<!-- wp:reyrey-js/page-data {"data":{"icalc":{"formulas":[],"fields":[]}},"lock":{"remove":true,"move":true}} /-->
<!-- wp:reyrey-js/section {"videoSrc":"","customClasses":"Bottom-Spacing-None","customClassesObject":{"Bottom Spacing":"Bottom-Spacing-None"},"backgroundSrc":""} -->
<div class="wp-block-reyrey-js-section"><!-- wp:reyrey-js/row {"template":[["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}}]],"gridLayoutValue":"100","customClasses":"Bottom-Spacing-None","customClassesObject":{"Bottom Spacing":"Bottom-Spacing-None"}} -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyrey-js/flex {"verticalAlignmentClass":"Vertical-Alignment-Center","gap":1} -->
<!-- wp:reyrey-js/group {"width":3} -->
<!-- wp:reyrey-js/image {"mid":"11729","size":"4"} /-->
<!-- /wp:reyrey-js/group -->
<!-- wp:reyrey-js/heading {"text":"Article Highlights","level":2,"fontSize":"22","fontFamily":"SemiBold","fontSizeClass":"FS-22","fontFamilyClass":"FF-SemiBold"} /-->
<!-- /wp:reyrey-js/flex -->
<!-- wp:reyrey-js/list {"customClasses":"Top-Spacing-Six Bottom-Spacing-Six","customClassesObject":{"Top Spacing":"Top-Spacing-Six","Bottom Spacing":"Bottom-Spacing-Six"},"columns":2} -->
<!-- wp:reyrey-js/list-item {"content":"What are common cyberattacks?"} /-->
<!-- wp:reyrey-js/list-item {"content":"What can you do to help prevent them?"} /-->
<!-- /wp:reyrey-js/list --></div>
<!-- /wp:reyrey-js/column -->
<!-- /wp:reyrey-js/row -->
<!-- wp:reyrey-js/row {"template":[["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}}]],"gridLayoutValue":"100"} -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyact/divider {"colorType":"Silverchalice"} -->
<div class="wp-block-reyact-divider"><div></div></div>
<!-- /wp:reyact/divider --></div>
<!-- /wp:reyrey-js/column -->
<!-- /wp:reyrey-js/row --></div>
<!-- /wp:reyrey-js/section -->
<!-- wp:reyrey-js/section {"videoSrc":"","backgroundSrc":""} -->
<div class="wp-block-reyrey-js-section"><!-- wp:reyrey-js/row {"template":[["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":2},"l":{"colSpan":4},"xl":{"colSpan":4}}}],["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":4},"l":{"colSpan":8},"xl":{"colSpan":8}}}]],"gridLayoutValue":"33-66"} -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":2},"l":{"colSpan":3},"xl":{"colSpan":3}},"stickyOption":"Sticky"} -->
} --><div class="wp-block-reyrey-js-column">
<!-- wp:reyrey-js/heading {"text":"Subscribe to Fuel","level":2,"fontSize":"22","fontFamily":"SemiBold","fontSizeClass":"FS-22","fontFamilyClass":"FF-SemiBold"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Get the inside scoop on industry trends as well as helpful system tips and educational articles.","fontFamily":"Light","fontFamilyClass":"FF-Light","customClasses":"Bottom-Spacing-Three","customClassesObject":{"Bottom Spacing":"Bottom-Spacing-Three"}} /-->
<!-- wp:reyrey-js/form {"formType":"Hubspot Form","hubspotEntity":{"value":188,"label":"FUEL Subscribe (188)","jsonapi":{"type":"block_content\u002d\u002dhubspot_component","id":"49a2b297-80a1-4f0e-81af-75f7150bdb13","links":{"self":{"href":"https://stage.reyrey.com/jsonapi/block_content/hubspot_component/49a2b2…;}},"attributes":{"drupal_internal__id":188,"info":"FUEL Subscribe"}}}} /-->
</div>
</div>
<!-- /wp:reyrey-js/column -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":4},"l":{"colSpan":7,"colStart":5},"xl":{"colSpan":7,"colStart":5}}} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyrey-js/paragraph {"content":"Theft is a crime as old as time. And as information has become more digital, and more valuable, criminals have developed ways to steal it. What is one of the most sought after types of information? Consumer data. And dealerships have a lot of it."} /-->
<!-- wp:reyrey-js/paragraph {"content":"The rise of cyberattacks as a means to steal information is quickly becoming more common and more publicized. So what do you need to know about these attacks?"} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cspan class=\u0022RR-Font-Weight Bold\u0022\u003eWhat are cyberattacks?\u003c/span\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Cyberattacks are an attempt to access or damage your computer or network. They can happen to anyone. A \u003ca href=\u0022https://www.sophos.com/en-us/medialibrary/Gated-Assets/white-papers/sop…\u0022 target=\u0022_blank\u0022 rel=\u0022noopener noreferrer\u0022\u003esurvey\u003c/a\u003e of over 500 U.S. businesses of all sizes showed that 51% were impacted in 2020. There is some common terminology used around cyberattacks:"} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cem\u003eMalware\u003c/em\u003e: Malware is a blending of the words in the phrase: “malicious software”. As you would expect, this is software that is designed to carry out or facilitate malicious intent. Malware typically attacks known vulnerabilities in software. Independent pieces of malware can be packaged or chained together, allowing an attacker to leverage one vulnerability after another, eventually leading to a larger final security compromise."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cem\u003eRansomware\u003c/em\u003e: Currently the most common and damaging objective for the attackers. Ransomware is a specific type of malware that encrypts the data on a computer or network with a password set by the attacker. The attacker then offers to unlock the data for a ransom and will often threaten to leak the data and notify customers if payment isn’t received (further increasing the pressure on the business to pay the ransom)."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cem\u003ePhishing\u003c/em\u003e: Phishing attacks are the most common type of attacks leveraging social engineering techniques. Attackers use fake emails, social media, instant messaging, and text messages to trick victims into providing sensitive information, opening malicious attachments, or visiting malicious websites. Their intent is to obtain sensitive information or install malware. Once malware is installed on a single computer on the network, it can often be remotely controlled to expand across the entire network. This is the most common method to deliver malware."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cspan class=\u0022RR-Font-Weight Bold\u0022\u003eHow can I prepare for the future?\u003c/span\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Being proactive in cybersecurity saves time, money, resources and reputation. You can help prevent, detect, and recover faster with a plan specifically for cyber incidents. Here are five ways you can prepare for future attacks:"} /-->
<!-- wp:reyrey-js/list {"ordered":true} -->
<!-- wp:reyrey-js/list-item {"content":"\u003cem\u003eHave an Incident Response Plan\u003c/em\u003e: Develop a plan to respond when a cyberattack occurs. Cyberattacks can happen in a matter of minutes and ransom payment time can be limited. Having a plan in place helps you make clear, thought-out decisions during a stressful situation. It is best to have pre-selected the partners you will work with to help you with incident response (for example, technical, insurance, and legal partners). You can rehearse your plan from time to time by performing a “table top exercise” (imagining an attack scenario and playing out your responses)."} /-->
<!-- wp:reyrey-js/list-item {"content":"\u003cem\u003eUpgrade your cybersecurity solutions\u003c/em\u003e: Your cybersecurity program is your defense against these attacks. Update to the latest versions of your security systems and avoid relying on only one security feature. \u003ca href=\u0022/cp/automotive-endpoint-defender\u0022 target=\u0022_blank\u0022\u003eStrong cybersecurity\u003c/a\u003e layers multiple solutions. Ensure you have 24 x 7 x 365 security monitoring of your systems. Attackers often choose to launch their attacks during weekends and holidays when IT staffing is generally low or retailers are very busy."} /-->
<!-- wp:reyrey-js/list-item {"content":"\u003cem\u003eTrain your employees\u003c/em\u003e: Human error allows holes in your defense that can be manipulated. Training your employees gives them the knowledge of how to identify and report cyber threats. Training can include password security, e-mail (phishing) security, suspicious link detection, and early signs of an attack."} /-->
<!-- wp:reyrey-js/list-item {"content":"\u003cem\u003eBack-up your data\u003c/em\u003e: Many cyberattacks occur to gain access to your data. To back up your data, you can store it in a remote location not permanently connected to your network. In ransomware attacks, having a reliable backup can save you hundreds of thousands of dollars. Attackers often seek out backup copies while investigating the network, to destroy them and force a ransom payment. Hence having an offline backup is a critical strategy."} /-->
<!-- wp:reyrey-js/list-item {"content":"\u003cem\u003eCyber insurance\u003c/em\u003e: Cyber incidents cost time, money, and can harm your reputation. Another proactive approach to protecting your business is to buy \u003ca href=\u0022https://protontechs.com/blog/cyber-insurance-101/\u0022 target=\u0022_blank\u0022 rel=\u0022noopener noreferrer\u0022\u003ecyber insurance\u003c/a\u003e. Cyber insurance insures losses accrued from cyber incidents and implements protection methods to prevent future attacks. Often times, cyber insurance companies will require that your security tools be current and modern."} /-->
<!-- /wp:reyrey-js/list -->
<!-- wp:reyrey-js/paragraph {"content":"\u003cspan class=\u0022RR-Font-Weight Bold\u0022\u003eConclusion\u003c/span\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Take a look at what resources you have in place to prevent cyber threats. Be proactive with your security with solutions that work together to give your dealership protection."} /--></div>
<!-- /wp:reyrey-js/column -->
<!-- /wp:reyrey-js/row --></div>
<!-- /wp:reyrey-js/section -->