Can Small Business Beat Cyber Attacks?

According to Verizon's 2019 Data Breach Investigations Report, 43% of Cyber Attacks are aimed at small businesses and the weakest link is lack of employee Cyber understanding – every member of the team needs continual training. A recent UK government survey estimated that the average cost of a small business cyberattack is between £65,000 and £115,000. 

Cybercrime recovery potentially involves many measures, including identifying and fixing the problem, replacing damaged software and hardware, hiring specialist IT security consultants, hiring a PR firm to manage a damaged reputation, and hiring a solicitor to deal with clients who’ve had their own business compromised as a result of cybercrime.

It is clear that an attack would be a massive upheaval for most small businesses. As well as following its cyber protection advice, the Federation of Small Businesses has stressed the need for smaller companies to put in place specific cyber protection solutions to guard against this significant risk.

A good cybersecurity strategy is essential for any business, no matter its size, but in the midst of a sever lack of security experts, what’s a small business to do?

It’s a vexing question as cybercriminals continue to score goal after goal with simple attacks such as phishing emails, in which attackers use already-compromised passwords to access users’ other work and personal accounts.

In Australiane Office of the Australian Information Commissioner (OAIC) stats confirm that businesses there also remain extremely vulnerable to the attacks. A server containing 1.2 billion personal profiles including 622m email addresses was recently discovered. Small businesses make up more than 97 per cent of Australia’s businesses, even those that recognise the need to improve security can struggle to give it the priority of major enterprises.

By contrast, 62 per cent of small businesses are sole traders and 27 per cent have just 1 to 4 employees. Margins are often tight, leaving little left over to spend on cybersecurity tools and even less for the six-figure salaries needed to lure cybersecurity specialists.

Throw in the challenges of a market with an estimated 100,000-person IT skills gap making it is ‘very difficult’ to recruit cybersecurity specialists, and small businesses are vulnerable to an unchecked stream of cybersecurity threats.
There were 60 per cent more cybersecurity threats against healthcare organisations, the majority of which are small businesses, in the first three quarters of this year than in all of 2018.

Detecting, stopping and recovering from such attacks requires a broad range of security skills, while proactive defences takes job descriptions to a whole new level. Yet even those companies that do manage to hire an IT person with some cybersecurity experience often find their capabilities limited. 

In light of the ever-increasing threat, now is the time to protect your business against cybercrime. Increase your ability to prevent cybercrime within your SME by adopting best practice and awareness training, and increase your ability to recover by adopting cyber insurance. Neither need to be costly, but they could save your business.

Please contact Cyber Security Intelligence for advice and help.

Informationa Age:       Small Business:           ByteStart:

You Might Also Read:


Cyber Security Training That Employees Don’t Hate:

 

 

« AI And IoT Have Created The AIoT
Finland Has A Cyber Security Standard For IoT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Cyber Capital Partners

Cyber Capital Partners

Cyber Capital Partners build strategic and financial partnerships with small and mid-sized cybersecurity companies in highly regulated markets.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Forthright Technology Partners

Forthright Technology Partners

Forthright Technology Partners (Forthright) is a next-generation cloud and managed IT services provider serving a global clientele.

Cloudsmith

Cloudsmith

Cloudsmith is the only cloud-native, global, universal artifact management platform for securely developing and distributing software.