT

END:VCALENDAR
