Can Small Business Beat Cyber Attacks?

According to Verizon's 2019 Data Breach Investigations Report, 43% of Cyber Attacks are aimed at small businesses and the weakest link is lack of employee Cyber understanding – every member of the team needs continual training. A recent UK government survey estimated that the average cost of a small business cyberattack is between £65,000 and £115,000. 

Cybercrime recovery potentially involves many measures, including identifying and fixing the problem, replacing damaged software and hardware, hiring specialist IT security consultants, hiring a PR firm to manage a damaged reputation, and hiring a solicitor to deal with clients who’ve had their own business compromised as a result of cybercrime.

It is clear that an attack would be a massive upheaval for most small businesses. As well as following its cyber protection advice, the Federation of Small Businesses has stressed the need for smaller companies to put in place specific cyber protection solutions to guard against this significant risk.

A good cybersecurity strategy is essential for any business, no matter its size, but in the midst of a sever lack of security experts, what’s a small business to do?

It’s a vexing question as cybercriminals continue to score goal after goal with simple attacks such as phishing emails, in which attackers use already-compromised passwords to access users’ other work and personal accounts.

In Australiane Office of the Australian Information Commissioner (OAIC) stats confirm that businesses there also remain extremely vulnerable to the attacks. A server containing 1.2 billion personal profiles including 622m email addresses was recently discovered. Small businesses make up more than 97 per cent of Australia’s businesses, even those that recognise the need to improve security can struggle to give it the priority of major enterprises.

By contrast, 62 per cent of small businesses are sole traders and 27 per cent have just 1 to 4 employees. Margins are often tight, leaving little left over to spend on cybersecurity tools and even less for the six-figure salaries needed to lure cybersecurity specialists.

Throw in the challenges of a market with an estimated 100,000-person IT skills gap making it is ‘very difficult’ to recruit cybersecurity specialists, and small businesses are vulnerable to an unchecked stream of cybersecurity threats.
There were 60 per cent more cybersecurity threats against healthcare organisations, the majority of which are small businesses, in the first three quarters of this year than in all of 2018.

Detecting, stopping and recovering from such attacks requires a broad range of security skills, while proactive defences takes job descriptions to a whole new level. Yet even those companies that do manage to hire an IT person with some cybersecurity experience often find their capabilities limited. 

In light of the ever-increasing threat, now is the time to protect your business against cybercrime. Increase your ability to prevent cybercrime within your SME by adopting best practice and awareness training, and increase your ability to recover by adopting cyber insurance. Neither need to be costly, but they could save your business.

Please contact Cyber Security Intelligence for advice and help.

Informationa Age:       Small Business:           ByteStart:

You Might Also Read:


Cyber Security Training That Employees Don’t Hate:

 

 

« AI And IoT Have Created The AIoT
Finland Has A Cyber Security Standard For IoT »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Finesse Global

Finesse Global

Finesse is a global system integration and digital business transformation company.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.