Story image

Despite more training, SMBs feel unprepared for cyberattacks - Webroot

02 Jul 2018

Businesses in the US, UK and Australia are taking cybersecurity seriously – with almost 100% of respondents conducting some form of employee cybersecurity training, a Webroot report has found.

However, despite these efforts, 79% say they aren’t completely ready to manage IT security and protect against threats.

In a study of 600 IT decision makers (ITDMs) at small-to-medium-sized businesses (SMBs), Webroot found that the attacks organisations believed themselves to be most susceptible to in 2017 are rapidly shifting in 2018, while the estimated cost of a breach is decreasing.

Key findings:

  • Most dangerous threats evolving: Phishing displaces new forms of malware globally as the No. 1 attack that ITDMs believe their organisations are most susceptible to in 2018.
     
  • Top threats vary by country: US ITDMs think their business will be most susceptible to phishing threats (56%), while the UK fears ransomware attacks (44%) and Australia DNS attacks (52%).
     
  • Training isn’t continuous: Although almost 100% of businesses train employees on cybersecurity best practices, that figure drops to half or a third when asked about training “continuously,” which is vital for effectiveness. This leads to the next stat, 79% can’t say they are “completely ready to manage IT security and protect against threats.”
     
  • The cost of a breach drops: While breaches continue to proliferate, the estimated cost of a breach may be on the decline.
    TDMs estimate a cyberattack in which their customer records or critical business data were lost would cost an average of:
  • $527,256 in the US – a 9% decrease from 2017. 
  • £305,357 in the UK – a 59% decrease from 2017.
  • AU$994,025 in Australia – a 48% decrease from 2017.

Webroot worldwide business sales vice president Charlie Tomeo says, “As our study shows, the rise of new attacks is leaving SMBs feeling unprepared.

"One of the most effective strategies to keep your company safe is with a layered cybersecurity strategy that can secure users and their devices at every stage of an attack, across every possible attack vector."

Tomeo adds, "For many businesses, relying on a managed service provider (MSP) when time and expertise aren’t readily available is a crucial step to strengthen their security efforts."

Webroot had several cybersecurity guidelines for small to medium-sized businesses:

  • Always be educating: With threats continuously evolving, so must employee cybersecurity training. Training during onboarding isn’t enough. Employees need ongoing training to address the latest and most dangerous attacks.
     
  • Don’t forget about mobile. Bring your own device (BYOD) is now a reality for many companies. And while everyone wants to be connected, unknown devices brought in by employees also bring in unknown risks to the network. Finding a balance between providing employees corporate access and ensuring information security requires device control policies, device-level security and mobile workforce security training.
     
  • Email from my boss or my attacker? Phishing is the top attack vector, with cybercriminals becoming sneakier than ever. Even if the sender looks familiar, be sure to check the sender's email address is legitimate and don’t click unknown links in social media, email, or text. Regular phishing attack simulations maximise awareness of different phishing methods and minimise the many consequences.
     
  • Evaluate your risk profile: Every business has different risk factors. If you don’t have the expertise, an MSP can assess your security posture and work with you to develop a plan for ongoing risk mitigation.
     
  • Plan for the worst: Develop a data breach response plan that includes security experts to call and a communications response plan to notify customers, staff, and the public. Make sure you are regularly backing up your data with hard data and offline versions. Remote computer backup could be vulnerable to ransomware and other threats if not ‘air-gapped’. Research by the Better Business Bureau revealed that 50% of SMBs would operate at a loss within a month of a total data loss incident.
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.