Can Small Business Beat Cyber Attacks?

According to Verizon's 2019 Data Breach Investigations Report, 43% of Cyber Attacks are aimed at small businesses and the weakest link is lack of employee Cyber understanding – every member of the team needs continual training. A recent UK government survey estimated that the average cost of a small business cyberattack is between £65,000 and £115,000. 

Cybercrime recovery potentially involves many measures, including identifying and fixing the problem, replacing damaged software and hardware, hiring specialist IT security consultants, hiring a PR firm to manage a damaged reputation, and hiring a solicitor to deal with clients who’ve had their own business compromised as a result of cybercrime.

It is clear that an attack would be a massive upheaval for most small businesses. As well as following its cyber protection advice, the Federation of Small Businesses has stressed the need for smaller companies to put in place specific cyber protection solutions to guard against this significant risk.

A good cybersecurity strategy is essential for any business, no matter its size, but in the midst of a sever lack of security experts, what’s a small business to do?

It’s a vexing question as cybercriminals continue to score goal after goal with simple attacks such as phishing emails, in which attackers use already-compromised passwords to access users’ other work and personal accounts.

In Australiane Office of the Australian Information Commissioner (OAIC) stats confirm that businesses there also remain extremely vulnerable to the attacks. A server containing 1.2 billion personal profiles including 622m email addresses was recently discovered. Small businesses make up more than 97 per cent of Australia’s businesses, even those that recognise the need to improve security can struggle to give it the priority of major enterprises.

By contrast, 62 per cent of small businesses are sole traders and 27 per cent have just 1 to 4 employees. Margins are often tight, leaving little left over to spend on cybersecurity tools and even less for the six-figure salaries needed to lure cybersecurity specialists.

Throw in the challenges of a market with an estimated 100,000-person IT skills gap making it is ‘very difficult’ to recruit cybersecurity specialists, and small businesses are vulnerable to an unchecked stream of cybersecurity threats.
There were 60 per cent more cybersecurity threats against healthcare organisations, the majority of which are small businesses, in the first three quarters of this year than in all of 2018.

Detecting, stopping and recovering from such attacks requires a broad range of security skills, while proactive defences takes job descriptions to a whole new level. Yet even those companies that do manage to hire an IT person with some cybersecurity experience often find their capabilities limited. 

In light of the ever-increasing threat, now is the time to protect your business against cybercrime. Increase your ability to prevent cybercrime within your SME by adopting best practice and awareness training, and increase your ability to recover by adopting cyber insurance. Neither need to be costly, but they could save your business.

Please contact Cyber Security Intelligence for advice and help.

Informationa Age:       Small Business:           ByteStart:

You Might Also Read:


Cyber Security Training That Employees Don’t Hate:

 

 

« AI And IoT Have Created The AIoT
Finland Has A Cyber Security Standard For IoT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

General Dynamics Information Technology (GDIT)

General Dynamics Information Technology (GDIT)

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.