SMEs Risk Costs Of Up To $2.5m Following A Breach

No matter the size, every entity is now at risk of cyber-attacks, whether through supply chain security lapses, phishing campaigns, or via insider attacks and weaknesses in their own networks.

However, small and mid-market companies have become a lucrative and attractive prospect for cybercriminals. These organisations will often have smaller cybersecurity budgets and may not be able to afford or have hired a chief security officer (CSO) or in-house security team able to take on rapid response duties.

We hear that security is only as strong as the weakest link. It is often employees which fill this niche, but in the overall threat landscape, SMBs can also become a springboard for attacks on larger enterprise companies. According to Cisco's SMB Cybersecurity Report, released on Wednesday 26th September, 53 percent of midmarket companies have experienced a data breach.

Recovering from these attacks can be both damaging and costly. It is not only damage to networks which must be repaired, third-party cyber-forensics teams are often hired, regulators may have to be notified and fines may be imposed, staff training may have to take place, and the victim organization may also pay in terms of their reputation and future business prospects.
The report, which includes 1816 survey respondents across 26 countries and also draws upon results from Cisco's 2018 Security Capabilities Benchmark Study, suggests that 29 percent of SMBs will pay under $100,000 after a data breach. 
However, 20 percent say that the same incident will cost them between $1,000,000 and $2,499,999 to resolve.

In total, 40 percent of SMBs will experience an average of eight hours or more in system downtime due to a data breach; a similar time frame to large enterprise players.

"The difference, though, is that larger organizations tend to be more resilient than small/midmarket businesses following an attack because they have more resources for response and recovery," Cisco notes.

The core systems of SMBs are more likely to be interconnected and tightly woven together as smaller firms do not necessarily need multiple systems spread over different locations. This may cost less to maintain, but when it comes to damage caused by a cyberattack, this is no advantage. 39 percent of respondents said that at least half of their systems have been impacted by a severe data breach in the last year.

When asked about the biggest security challenges they face, small and medium-sized businesses reported targeted attacks such as spear phishing campaigns, advanced persistent threats (APTs), ransomware infections, and Distributed Denial-of-Service (DDoS) attacks as the most concerning prospects.

However, organisations should not ignore the threat of insider attacks. A recent investigation by the tech giant suggests that 0.5 percent of employees conduct suspicious activities while on duty. This does not seem high, but this does translate to at least two employees at a company 400-strong which could undermine entire security structures and defenses with the click of a button.

In response to such threats, many SMEs are turning to cloud solutions to bolster their security. In 2014, roughly half of small to mid-sized businesses said they utilized cloud services; this figure is now closer to 70 percent and adoption is still on the rise.

"Incremental change is better than no change," Cisco says. "In short, they should not let a desire to be "perfect" in their security approach get in the way of becoming "better." Perfect, as in all things, does not exist."

"Small/midmarket businesses also must understand that there is no "silver bullet" technology solution to solve all of their cybersecurity challenges," the company added. "The threat landscape is too complex and dynamic. The attack surface is always expanding and changing. And, in response, security technologies and strategies must continually evolve as well."

ZDNet

You Might Also Read: 

What Every Small Business Should Know About Hackers & Cybersecurity:

 

 

« UK Newspaper Industry Demands Levy On Tech Firms
Machine Learning Algorithms & Police Decision-Making »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.